Compare commits
2 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
768ba69a22 | ||
|
8fa41673c9 |
@ -1,6 +1,9 @@
|
|||||||
DEPLOY=driftless:/u/j/u/justhsu/public/html-s/teaching/current/cs839
|
HOST=driftless
|
||||||
|
DEPLOY=/u/j/u/justhsu/public/html-s/teaching/current/cs839
|
||||||
# DEPLOY=rockhopper-07.cs.wisc.edu:/u/j/u/justhsu/public/html-s/teaching/current/cs839
|
# DEPLOY=rockhopper-07.cs.wisc.edu:/u/j/u/justhsu/public/html-s/teaching/current/cs839
|
||||||
# DEPLOY=jackknife:/home/justhsu/html/staging/cs839/
|
# DEPLOY=jackknife:/home/justhsu/html/staging/cs839/
|
||||||
|
ARCHIVE=/u/j/u/justhsu/public/html-s/teaching/f18/cs839
|
||||||
|
|
||||||
|
|
||||||
build:
|
build:
|
||||||
make assets && mkdocs build
|
make assets && mkdocs build
|
||||||
@ -18,4 +21,11 @@ deploy:
|
|||||||
make build
|
make build
|
||||||
find . -type d -exec chmod a+rx {} \;
|
find . -type d -exec chmod a+rx {} \;
|
||||||
find . -type f -exec chmod a+r {} \;
|
find . -type f -exec chmod a+r {} \;
|
||||||
rsync -avzp --delete -e ssh ./site/ $(DEPLOY)
|
rsync -avzp --delete -e ssh ./site/ $(HOST):$(DEPLOY)
|
||||||
|
|
||||||
|
archive:
|
||||||
|
make build
|
||||||
|
find . -type d -exec chmod a+rx {} \;
|
||||||
|
find . -type f -exec chmod a+r {} \;
|
||||||
|
ssh $(HOST) mkdir -p $(ARCHIVE)
|
||||||
|
rsync -avzp --delete -e ssh ./site/ $(HOST):$(ARCHIVE)
|
||||||
|
@ -1,3 +1,12 @@
|
|||||||
# Final Projects
|
# Final Projects
|
||||||
|
|
||||||
To come!
|
- Yue Gao and Fayi Zhang. *Theory and Optimization of Homomorphic Encryption*.
|
||||||
|
- Yinglun Zhu. *Answering Evolving Sets of Queries*.
|
||||||
|
- Yan Nan and Shimaa Ahmed. *Private Voice Transcription*.
|
||||||
|
- Samuel Drews. *Verifying Decision Tree Stability*.
|
||||||
|
- Madeleine Berner and Yaman Yu. *Evaluate Adversarial Machine Learning Attacks
|
||||||
|
on Chinese Character Recognition*.
|
||||||
|
- Kyrie Zhou and Meghana Moorthy Bhat. *Detecting Fake News with NLP*.
|
||||||
|
- Hiba Nassereddine and Junxiong Huang. *Adversarial Machine Learning and Autonomous Vehicles*.
|
||||||
|
- Zichuan Tian and Arjun Kashyap. *pyDiff: Differential Privacy as a Library*.
|
||||||
|
- Zhiyi Chen and Yiqin Pan. *Detect Compromised Items from Data with Adversarial Attacks*.
|
||||||
|
Reference in New Issue
Block a user