Six Ways To Use Khipu To See And Solve Network Problems
labs.ripe.netยท23h
๐กNetwork Protocol Design
Flag this post
Bambulab P2S
๐Document Digitization
Flag this post
Nearly 180k records exposed in billing platform breach - hereโs what we know
techradar.comยท1d
๐๏ธDatabase Forensics
Flag this post
Data Poison in LLMs: A Fixed Number of Poisoned Documents Suffices for an Attack
heise.deยท1d
๐Cryptographic Archaeology
Flag this post
How could you authorize devs to change images tags but not limits ?
๐ฆContainer Security
Flag this post
Self-improving language models are becoming reality with MIT's updated SEAL technique
๐ปLocal LLMs
Flag this post
Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer
unit42.paloaltonetworks.comยท1d
๐ซKerberos Attacks
Flag this post
Show HN: I've built a prototype for a physical e-ink todo list with voice input
๐๏ธWhisper
Flag this post
Answer-Consistent Chain-of-thought Reinforcement Learning For Multi-modal Large Langauge Models
arxiv.orgยท2d
๐Constraint Handling
Flag this post
3 Pitfalls Most Developers Fall Into When Using AI for Code, and How I Fix Them with Crevo
๐Language Evolution
Flag this post
Neural variational inference for cutting feedback during uncertainty propagation
arxiv.orgยท2d
๐Quantization
Flag this post
90% of Software Engineers Building with LLMs Are Still Writing Unit Tests
๐Concolic Testing
Flag this post
Loading...Loading more...