-
note: tx chaining was removed after [discussion](https://github.com/monero-project/research-lab/issues/84#issuecomment-877873623) (July 18, 2020)
## Table Of Contents
- [Abstract](#Abstract)
- …
-
Post a link for a "possibility" reading of your own on the topic of Network & Table Learning [for week 6], accompanied by a 300-400 word reflection that: 1) briefly summarizes the article (e.g., as we…
lkcao updated
2 years ago
-
Where should I start if I want to train a model for usage with Neural-Style?
Are Network In Network (NIN) models easier to train than VGG models?
Does anyone know of any guides that cover training …
-
First-party sets (FPS) violates some central principles of the modern web. Specifically, the [priority of constituencies](https://www.w3.org/TR/html-design-principles/#priority-of-constituencies) put…
-
Hi! Could you please make the source code for the benchmark adversarial attacks available? You briefly mention how you implemented it using torchattacks, with their results but their implementation an…
-
The implementation of type_id from #10182 uses SipHash on various parameters depending on the type. The output size of SipHash is only 64-bits, however, making it feasible to find collisions via a Bir…
-
We need to implement sampling from manipulated distributions, to simulate agents misreporting Valuation Distributions.
A sketch:
1. create a copy of misreporter to be used as ValuationMisreporter…
-
## Ecosystem Advancement (RFP): zkOracle Integration for o1js
- **Intent:** To integrate zkOracle functionality with o1js, enabling Mina zkApp developers to incorporate zk-oraclized data in their ap…
-
Hi, could you please add the paper [An LLM can Fool Itself: A Prompt-Based Adversarial Attack](https://arxiv.org/abs/2310.13345#:~:text=This%20paper%20proposes%20an%20efficient,adversarial%20sample%20…
-
This technology is only going to be used for evil purposes. To deceive people, steal their money, possessions, undercover operations. Nothing good. It is already being used for scams like the pig-butc…