Audio Signal Processing Using Time Domain Mel-Frequency Wavelet Coefficient
arxiv.orgยท2d
๐ŸŒŠAudio Wavelets
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐Ÿ•ต๏ธSteganographic Archives
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
Adobeโ€™s experimental AI tool can edit entire videos using one frame
theverge.comยท6h
๐ŸงชArchive Fuzzing
Flag this post
Linear Audio Dreams: Injecting Sanity into Autoencoder Latent Spaces by Arvind Sundararajan
dev.toยท3dยท
Discuss: DEV
๐ŸŽงLearned Audio
Flag this post
Know Audio: Lossy Compression Algorithms And Distortion
hackaday.comยท3d
๐ŸŽตAudio Codecs
Flag this post
Why wavelets is a bad choice for image coding
codecs.multimedia.cxยท1d
๐Ÿ“ŠRate-Distortion Theory
Flag this post
The internet was made for privacy
doctorow.medium.comยท7h
๐ŸงฒMagnetic Philosophy
Flag this post
AI music platform Udio and Universal Music strike a dealโ€”is this AI music's Spotify moment?
techradar.comยท5h
๐Ÿ’ฟFLAC Archaeology
Flag this post
Voice-Controlled Security Door Lock using ESP32 + Face
hackster.ioยท1d
๐Ÿ Home Automation
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.comยท2d
๐ŸŽซKerberos Attacks
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท9h
๐Ÿ›ก๏ธeBPF Security
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netยท5hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
How Composers Make Horror Movie Music Sound Terrifying
scientificamerican.comยท12h
๐ŸŽตMusic Universality
Flag this post
Stochastic computing
scottlocklin.wordpress.comยท7h
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท1d
๐Ÿ”—Binary Similarity
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท6h
๐Ÿ”“Hacking
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท17h
๐Ÿ”Hash Functions
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท20h
๐Ÿ”’Language-based security
Flag this post