Skip to content
View npapernot's full-sized avatar

Highlights

  • Pro

Organizations

@siis @cleverhans-lab

Block or report npapernot

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
  • objax Public

    Forked from google/objax
    Python Apache License 2.0 Updated Apr 7, 2023
  • privacy Public

    Forked from tensorflow/privacy

    Library for training machine learning models with privacy for training data

    Python Apache License 2.0 Updated Apr 26, 2022
  • Github pages backend for https://differentialprivacy.org

    HTML 1 MIT License Updated Oct 19, 2021
  • A web app for ranking computer science departments according to their research output in selective venues, and for finding active faculty across a wide range of areas.

    Python Other Updated Sep 7, 2021
  • jax Public

    Forked from jax-ml/jax

    Composable transformations of Python+NumPy programs: differentiate, vectorize, JIT to GPU/TPU, and more

    Python Apache License 2.0 Updated Aug 10, 2019
  • models Public

    Forked from tensorflow/models

    Models and examples built with TensorFlow

    Python Apache License 2.0 Updated Jan 14, 2019
  • tips Public

    (Organized) repository of tips for future reference

    Vim Script 5 1 Updated Jun 20, 2017
  • A library for benchmarking vulnerability to adversarial examples

    Python 5 2 MIT License Updated Feb 3, 2017
  • Some notes about programming languages

    1 MIT License Updated Jan 20, 2017
  • This repository contains binaries for the multiple teacher approach to learning differential private ML models: https://arxiv.org/abs/1610.05755

    10 5 Updated Nov 16, 2016
  • Boilerplate for IEEE conference submissions

    TeX 2 Updated Oct 5, 2016
  • Notes from computer security class by Trent Jaeger

    2 Updated Oct 4, 2016
  • Train a simple decision tree classifier to detect websites used for phishing

    Python 76 36 MIT License Updated Sep 30, 2016
  • This is an example buffer overflow attack on a small vulnerable C program.

    C 79 52 Updated Apr 27, 2016
  • Some examples to get started with list manipulation in Prolog

    Prolog 1 2 Updated Apr 19, 2016
  • A simple example of a dictionary attack coded in Java

    Java 10 19 Updated Apr 6, 2016
  • Implementation of a DoubleDES cipher along with a Meet In The Middle attack

    Java 4 3 Updated Feb 12, 2016
  • A simple bigram next word predictor implemented in Python.

    Python 6 3 MIT License Updated Jan 23, 2016
  • interviews Public

    Technical Interview Problems with Solution Source Code

    Java 2 2 Updated Oct 29, 2015