Show HN: Yansu, Serious Coding
💻programming
Flag this post
Great, now even malware is using LLMs to rewrite its code, says Google, as it documents new phase of 'AI abuse'
💣Binary Exploitation
Flag this post
Low-Level Hacks
💣Binary Exploitation
Flag this post
Self-Attention: The Simple Mechanism That Made ChatGPT Possible
pub.towardsai.net·17h
⏱️Computational Complexity
Flag this post
Storage engine choices
💣Binary Exploitation
Flag this post
Real-Time Anomaly Detection in Pressure Sensitive Polymer Microfluidics via Bayesian Kalman Filtering
🔬Static Analysis
Flag this post
Moonshot AI releases Kimi K2 Thinking, an open-source agent model for complex reasoning
alternativeto.net·8h
⏱️Computational Complexity
Flag this post
My Hands-On Review of Kimi K2 Thinking: The Open-Source AI That's Changing the Game
🔄Dynamic Programming
Flag this post
Systematic Evaluation of Preprocessing Techniques for Accurate Image Registration in Digital Pathology
arxiv.org·17h
🎨Computer Graphics
Flag this post
How Serde Transforms Rust Data Serialization: Complete Performance and Safety Guide
🔬Static Analysis
Flag this post
We Tested 6 AI Models on 3 Advanced Security Exploits: The Results
💣Binary Exploitation
Flag this post
Computational Imaging Meets LLMs: Zero-Shot IDH Mutation Prediction in Brain Gliomas
arxiv.org·1d
🎨Computer Graphics
Flag this post
Epidemiology of Large Language Models: A Benchmark for Observational Distribution Knowledge
arxiv.org·1d
⏱️Computational Complexity
Flag this post
Loading...Loading more...