Escaping an Abusive Household
๐ขmathematics
Flag this post
Obsidian for studying
๐ขmathematics
Flag this post
Keynote: Supply Chain Reaction: A Cautionary Tale in K8s Security - S. Potter & A.G. Veytia
youtube.comยท6h
๐open source
Flag this post
<p>**Abstract:** This paper proposes a novel approach to verifying the Bogaev conjectureโspecifically, confirming the existence of periodic functions generated ...
freederia.comยท1d
๐ขmathematics
Flag this post
Show HN: General Intelligence โ Active knowledge framework for machine learning
๐open source
Flag this post
Cyberattackers are getting more evasive: How can defenders keep up?
siliconrepublic.comยท2d
๐open source
Flag this post
AI's Impact on Social Psychology: Ethical Guardrails Matter
psychologytoday.comยท1d
๐ขmathematics
Flag this post
๐ฅ Tech Talks Weekly #82
techtalksweekly.ioยท2h
๐open source
Flag this post
Undissolvable Problems: things that still confuse me
lesswrong.comยท3h
๐ขmathematics
Flag this post
The Future of AI-Powered Security
๐open source
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.comยท23h
๐open source
Flag this post
InteractiveAdvertisingBureau/openrtb2.x
github.comยท17h
๐open source
Flag this post
Comprehensive theory of the Lamb shift in light muonic atoms
link.aps.orgยท2h
๐ขmathematics
Flag this post
Coherence Mechanisms for Provable Self-Improvement
arxiv.orgยท14h
๐ขmathematics
Flag this post
Any-Depth Alignment: Unlocking Innate Safety Alignment of LLMs to Any-Depth
๐open source
Flag this post
Integrating FinTech Analytics and Cybersecurity for U.S. Consumer Protection and Financial Fraud Prevention
๐ขmathematics
Flag this post
Loading...Loading more...