-
As a security researcher, I would like to open a discussion to make Machine Learning practices secure over ubiquity. We will discuss "not so commonly known" vulnerabilities in machine learning applica…
-
First of all, thank you for sharing the code and dataset information related to GIAS.
I tried to reproduce inversion attack results using the script provided as a default on ImageNet dataset (Filenam…
-
- Reviewer Yydy
strength
> I like the intuition of using confidence gaps (obtained through logits only) to approximate the original private model, but there shall be more details about the inver…
-
the following is an initial review taken from Slack logs: https://owasp.slack.com/archives/C04PESBUWRZ/p1677192099712519
by @robvanderveer
---
Dear all,
I did a first scan through the list t…
-
reviews
-
# Thanks for your valuable comments.
We thank AC and all reviewers for their valuable time and constructive feedback. We briefly summarize the suggestions and our answers as the following. You can …
-
Could you please tell me the detail of compute Jacodian matrix in Practical Black-Box Attacks against Machine Learning.
Thank you!
-
Hi Ian,
I hope you're well! I was wondering whether you could help me with a quick thing. I've been using TRIPPy to get weights to line integrate emissivities and compare to Hirex-Sr, XEUS, LoWEUS…
-
#### Short description of the issue.
While derping with Bow (moving high speed and throwing arrows at random), NoCheatPlus detects it as COMBINED_IMPROBABLE with quite high VLs.
#### Complete outp…
-
[The format of the issue]
Paper name/title:
Paper link:
Code link: