-
TL;DR: The best trade-off between security and usability for off-device backups is a setup workflow/wizard that instructs the user to write down or print off the encryption key. This is what many onl…
-
Hi,
I was reading the great documentation of this package, and I got surprised by [this section](https://juliadynamics.github.io/TransferEntropy.jl/v1.0/#Entropies.RectangularBinning). Why you mentio…
-
Same as #245 but for the reconstructors. My suspicion is that most of these don't have easily comparable reference implementations, so those can be checked off fairly quickly. The implementers of each…
-
#### Describe the new feature or enhancement
The simplest way to check the relation between two signals is using correlation or a similar a similar approach. However, there are connectivity indexes t…
-
@galengorski
> 1. Using mutual information as a measure of predictive performance and transfer entropy as a measure functional performance across a range of model decisions (could be addition of p…
-
I'm using python 3.9 on a Mac running OSX 11.6.1. I installed PyIF okay and attempted a simple example, such as the one you provided:
```
from PyIF import te_compute as te
import numpy as np
ran…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xbcfb0a79248caedd5207e493043124072f9f26cfc60a88888f24f1e6c5517385
**Severity:** medium
**Description:**
**Descriptio…
-
Hi,
I am trying to reproduce the result in the paper, I followed your code and procedure but I can only get 58% accuracy on the Visda test set. Can you share more details about the tricks here?
…
-
https://github.com/chathika/MACM/blob/7bb917aa9b670c54f68b8c876de4936a74555853/MACM/MACM.py#L219
Check this line again, please. In line 204 and line 215 x.sum() is considered to find the endo influ…
-
`balance_hash`'s are meant to hide concrete transferred amounts from MonitoringServices, but in the current form, they have not enough entropy so that an observer can easily recover the contents of ba…