๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”Š Acoustic Forensics

Sound Authentication, Audio Evidence, Historical Voice Recovery, Frequency Analysis

A Submersible Uncovered Secret Structures. Then, It Vanished Under Antarctic Waters.
popularmechanics.comยท9h
๐ŸงŠArctic Storage
Podcast Rewind: Upgrading from a 2012 Mac mini Server, Every Phone Weโ€™ve Ever Owned, and Seeing F1: The Movie in IMAX
macstories.netยท7h
๐ŸŽApple Archive
Protect now, reveal later: a scalable Time-Lock Puzzle solution
benthamsgaze.orgยท14h
๐ŸŒŠStream Ciphers
Study Finds Link Between Brain Injury and Criminal Behavior
news.cuanschutz.eduยท1dยท
Discuss: Hacker News
๐Ÿ”Cassette Forensics
AI Security Risks: When Models Lie, Blackmail, and Refuse to Shut Down
lmgsecurity.comยท1d
๐ŸŽฏThreat Hunting
Cybercriminals Abuse Open-Source Tools To Target Africaโ€™s Financial Sector
unit42.paloaltonetworks.comยท3d
๐ŸŽซKerberos Exploitation
Book Review: Developing Talent in Young People by Benjamin Bloom
justinmath.comยท17hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Many small evals beat one big eval, for AI Products
getkiln.aiยท8hยท
Discuss: Hacker News
๐Ÿ”Concolic Testing
Sony tests beta version for image authentication
heise.deยท1d
๐Ÿ‘๏ธOCR Verification
This Ring indoor camera helps me spot my cat's calamities โ€“ and you should look for it this Prime Day
techradar.comยท5h
๐ŸŽฏThreat Hunting
Leveraging LLM-Assisted Query Understanding for Live Retrieval-Augmented Generation
arxiv.orgยท20h
๐Ÿ”Information Retrieval
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.comยท2d
๐ŸŽซKerberos Exploitation
IMC-PINN-FE: A Physics-Informed Neural Network for Patient-Specific Left Ventricular Finite Element Modeling with Image Motion Consistency and Biomechanical Par...
arxiv.orgยท20h
๐ŸŒ€Riemannian Computing
Pay Less Attention to Deceptive Artifacts: Robust Detection of Compressed Deepfakes on Online Social Networks
arxiv.orgยท1d
๐Ÿค–Advanced OCR
AI Agent Architecture and the Autonomous Enterprise
dev.toยท13hยท
Discuss: DEV
โš™๏ธTLA+
Developing AI-Powered Applications with LLMs on Google Cloud
dev.toยท12hยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Object-aware Sound Source Localization via Audio-Visual Scene Understanding
arxiv.orgยท3d
๐Ÿ‘‚Psychoacoustic Coding
Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals
arxiv.orgยท3d
๐Ÿง Machine Learning
Biomed-Enriched: A Biomedical Dataset Enriched with LLMs for Pretraining and Extracting Rare and Hidden Content
arxiv.orgยท1d
๐Ÿ”Information Retrieval
How to Create Secure AI Applications
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Language-based security
Loading...Loading more...
AboutBlogChangelogRoadmap