Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.toยท2dยท
Discuss: DEV
๐Ÿ‘๏ธPerceptual Hashing
The Electret Preamp You Might Need
hackaday.comยท17m
๐Ÿ’ฟFLAC Archaeology
ACMID: Automatic Curation of Musical Instrument Dataset for 7-Stem Music Source Separation
arxiv.orgยท1d
๐ŸŽตAudio Formats
The Day I Hacked XCTrack
blog.syrac.orgยท17hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
High-Tech Sensors Expose the Secret Tricks of Piano Masters
scitechdaily.comยท1d
๐ŸŒˆSpectral Audio
An enough week
blog.mitrichev.chยท1dยท
๐Ÿ“ˆLinear programming
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics
YouTube gets ~5% CTR lift on Shorts by replacing embedding tables with Semantic IDs
shaped.aiยท1d
๐Ÿ“ŠFeed Optimization
Show HN: Nanowakeword โ€“ Automates custom wake word model training
github.comยท20hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
A gentle introduction to Generative AI: Historical perspective
medium.comยท7hยท
Discuss: Hacker News
๐Ÿง Learned Codecs
Detecting and Mitigating Insertion Hallucination in Video-to-Audio Generation
arxiv.orgยท1d
๐Ÿ‘๏ธPerceptual Coding
Automated Spectral Fingerprint Deconvolution for Polymer Identification via Deep Oligomer Networks
dev.toยท7hยท
Discuss: DEV
๐ŸŒˆSpectroscopy
Creating Real-Time Multimodal AI Pipelines: Scaling File Processing to 50M Daily Uploads
engineering.salesforce.comยท8h
๐ŸŒŠStream Processing
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Sorting encrypted data without decryption: a practical trick
dev.toยท17hยท
Discuss: DEV
๐Ÿ”Hash Functions
Audio-Visual Separation with Hierarchical Fusion and Representation Alignment
arxiv.orgยท1d
๐Ÿ’ฟFLAC Archaeology
Randomized and quantum approximate matrix multiplication
arxiv.orgยท1d
๐Ÿ”Quantum Cryptography
Gravitational Wave Anomaly Detection via Optimized Fourier-Phase Analysis
dev.toยท17hยท
Discuss: DEV
๐Ÿ“กFrequency Archaeology
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.toยท4hยท
Discuss: DEV
๐Ÿ”Vector Forensics