🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎵 Audio Fingerprinting

Shazam Algorithm, Spectral Hashing, Music Information Retrieval, Acoustic Matching

Combolutional Neural Networks
arxiv.org·10h
🎧Learned Audio
Your Signal, Their Data: Privacy Analysis of Wireless-Scanning SDKs in Android
dspace.networks.imdea.org·18h·
Discuss: Hacker News
📦Container Security
AVIF: The Avian Image Format
hackaday.com·9h
🎧Vorbis Encoding
Where Are They Now? Semi-Loved Recordable DVD/CDs Get Tested (Part 2)
goughlui.com·2h
💿Optical Media
Symbolic-numeric programming in scientific computing
dspace.mit.edu·10h
🧬Functional Programming
Two Birds with One Tone: I/Q Signals and Fourier Transform
wirelesspi.com·15h·
Discuss: Hacker News
📡Frequency Archaeology
The Dating App Breach That Turned Into a Biometric Black Mirror Episode
hackernoon.com·8h
🔗Data Provenance
Hunt for Weak Spots in Your Wireless Network with Airodump-ng from the Aircrack-ng Suite
blackhillsinfosec.com·40m
📡Network Monitoring
Using hierarchical modeling to get more stable rankings of gene expression
statmodeling.stat.columbia.edu·59m
🌸Bloom Variants
Extensions and Shadows (8)
sites.psu.edu·1d
🧮Kolmogorov Bounds
WaveVerify: A Novel Audio Watermarking Framework for Media Authentication and Combatting Deepfakes
arxiv.org·10h
🌊Audio Watermarks
The sound of drums that tile the plane
johndcook.com·1d
🎼Audio Lambda Calculus
Embeddings & Cosine Similarity Explained Simply
dev.to·1d·
Discuss: DEV
📐Vector Similarity
Cobalt Strike Beacon delivered via GitHub and social media
securelist.com·5h
🎫Kerberos Exploitation
Show HN: Podly – From podcast listening to podcast learning (Obsidian for audio)
trypodly.com·2h·
Discuss: Hacker News
📰RSS Archaeology
A Study on Variants of Conventional, Fuzzy, and Nullspace-Based Independence Criteria for Improving Supervised and Unsupervised Learning
arxiv.org·10h
🧠Machine Learning
Subliminal Learning: Language models transmit behavioral traits via hidden
arxiviq.substack.com·23h·
Discuss: Substack
🤖Grammar Induction
Build Custom ActiveStorage Analyzers for Ruby on Rails
blog.appsignal.com·4h·
Discuss: Hacker News
🏺ZIP Archaeology
NIST Post-Quantum Cryptography Standard Algorithms Based on Quantum Random Number Generators
arxiv.org·10h
🔐Quantum Cryptography
Compressed Sensing
en.wikipedia.org·1d·
Discuss: Hacker News
📐Compression Mathematics
Loading...Loading more...
AboutBlogChangelogRoadmap