{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"MLEncrypt-Research","owner":"MLTransfer","isFork":false,"description":"Hyperparameter Optimization of Tree Parity Machines to Minimize the Effectiveness of Unconventional Attacks on Neural Cryptography​.","topicNames":["tensorflow","tensorboard","ray","neural-cryptography","neural-key-exchange","ray-tune","hyperparameter-optimization"],"topicsNotShown":0,"allTopics":["tensorflow","tensorboard","ray","neural-cryptography","neural-key-exchange","ray-tune","hyperparameter-optimization"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":9,"issueCount":2,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-26T21:30:56.601Z"}},{"type":"Public","name":"MLTransfer","owner":"MLTransfer","isFork":false,"description":"","topicNames":["tensorflow","neural-cryptography","neural-key-exchange"],"topicsNotShown":0,"allTopics":["tensorflow","neural-cryptography","neural-key-exchange"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":7,"issueCount":1,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-08T03:19:50.771Z"}}],"repositoryCount":2,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}