-
### Description
In light of the recent supply chain attack in xz/lzma, leading to a backdoor in openSSH (https://www.openwall.com/lists/oss-security/2024/03/29/4), I believe that it would be a good…
danog updated
7 months ago
-
The LaTeX integration in stackedit is really awesome. I had a talk with someone who came up with an other similar idea: having support for inline mathematical calculations. This should be relatively e…
-
```
http://code.google.com/intl/fi-FI/projecthosting/policy.html
You are violating code.google.com service policy by hosting malicious products.
Please remove this project from code.google.com.
I h…
-
- [ ] 是否有人在QA上做过训练阶段的攻击
- [ ] VQA上的攻击主要是在做什么?
- [ ] NLP大方向上别人是怎么攻击的?
思考:
- 为什么通过注入极少量(50-200左右)有毒数据,trigger + fake answer,最后模型就会一遇到关键词就给fake answer,为什么会work, 背后的机理是过拟合嘛?和meta-learning相关嘛?
- 后门攻…
-
I have reproduced your code on VILLAIN backdoor attacks using the MNIST dataset, but the attack's performance is poor. Could you share your experimental results about VILLAIN? The results of VILLAIN o…
-
Have you considered moving the server and data out of the US territory/reach?
Examples are https://www.neomailbox.com/features/offshore-servers and https://protonmail.ch/pages/security-details
-
```
http://code.google.com/intl/fi-FI/projecthosting/policy.html
You are violating code.google.com service policy by hosting malicious products.
Please remove this project from code.google.com.
I h…
-
```
http://code.google.com/intl/fi-FI/projecthosting/policy.html
You are violating code.google.com service policy by hosting malicious products.
Please remove this project from code.google.com.
I h…
-
```
http://code.google.com/intl/fi-FI/projecthosting/policy.html
You are violating code.google.com service policy by hosting malicious products.
Please remove this project from code.google.com.
I h…
-
### Proposal
A workflow like this would be great:
1. A PR is opened to perform some infrastructure change.
2. The plan is signed by a local key (perhaps even on a Yubikey or similar) on an engi…