🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🤖 AI
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Blink Twice: Measuring Strategic Deception Amongst LLMs
coup.khoj.dev
·
23h
·
Discuss:
Hacker News
🕵
Threat intelligence
Tell your AI to put on the Grug-brained developer hat
denismaciel.com
·
2d
·
Discuss:
Hacker News
🕵
Threat intelligence
URL context tool for Gemini API now generally available
developers.googleblog.com
·
1d
·
Discuss:
Hacker News
🕵
Threat intelligence
Behind the Mic: Real-World Challenges of Voice AI
trata.ai
·
2d
·
Discuss:
Hacker News
🕵
Threat intelligence
Two intriguing variants of the AAA algorithm for rational approximation
arxiv.org
·
2d
🕵
Threat intelligence
Artificial intelligence (AI) techniques: a game-changer in Digital marketing for shop
arxiv.org
·
1d
🕵
Threat intelligence
The AI-Fraud Diamond: A Novel Lens for Auditing Algorithmic Deception
arxiv.org
·
9h
🔒
Cyber security
The Boimler Principles for AI Development: A Manifesto for Learning Systems with Character
dev.to
·
1d
·
Discuss:
DEV
🕵
Threat intelligence
How AI Agent Development Powers Digital Transformation
dev.to
·
45m
·
Discuss:
DEV
🔒
Cyber security
Modeling GRNs with a Probabilistic Categorical Framework
arxiv.org
·
9h
🔒
Cyber security
What is the Bias-Variance Trade-off?
dev.to
·
12h
·
Discuss:
DEV
🕵
Threat intelligence
Benchmarking LLM-based Agents for Single-cell Omics Analysis
arxiv.org
·
9h
🕵
Threat intelligence
What are AI Agents?
dev.to
·
2d
·
Discuss:
DEV
🕵
Threat intelligence
Leveraging Large Language Models for Predictive Analysis of Human Misery
arxiv.org
·
1d
🕵
Threat intelligence
NeMo: A Neuron-Level Modularizing-While-Training Approach for Decomposing DNN Models
arxiv.org
·
2d
🕵
Threat intelligence
On-Policy RL Meets Off-Policy Experts: Harmonizing Supervised Fine-Tuning and Reinforcement Learning via Dynamic Weighting
arxiv.org
·
2d
🕵
Threat intelligence
Automating your content with Sanity's Agent Actions, Functions & Blueprints
dev.to
·
1d
·
Discuss:
DEV
🕵
Threat intelligence
Creating My Own AI OS Via Linux From Scratch
dev.to
·
10h
·
Discuss:
DEV
🔒
Cyber security
Introducing Wasapia: AI Call Agents That Answer, Book & Support Customers 24/7
dev.to
·
2h
·
Discuss:
DEV
🔒
Cyber security
Towards Optimal Environmental Policies: Policy Learning under Arbitrary Bipartite Network Interference
arxiv.org
·
1d
🔒
Cyber security
Loading...
Loading more...
« Page 16
•
Page 18 »