<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://hiruva.org/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/privacy/</loc><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/</loc><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://hiruva.org/courses/safe-inference/</loc><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/course-introduction/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/techniques-overview/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/large-models-overview/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/pre-reading/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/overview/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/intro-to-ml/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/red-teaming-llms/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/01-overview/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/dataset-poisoning/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/nanogpt-in-practice/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/red-teaming-rag/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/intro-to-differential-privacy/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/activations/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/02-tensors/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/a-simple-neural-network/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/adversarial-images/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/evaluations-reading/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/membership-inference-attacks/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/03-memory-safety/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/training-models-in-pytorch/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/stealing-model-weights/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/llm-safety-evaluations/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/federated-learning-attacks/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/04-operations-graphs/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/introduction-to-ml-exercises/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/optional-fgsm-attack-with-imagenet/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/transformers-and-llms-exercises/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/federated-learning-defences/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/05-graph-execution/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/adversarial-ml-exercises/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/differential-privacy-exercises/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/06-failure-attacks/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/07-hardening-runtime/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/08-engineering-tradeoffs/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/09-capstone/</loc><changefreq>weekly</changefreq><priority>0.7</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/01-overview/01-overview/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/02-tensors/02-tensors/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/03-memory-safety/03-memory-safety/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/04-operations-graphs/04-operations-graphs/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/05-graph-execution/05-graph-execution/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/06-failure-attacks/06-failure-attacks/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/07-hardening-runtime/07-hardening-runtime/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/08-engineering-tradeoffs/08-engineering-tradeoffs/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/safe-inference/lessons/09-capstone/09-capstone/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/differential-privacy-exercises/exercises/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/federated-learning-attacks/federated-learning-defences/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/intro-to-ml/intro-to-ml/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/course-introduction/course-introduction/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/large-models-overview/large-models-overview/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/overview/overview/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/pre-reading/pre-reading/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/red-teaming-llms/red-teaming-llms/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/techniques-overview/techniques-overview/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/activations/activations/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/dataset-poisoning/dataset-poisoning/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/intro-to-differential-privacy/intro-to-differential-privacy/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/red-teaming-rag/red-teaming-rag/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/nanogpt-in-practice/nanogpt-in-practice/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/a-simple-neural-network/a-simple-neural-network/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/adversarial-images/adversarial-images/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/evaluations-reading/evaluations-reading/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/membership-inference-attacks/membership-inference-attacks/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/llm-safety-evaluations/llm-safety-evaluations/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/stealing-model-weights/stealing-model-weights/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/training-models-in-pytorch/training-models-in-pytorch/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/optional-fgsm-attack-with-imagenet/optional-fgsm-attack-with-imagenet/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/transformers-and-llms-exercises/exercises/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/introduction-to-ml-exercises/exercises/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://hiruva.org/courses/ai-security-principles-practice/lessons/adversarial-ml-exercises/exercises/</loc><changefreq>weekly</changefreq><priority>0.6</priority></url>
</urlset>
