-
### Zig Version
0.14.0-dev.1217+dffc8c44f
### Steps to Reproduce and Observed Behavior
I apologize for the poor issue title.
Here is a minimal code that produces the error:
```zig
const std = @i…
-
# Industrial Machine situation
This dataset is a sound dataset for malfunctioning industrial machine investigation and inspection
## Task Objective
In this task, we consider false positives and …
-
## Introduction
Transfer the safety committee glossary in google doc to the zephyr /doc to have it publicly available.
### Problem description
The safety committee glossary shall be publicly …
-
Hi
Could you share scripts that may reproduce the results in the paper ? Thanks.
I tried the generation and evaluation for safety using the following script on an Nvidia GPU. The results are
…
-
## タイトル: 何でも攻撃する:普遍的な背景敵対的攻撃によるブラインドDNN
## リンク: https://arxiv.org/abs/2409.00029
## 概要:
深層ニューラルネットワーク(DNN)は、敵対的な摂動に対して脆弱であることが広く知られています。既存の研究では、主に標的となる物体(物理攻撃)または画像(デジタル攻撃)を破損させることで攻撃を行うことに焦点が当てられ…
-
One own evaluation board is crashing after about ten minutes, when the external crystal is activated with
`#define FUNCONF_USE_HSE 1`
in funconfig.h
RTFM (CH32V003RM.PDF) and the debug output sho…
-
### What
- WHO/FAO JECFA Toxicity evaluation
- WHO/FAO JECFA Safety evaluation
- EFSA opinions
- FSANZ Hazard Assessment
The taxonomy has a few examples already:
https://en.wiki.openfoodfacts.…
-
Model Performance Improvements
- [x] change text-completion model from gpt-4o paid to groq-llama3.1-70b-versatile, reason: fast_inference, unpaid but rate limit. better for deployment.
- [x] chang…
-
**Description:**
There is a ```kpi.py``` file that can do the following:
- path_length
- execution_time
- constraint_violation
Constraint Violation (last one) is of importance to us since it wi…
-
In the paper in appendix B.2, you briefly describe how you generate the malicious instructions dataset. Could you share the prompt and seed instructions you used to generate this dataset? And how did …