🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤖 AI
Smooth Minimum for Signed Distance Fields (2013)
iquilezles.org·1d·
Discuss: Hacker News
🔒Cyber security
Fine-Tuning ResNet-18 with TensorFlow Model Garden for CIFAR-10 Classification
hackernoon.com·3d
🕵Threat intelligence
Yet another algorithmic bias: A Discursive Analysis of Large Language Models Reinforcing Dominant Discourses on Gender and Race
arxiv.org·1d
🕵Threat intelligence
LeanRAG: Knowledge-Graph-Based Generation with Semantic Aggregation and Hierarchical Retrieval
arxiv.org·1d
🕵Threat intelligence
Neural Network-Based Detection and Multi-Class Classification of FDI Attacks in Smart Grid Home Energy Systems
arxiv.org·1d
🕵Threat intelligence
When AI Fights Back: The Next Decade of Digital Security
dev.to·1d·
Discuss: DEV
🕵Threat intelligence
AI with a Purpose: Automating Marketing for Small Teams & Side Hustles
dev.to·1d·
Discuss: DEV
🕵Threat intelligence
The AI That Sees Better Than Us Is Here, And It’S Open Source
dev.to·3d·
Discuss: DEV
🕵Threat intelligence
Jeff Su: The AI Agent Tutorial That Should've Been Your First (no code)
dev.to·3d·
Discuss: DEV
🕵Threat intelligence
How I Built a Codebase-Wide AI Memory That Scales With My Repo
dev.to·1d·
Discuss: DEV
🕵Threat intelligence
Accelerated SQL Query Optimization via Hybrid Evolutionary-Reinforcement Learning
dev.to·15h·
Discuss: DEV
🕵Threat intelligence
ACC Cards Generator with Google AI Studio
dev.to·1d·
Discuss: DEV
🔒Cyber security
AI's Serious Python Bias: Concerns of LLMs Preferring One Language
medium.com·1d·
Discuss: Hacker News
🕵Threat intelligence
How to Tame Your AI Agents: From $900 in 18 Days to Coding Smarter
dev.to·3d·
Discuss: DEV
🔒Cyber security
STELAR-VISION: Self-Topology-Aware Efficient Learning for Aligned Reasoning in Vision
arxiv.org·3d
🕵Threat intelligence
Improving watermelon (Citrullus lanatus) disease classification with generative artificial intelligence (GenAI)-based synthetic and real-field images via a cust...
arxiv.org·1d
🕵Threat intelligence
Hyper-Personalized Insurance Risk Assessment via Attentive Graph Neural Networks
dev.to·10h·
Discuss: DEV
🕵Threat intelligence
Provably Transformers Harness Multi-Concept Word Semantics for Efficient In-Context Learning
arxiv.org·2d
🕵Threat intelligence
Automated Bio-Reactor Optimization via Multi-Modal Deep Learning for Enhanced Human Brain Organoid Maturation
dev.to·2d·
Discuss: DEV
🕵Threat intelligence
Real-Time Anomaly Detection in Wind Turbine Gearboxes via Spectral Graph Neural Networks
dev.to·15h·
Discuss: DEV
🔒Cyber security
Loading...Loading more...
AboutBlogChangelogRoadmap