๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒŠ Audio Watermarks

Steganography, Copyright Protection, Inaudible Metadata, Signal Embedding

Judge certifies class against Anthropic for copyright infringement
dailyjournal.comยท12hยท
Discuss: Hacker News
๐ŸบZIP Archaeology
Pink Floppy Disc and The Bitles: Embracing the future of AI music
newscientist.comยท1d
๐Ÿ’ฟFLAC Archaeology
We Built a Conspiracy Mapping Tool Inspired by the Artist Who Had the FBI Knock
whalehunting.projectbrazen.comยท16hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Undone Computer Science
undonecs.orgยท1dยท
Discuss: Hacker News, r/compsci
๐ŸŒCultural Algorithms
IndexTTS2: Emotional duration-controlled autoregressive zero-shot text-to-speech
index-tts.github.ioยท4dยท
Discuss: Hacker News
๐ŸŽงLearned Audio
Apple sues Jon Prosser for his iOS 26 YouTube leaks, Prosser responds
9to5mac.comยท10hยท
Discuss: Hacker News
๐ŸŽApple Archive
What Happens When AI Starts Writing Your APIs?
devops.comยท5h
โš™๏ธTLA+
W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท4d
๐Ÿ”Cryptographic Archaeology
The Shame of โ€œAlligator Alcatrazโ€
newyorker.comยท17h
โญAwesome lists
Outlier Detection in Machine Learning: Catching the Data That Doesnโ€™t Fit
dev.toยท10hยท
Discuss: DEV
๐Ÿง Machine Learning
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท2d
๐Ÿ”“Password Cracking
Secure and Efficient UAV-Based Face Detection via Homomorphic Encryption and Edge Computing
arxiv.orgยท3d
๐Ÿ”Homomorphic Encryption
[P] Building a VTON model from scratch, any advice?
reddit.comยท19hยท
Discuss: r/MachineLearning
๐ŸŒˆHolographic Storage
Less Stress, More Privacy: Stress Detection on Anonymized Speech of Air Traffic Controllers
arxiv.orgยท3d
๐Ÿ“ŠQuantization
A Minimal DDPM
github.comยท2dยท
Discuss: Hacker News
๐Ÿง Machine Learning
Contrastive-KAN: A Semi-Supervised Intrusion Detection Framework for Cybersecurity with scarce Labeled Data
arxiv.orgยท2d
๐Ÿง Machine Learning
Chinese hackers hit Taiwan semiconductor manufacturing in spear phishing campaign
techradar.comยท20h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
From Novelty to Imitation: Self-Distilled Rewards for Offline Reinforcement Learning
arxiv.orgยท12h
๐Ÿ“ŠLearned Metrics
4 Chinese APTs Attack Taiwan's Semiconductor Industry
darkreading.comยท15h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Efficient Adaptation of Pre-trained Vision Transformer underpinned by Approximately Orthogonal Fine-Tuning Strategy
arxiv.orgยท12h
๐Ÿง Neural Codecs
Loading...Loading more...
AboutBlogChangelogRoadmap