- Sort Score
- Result 10 results
- Languages All
Results 1 - 1 of 1 for recommended (0.33 sec)
-
SECURITY.md
## Reporting vulnerabilities ### Vulnerabilities in TensorFlow This document covers different use cases for TensorFlow together with comments whether these uses were recommended or considered safe, or where we recommend some form of isolation when dealing with untrusted data. As a result, this document also outlines what issues we consider as TensorFlow security vulnerabilities.
Plain Text - Registered: Tue May 07 12:40:20 GMT 2024 - Last Modified: Sun Oct 01 06:06:35 GMT 2023 - 9.6K bytes - Viewed (0)