๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿค– AI
Blocky Planet โ€“ Making Minecraft Spherical
bowerbyte.comยท12hยท
Discuss: Hacker News
๐Ÿ”’Cyber security
CZI Launches RBio: Reasoning Model Trained on Virtual Cell Simulations
chanzuckerberg.comยท4dยท
Discuss: Hacker News
๐Ÿ”’Cyber security
Everyday hacks to practice American English
aishwaryagoel.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Cyber security
ChatLoopBackOff: Episode 67 (Kserve)
youtube.comยท4d
๐Ÿ”’Cyber security
OpenAI warns against SPVs and other โ€˜unauthorizedโ€™ investments
techcrunch.comยท2d
๐Ÿ•ตThreat intelligence
Deal to get ChatGPT Plus for whole of UK discussed by Open AI boss and minister
theguardian.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Cyber security
Elon Musk says he wants to 'simulate' software companies like Microsoft 'purely' with AI. He's calling it 'Macrohard.'
businessinsider.comยท3dยท
Discuss: Hacker News
๐Ÿ•ตThreat intelligence
[D] PhD vs startup/industry for doing impactful AI research โ€” what would you pick?
reddit.comยท4dยท
Discuss: r/MachineLearning
๐Ÿ•ตThreat intelligence
R-ConstraintBench: Evaluating LLMs on NP-Complete Scheduling
arxiv.orgยท4d
๐Ÿ”’Cyber security
Curriculum Approximate Unlearning for Session-based Recommendation
arxiv.orgยท4d
๐Ÿ•ตThreat intelligence
The OCR Model That Outranks GPT-4o
dev.toยท3dยท
Discuss: DEV
๐Ÿ•ตThreat intelligence
LLMs Are Biased Here's Why Enterprises Can't Afford to Just Plug and Pray
viveksgag.substack.comยท2dยท
Discuss: Substack
๐Ÿ•ตThreat intelligence
Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder
arxiv.orgยท6d
๐Ÿ•ตThreat intelligence
Efficient Constraint-Aware Flow Matching via Randomized Exploration
arxiv.orgยท6d
๐Ÿ”’Cyber security
Depth-Breadth Synergy in RLVR: Unlocking LLM Reasoning Gains with Adaptive Exploration
arxiv.orgยท6d
๐Ÿ•ตThreat intelligence
RISE: Enhancing VLM Image Annotation with Self-Supervised Reasoning
arxiv.orgยท6d
๐Ÿ•ตThreat intelligence
๐๐ž๐ฒ๐จ๐ง๐ ๐…๐ซ๐ž๐ฌ๐ก๐ง๐ž๐ฌ๐ฌ: ๐‡๐จ๐ฐ ๐ญ๐จ ๐ฎ๐ฌ๐ž ๐’๐ž๐š๐ซ๐œ๐ก ๐Œ๐จ๐๐ž๐ฌ ๐ข๐ง ๐•๐ž๐œ๐ญ๐จ๐ซ ๐ƒ๐š๐ญ๐š๐›๐š๐ฌ๐ž๐ฌ (๐ฐ๐ข๐ญ๐ก ๐‹๐š๐ง๐ ๐œ๐ก๐š๐ข๐ง)
dev.toยท2dยท
Discuss: DEV
๐Ÿ”’Cyber security
Fracture Detection and Localisation in Wrist and Hand Radiographs using Detection Transformer Variants
arxiv.orgยท5d
๐Ÿ”’Cyber security
A comparative study of some wavelet and sampling operators on various features of an image
arxiv.orgยท5d
๐Ÿ•ตThreat intelligence
Correlations Are Ruining Your Gradient Descent
arxiv.orgยท6d
๐Ÿ•ตThreat intelligence
Loading...Loading more...
AboutBlogChangelogRoadmap