Skip to content
Overview
Team
Projects
Capabilities
Blog
Presentations
Publications
In the news
Demos
Sophos.com
Crafting adversarial input sequences for recurrent neural networks
Richard Harang
Adversarial ML
Post navigation
Previous:
Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments
Next:
De-anonymizing programmers via code stylometry