-
> The discovery of adversarial examples has raised concerns about the practical deployment of deep learning systems. In this paper, we argue that the field of medicine may be uniquely susceptible to a…
-
### Checked other resources
- [X] I added a very descriptive title to this issue.
- [X] I searched the LangChain documentation with the integrated search.
- [X] I used the GitHub search to find a sim…
-
Three of the attacks presented (EAD, CW2, and BLB) are *unbounded* attacks: rather than finding the “worst-case” (i.e., highest loss) example within some distortion bound, they seek to find the *close…
-
Steps to Reproduce:
1. Append `"editor.unicodeHighlight.nonBasicASCII": true,` to the settings json.
1. Open a document w/ many non-ascii chars
![image](https://user-images.githubus…
-
Currently, based on the README, if an attacker wants to brute-force a user's password, he has to compute Argon2id for each password try (given by the user as input). (Which is good.)
However, if t…
-
Thanks to Reviewer B and C for their comments and time reviewing our submission.
Our response below is organized in two parts. We start by clarifying our goal and the way we approached it, before …
-
Implement a basic form of steganography using the content manipulation done by the proxy. One suggestion is to hide the entire HTTP data in a div and then put it in a benign request or response.
-
This issues combines several proposed changes to the account ID structure as they are all likely to be implemented together. These changes are:
1. Reduce account ID size to 60 bits (originally desc…
-
Can you verify that these two images collide?
![beagle360](https://user-images.githubusercontent.com/1328/129860794-e7eb0132-d929-4c9d-b92e-4e4faba9e849.png)
![collision](https://user-images.githubu…
-
## Keyword: super resolution
There is no result
## Keyword: gan
### Towards Discovery and Attribution of Open-world GAN Generated Images
- **Authors:** Sharath Girish, Saksham Suri, Saketh Rambhatla…