-
Pose a question about one of the following articles:
[“Generative agents: Interactive simulacra of human behavior.”](https://dl.acm.org/doi/abs/10.1145/3586183.3606763) Park, Joon Sung, Joseph O'B…
-
A preprint ([Adversarial Policies Beat Professional-Level Go AIs](https://goattack.alignmentfund.org/?row=0#no_search-board)) was recently published about a strategy for tricking KataGo into passing w…
-
Hello,
Synack is pleased to provide the attached response to the ATC and signatory agencies' Request for Comment on the Report to the President on Federal IT Modernization. As the government partne…
-
## What is the Problem Being Solved?
@FUDCo and I have talked about a lot of potential non-determinism in the virtual object manager, and we've thought of and/or implemented many defenses, but I'm …
-
Dear authors,
Thanks for the open-source of your neurips23 paper _Rethinking the Backward Propagation for Adversarial Transferability_!
While I try to reproduce the results in Table 3 -- defense…
-
ReID implementation on Jetson https://github.com/anonymous1computervision/Human-ReID-in-NVIDIA-Jetson
-
## Keyword: out of distribution detection
There is no result
## Keyword: out-of-distribution detection
There is no result
## Keyword: expected calibration error
There is no result
## Keyword: overc…
-
Hi, I would like to add our completed paper from MSFT Research about defense against adversarial attacks, "Protecting Your LLMs with Information Bottleneck" [paper](https://arxiv.org/pdf/2404.13968.pd…
-
I couldn't find any proper place to report this, feel free to shift it if this is not the right place.
Quote [https://trojansource.codes/ Trojan Source: Invisible Vulnerabilities]
> **Invisible …
-
Something I've thought about and at the encouragement of @ghostwords I at least want to throw a ticket in to track discussion
original mention here
(https://github.com/EFForg/privacybadger/issues/12…