Escaping an Abusive Household
๐ขmathematics
Flag this post
Obsidian for studying
๐ขmathematics
Flag this post
Keynote: Supply Chain Reaction: A Cautionary Tale in K8s Security - S. Potter & A.G. Veytia
youtube.comยท6h
๐open source
Flag this post
Vitalls: Setting a new global benchmark for privacy and security in digital health
zawya.comยท9h
๐ขmathematics
Flag this post
Show HN: General Intelligence โ Active knowledge framework for machine learning
๐open source
Flag this post
AI's Impact on Social Psychology: Ethical Guardrails Matter
psychologytoday.comยท1d
๐ขmathematics
Flag this post
๐ฅ Tech Talks Weekly #82
techtalksweekly.ioยท2h
๐open source
Flag this post
Undissolvable Problems: things that still confuse me
lesswrong.comยท3h
๐ขmathematics
Flag this post
MT-HuBERT: Self-Supervised Mix-Training for Few-Shot Keyword Spotting in Mixed Speech
arxiv.orgยท1d
๐open source
Flag this post
The Builder's Notes: Your CFO Just Called โ Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.netยท2d
๐open source
Flag this post
The Future of AI-Powered Security
๐open source
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.comยท23h
๐open source
Flag this post
InteractiveAdvertisingBureau/openrtb2.x
github.comยท17h
๐open source
Flag this post
Comprehensive theory of the Lamb shift in light muonic atoms
link.aps.orgยท2h
๐ขmathematics
Flag this post
Coherence Mechanisms for Provable Self-Improvement
arxiv.orgยท14h
๐ขmathematics
Flag this post
Any-Depth Alignment: Unlocking Innate Safety Alignment of LLMs to Any-Depth
๐open source
Flag this post
Automated Anomaly Detection in Blockchain Transactions via Adversarial Graph Neural Networks (AGNN)
๐ขmathematics
Flag this post
Loading...Loading more...