Recent Posts

In Raw Numpy: t-SNE

This is the first post in the In Raw Numpy series. This series is an attempt to provide readers (and myself) with an understanding of some of the most freque...

Adversarial Neural Cryptography in Theano

Last week I read Abadi and Andersen’s recent paper [1], Learning to Protect Communications with Adversarial Neural Cryptography. I thought the idea seemed pr...