-
Ideally we would test the protocols with explicit adversaries. This is a huge topic in its own right however. There _is_ some work by the researchers on defining "ideal" adversaries; if this research …
edsko updated
9 months ago
-
**Describe the bug**
When I ran "Task Hunter" adversary as a blue team, found the following error message in the command output.
```
cat: /tmp/cron_jobs: No such file or directory
```
The adver…
-
have I understood it correctly that you only implement Adversaries 1 and 2 of Yeom et al. (in `yeom_membership_inference`)? If so, was there a technical reason the colluding adversary (adversary 3) wa…
-
For Adversary list it might be useful to have what level of Adversary tallet the NPC has to be able to sort by that field. This would let the person have a climbing scale of bad guys.
-
suggestions:
out-of-band adversary
offline adversary
considers eg attacker who users leaks xpub to
-
**Github username:** @deadrosesxyz
**Twitter username:** @deadrosesxyz
**Submission hash (on-chain):** 0x582d7050f2de893699c434f390798690c49a7e486b6c4f73d7cb4350370b2a7f
**Severity:** high
**Descrip…
-
Hi, I have noticed that the model format of vit-victim-b16-s650m in your [Google Drive](https://drive.google.com/drive/folders/1-bGX-NQOh6MuRPoXJgYHb9-jWRJvviSg) is not a bin.gz file. I would like to …
-
Hi authors, thanks for your amazing work to bring the existing safety problem of T2I models. I assume that your text embedding based adversary attack requires to access the exact text encoder of the m…
LezJ updated
3 months ago
-
### Question
Hi, I am working on simple_adversary_v3 along with agileRL to train the agents. I am using parallel_env and want to monitor the agents positions while training. I found that step functio…
-
As we recently added rootkit detection capabilities in Tracee, we should make it clear to the user of Tracee what is the adversary model Tracee protects against, meaning, what are the capabilities tha…