-
### Describe the workflow you want to enable
Currently metrics in scikit-learn have several shortcomings:
- Although it is possible to pass custom metrics as callables, they are called for each pair…
-
Submitted By: steve.albers
Topic: Security
Team: Tier 1 Suppport
There is a PII leakage case for Datadog that will likely need to be addressed by adding a Data Access restriction (link below) to Da…
-
### Link
https://aliexpress.com/item/1005004894566311.html
### Database entry
{"id":45,"type":"Router","ieeeAddr":"0x84b4dbfffec08548","nwkAddr":18204,"manufId":4098,"manufName":"_TZE204_davzgqq0",…
-
Thank you for the easy to use package. I guess there might be some memory leakage when calling calculate_features. I have a for loop iterating ~2000 times each calling
all_features
-
Hi @JoOkuma,
First of all, thanks for your work!
Have you released the data used in your preprint (besides the one from CTC) (and the corresponding segmentations)? If yes, can you hint me on how…
-
my code:
data
-
Hi,
Thank you providing the code and details about the data leakage. I just want to make sure I understand correctly: We can still use the old checkpoints but need to update the code (`canonicalize_p…
-
Great resource: https://reproducible.cs.princeton.edu/
Really ties into preprocessing before data splitting and dealing with class imbalance!
-
Given the intended security properties, how do you feel about data deduplication?
Would the ORAM implementation help with the information leakage inherent to convergent encryption?
-
### Expected behaviour
A version update closes *just* Nextcloud, performs the update, and restarts it.
### Actual behaviour
As soon as I hit the UAC "yes", Windows' `explorer.exe` (not IExplo…