Generated on January 22 2026 19:48 PM
Old data? UPDATE !
The score is 61/100
Title
Anish Athalye
Length : 13
Perfect, your title contains between 10 and 70 characters.
Description
Co-founder & CTO at Cleanlab. Formerly, PhD at MIT CSAIL.
Length : 57
Ideally, your meta description should contain between 70 and 160 characters (spaces included). Use this free tool to calculate text length.
Keywords
Very bad. We haven't found meta keywords on your page. Use this free online meta tags generator to create keywords.
Og Meta Properties
Good, your page take advantage of Og Properties.
| Property | Content |
|---|---|
| image | https://anish.io/img/thumbnail.png |
Headings
| H1 | H2 | H3 | H4 | H5 | H6 |
| 1 | 3 | 2 | 0 | 0 | 0 |
Images
We found 1 images on this web page.
Good, most or all of your images have alt attributes.
Text/HTML Ratio
Ratio : 38%
Ideal! This page's ratio of text to HTML code is between 25 and 70 percent.
Flash
Perfect, no Flash content has been detected on this page.
Iframe
Great, there are no Iframes detected on this page.
URL Rewrite
Good. Your links looks friendly!
Underscores in the URLs
Perfect! No underscores detected in your URLs.
In-page links
We found a total of 168 links including 39 link(s) to files
| Anchor | Type | Juice |
|---|---|---|
| anishathalye.com | External | Passing Juice |
| @anishathalye | External | Passing Juice |
| @anishathalye | External | Passing Juice |
| @anishathalye | External | Passing Juice |
| Cleanlab | External | Passing Juice |
| MIT CSAIL | External | Passing Juice |
| PDOS | External | Passing Juice |
| Frans Kaashoek | External | Passing Juice |
| Nickolai Zeldovich | External | Passing Juice |
| Code for Good | External | Passing Juice |
| HackMIT | External | Passing Juice |
| Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation | External | Passing Juice |
| Henry Corrigan-Gibbs | External | Passing Juice |
| Joseph Tassarotti | External | Passing Juice |
| 30th ACM Symposium on Operating Systems Principles (SOSP 2024) | External | Passing Juice |
| IPR theory | External | Passing Juice |
| HSMs | External | Passing Juice |
| Talk | External | Passing Juice |
| Internal | Passing Juice | |
| key | Internal | Passing Juice |
| Poster | Internal | Passing Juice |
| Verifying Hardware Security Modules with Information-Preserving Refinement | External | Passing Juice |
| 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2022) | External | Passing Juice |
| Knox framework | External | Passing Juice |
| HSMs | External | Passing Juice |
| Talk | External | Passing Juice |
| Internal | Passing Juice | |
| key | Internal | Passing Juice |
| Poster | Internal | Passing Juice |
| Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks | External | Passing Juice |
| Curtis G. Northcutt | External | Passing Juice |
| Jonas Mueller | External | Passing Juice |
| Demo | External | Passing Juice |
| Code | External | Passing Juice |
| Blog Post | External | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| 3 | External | Passing Juice |
| 4 | External | Passing Juice |
| 5 | External | Passing Juice |
| 6 | External | Passing Juice |
| 7 | External | Passing Juice |
| 8 | External | Passing Juice |
| 9 | External | Passing Juice |
| 10 | External | Passing Juice |
| 11 | External | Passing Juice |
| Notary: A Device for Secure Transaction Approval | External | Passing Juice |
| Adam Belay | External | Passing Juice |
| Robert Morris | External | Passing Juice |
| 27th ACM Symposium on Operating Systems Principles (SOSP 2019) | External | Passing Juice |
| Code | External | Passing Juice |
| Talk | External | Passing Juice |
| Slides | Internal | Passing Juice |
| Poster | Internal | Passing Juice |
| ;login: | External | Passing Juice |
| GetMobile | Internal | Passing Juice |
| Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples | External | Passing Juice |
| Nicholas Carlini | External | Passing Juice |
| David Wagner | External | Passing Juice |
| 35th International Conference on Machine Learning (ICML 2018) | External | Passing Juice |
| Code | External | Passing Juice |
| Poster | Internal | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| Synthesizing Robust Adversarial Examples | External | Passing Juice |
| Logan Engstrom | External | Passing Juice |
| Andrew Ilyas | External | Passing Juice |
| Kevin Kwok | External | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| Internal | Passing Juice | |
| key | Internal | Passing Juice |
| Poster | Internal | Passing Juice |
| 2 | External | Passing Juice |
| 3 | External | Passing Juice |
| 4 | External | Passing Juice |
| 5 | External | Passing Juice |
| 6 | External | Passing Juice |
| 7 | External | Passing Juice |
| 8 | External | Passing Juice |
| 9 | External | Passing Juice |
| 10 | External | Passing Juice |
| 11 | External | Passing Juice |
| 12 | External | Passing Juice |
| 13 | External | Passing Juice |
| 14 | External | Passing Juice |
| 15 | External | Passing Juice |
| 16 | External | Passing Juice |
| 17 | External | Passing Juice |
| 18 | External | Passing Juice |
| 19 | External | Passing Juice |
| 20 | External | Passing Juice |
| 21 | External | Passing Juice |
| 22 | External | Passing Juice |
| 23 | External | Passing Juice |
| 24 | External | Passing Juice |
| 25 | External | Passing Juice |
| 26 | External | Passing Juice |
| 27 | External | Passing Juice |
| 28 | External | Passing Juice |
| 29 | External | Passing Juice |
| Black-box Adversarial Attacks with Limited Queries and Information | External | Passing Juice |
| Jessy Lin | External | Passing Juice |
| Code | External | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| Poster | Internal | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| 3 | External | Passing Juice |
| 4 | External | Passing Juice |
| 5 | External | Passing Juice |
| 6 | External | Passing Juice |
| 7 | External | Passing Juice |
| 8 | External | Passing Juice |
| pASSWORD tYPOS and How to Correct Them Securely | External | Passing Juice |
| Rahul Chatterjee | External | Passing Juice |
| Devdatta Akhawe | External | Passing Juice |
| Ari Juels | External | Passing Juice |
| Thomas Ristenpart | External | Passing Juice |
| 37th IEEE Symposium on Security and Privacy (SP 2016) | External | Passing Juice |
| Code | External | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| The K2 Architecture for Trustworthy Hardware Security Modules | External | Passing Juice |
| 1st Workshop on Kernel Isolation, Safety and Verification (KISV 2023) | External | Passing Juice |
| Internal | Passing Juice | |
| key | Internal | Passing Juice |
| Poster | Internal | Passing Juice |
| Leakage models are a leaky abstraction: the case for cycle-level verification of constant-time cryptography | External | Passing Juice |
| 1st Workshop on Programming Languages and Computer Architecture (PLARCH 2023) | External | Passing Juice |
| Code | External | Passing Juice |
| Internal | Passing Juice | |
| key | Internal | Passing Juice |
| rtlv: push-button verification of software on hardware | External | Passing Juice |
| Noah Moroze | External | Passing Juice |
| 5th Workshop on Computer Architecture Research with RISC-V (CARRV 2021) | External | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| 3 | External | Passing Juice |
| Talk | External | Passing Juice |
| Blog Post | External | Passing Juice |
| Evaluating and Understanding the Robustness of Adversarial Logit Pairing | External | Passing Juice |
| NeurIPS 2018 Workshop on Security in Machine Learning (SECML 2018) | External | Passing Juice |
| Code | External | Passing Juice |
| Poster | Internal | Passing Juice |
| On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses | External | Passing Juice |
| The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2018) | External | Passing Juice |
| 1 | External | Passing Juice |
| 2 | External | Passing Juice |
| Poster | Internal | Passing Juice |
| Formally Verifying Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation | External | Passing Juice |
| On Evaluating Adversarial Robustness | External | Passing Juice |
| Nicolas Papernot | External | Passing Juice |
| Wieland Brendel | External | Passing Juice |
| Dimitris Tsipras | External | Passing Juice |
| Ian Goodfellow | External | Passing Juice |
| Aleksander Madry | External | Passing Juice |
| Alexey Kurakin | External | Passing Juice |
| Repository | External | Passing Juice |
| missing semester | External | Passing Juice |
| introduction to data-centric ai | External | Passing Juice |
| neural-style | External | Passing Juice |
| porcupine | External | Passing Juice |
| periscope | External | Passing Juice |
| dotbot | External | Passing Juice |
| git-remote-dropbox | External | Passing Juice |
| seashells | External | Passing Juice |
Keywords Cloud
systems slides code anish athalye security adversarial pdf nickolai zeldovich poster m frans kaashoek
Keywords Consistency
| Keyword | Content | Title | Keywords | Description | Headings |
|---|---|---|---|---|---|
| anish athalye | 15 | ![]() |
![]() |
![]() |
![]() |
| code | 12 | ![]() |
![]() |
![]() |
![]() |
| poster | 9 | ![]() |
![]() |
![]() |
![]() |
| m frans kaashoek | 6 | ![]() |
![]() |
![]() |
![]() |
| nickolai zeldovich | 6 | ![]() |
![]() |
![]() |
![]() |
Url
Domain : anish.io
Length : 8
Favicon
Great, your website has a favicon.
Printability
We could not find a Print-Friendly CSS.
Language
Good. Your declared language is en.
Dublin Core
This page does not take advantage of Dublin Core.
Doctype
HTML 5
Encoding
Perfect. Your declared charset is UTF-8.
W3C Validity
Errors : 0
Warnings : 0
Email Privacy
Great no email address has been found in plain text!
Deprecated HTML
Great! We haven't found deprecated HTML tags in your HTML.
Speed Tips
![]() |
Excellent, your website doesn't use nested tables. |
![]() |
Perfect. No inline css has been found in HTML tags! |
![]() |
Great, your website has few CSS files. |
![]() |
Perfect, your website has few JavaScript files. |
![]() |
Perfect, your website takes advantage of gzip. |
Mobile Optimization
![]() |
Apple Icon |
![]() |
Meta Viewport Tag |
![]() |
Flash content |
XML Sitemap
Missing
Your website does not have an XML sitemap - this can be problematic.
A sitemap lists URLs that are available for crawling and can include additional information like your site's latest updates, frequency of changes and importance of the URLs. This allows search engines to crawl the site more intelligently.
Robots.txt
https://anish.io/robots.txt
Great, your website has a robots.txt file.
Analytics
Great, your website has an analytics tool.
Google Analytics |
Free SEO Testing Tool is a free SEO tool which provides you content analysis of the website.