• The code from our paper, Adversarial Example Defense: Ensembles of Weak Defenses are not Strong

    Jupyter Notebook MIT Updated Nov 15, 2017
  • Blockchain at Berkeley Audit of StandardBounties

    HTML 1 Updated Nov 9, 2017
  • Elastic sensitivity experiments using TCP-H benchmark

    Scala 1 1 Updated Oct 14, 2017
  • Python MIT Updated Jun 23, 2017
  • Public repo for transferability ICLR 2017 paper

    Python 10 2 Updated May 9, 2017
  • Repository for the hands-on lab of the Deep Learning and Security Innovation Hackathon.

    Python 4 1 Updated Feb 18, 2017
  • OCaml 6 Updated Sep 11, 2016
  • JavaScript 58 19 Updated Aug 12, 2016