🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”Š Acoustic Forensics

Sound Authentication, Audio Evidence, Historical Voice Recovery, Frequency Analysis

Hackers exploit Microsoft flaw to breach Canada ’s House of Commons
securityaffairs.comΒ·10h
πŸ”“Hacking
For Some Patients, the β€˜Inner Voice’ May Soon Be Audible
nytimes.comΒ·19hΒ·
Discuss: Hacker News
πŸ‘‚Audio Evidence
Finding clarity in the noise: New approach recovers hidden signals at the nanoscale
phys.orgΒ·1d
🧲Magnetic Resonance
A Neurosymbolic Framework for Interpretable Cognitive Attack Detection in Augmented Reality
arxiv.orgΒ·1d
πŸ”Vector Forensics
Using Large Language Models to Measure Symptom Severity in Patients At Risk for Schizophrenia
arxiv.orgΒ·6h
πŸŽ™οΈWhisper
An Unsupervised Deep XAI Framework for Localization of Concurrent Replay Attacks in Nuclear Reactor Signals
arxiv.orgΒ·1d
πŸ”Vector Forensics
EGGCodec: A Robust Neural Encodec Framework for EGG Reconstruction and F0 Extraction
arxiv.orgΒ·2d
πŸ‘‚Psychoacoustic Coding
β€œMy biggest lesson was realizing that domain expertise matters more than algorithmic complexity.β€œ
towardsdatascience.comΒ·20h
🌍Cultural Algorithms
Improving the Speaker Anonymization Evaluation's Robustness to Target Speakers with Adversarial Learning
arxiv.orgΒ·1d
πŸ›‘οΈDifferential Privacy
Advanced Wear Characterization via Multi-Scale Bayesian Optimization of Surface Texturing
dev.toΒ·3hΒ·
Discuss: DEV
βš™οΈTape Engineering
Stress Detection from Multimodal Wearable Sensor Data
arxiv.orgΒ·6h
πŸ“ˆMutual Information
LaajMeter: A Framework for LaaJ Evaluation
arxiv.orgΒ·6h
🧠Intelligence Compression
Automated Anomaly Detection in Ghost Imaging via Multi-Modal Data Fusion and Bayesian Inference
dev.toΒ·2dΒ·
Discuss: DEV
πŸ’ΏOptical Forensics
Could your voice reveal cancer before you know it? Scientists say AI might soon make it possible
euronews.comΒ·3d
πŸ‘‚Audio Evidence
CLUE: Leveraging Low-Rank Adaptation to Capture Latent Uncovered Evidence for Image Forgery Localization
arxiv.orgΒ·3d
πŸ”Vector Forensics
Enterprise Turns To AI For Speed And Accuracy In DFIR
forensicfocus.comΒ·19h
🚨Incident Response
CrossDenoise: Denoising Implicit Feedback via a Lightweight Entity-Aware Synergistic Framework
arxiv.orgΒ·6h
πŸ”Information Retrieval
Show HN: CCCP – a programmable, context-aware compression protocol (early stage)
github.comΒ·15hΒ·
Discuss: Hacker News
🌊Streaming Compression
Learning to Detect Unknown Jailbreak Attacks in Large Vision-Language Models: A Unified and Accurate Approach
arxiv.orgΒ·1d
🦾ARM Cortex-M
Adaptive Hierarchical Clustering via Dynamic Spectral Embedding Optimization
dev.toΒ·1hΒ·
Discuss: DEV
🌊Spectral Clustering
Loading...Loading more...
AboutBlogChangelogRoadmap