-
yo, everything works great thanks alright uh what I want to know is how would I go about spoofing my ipv4 and being able to connect with ssh-mitm.
i run sudo ifconfig wlan0 my desired phone ipv4 a…
-
In the article, the author says "In order to find effective noise delta and unlearnable examples, the optimization steps for theta should be
limited, compared to standard or adversarial training ".
…
-
https://github.com/Trusted-AI/adversarial-robustness-toolbox/blob/main/notebooks/poisoning_attack_sleeper_agent_pytorch.ipynb
-
Vulnerable Library - sites-shared-1.1.1.tgz
Found in HEAD commit: 377b5496ab19a7647e8e4adb07aeb4be3886d49f
## Vulnerabilities
| CVE | Severity | CVSS | Dependency | Type | Fixed in | Remediat…
-
## CVE-2021-42581 - High Severity Vulnerability
Vulnerable Library - ramda-0.25.0.tgz
A practical functional library for JavaScript programmers.
Library home page: https://registry.npmjs.org/ramda/-…
-
hey, so for some reason the Pain cycle enchantment is acting a little strange (i think). i know the enchantment is supposed to hurt the player as well, but only when they attack, right? for some reaso…
444wa updated
2 years ago
-
Use a java dependency vulnerability scanner
-
Hi, I've been trying to investigate your code and can't seem to find where did you implemented the Poison Frogs algorithm?
Thanks in advance.
wesbz updated
2 years ago
-
Hello, many thanks for your great work. The idea is very interesting.
I have a question regarding the problem setting.
This work focuses on poisoning attacks on FL for medical imaging, where the …
-
### Disclaimers
- [X] I have searched the issue tracker to check if the issue has already been reported.
- [X] My issue happened while using mods.
### What happened?
Dedicated Server crashed about …