๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒŠ Audio Watermarks

Steganography, Copyright Protection, Inaudible Metadata, Signal Embedding

Digital Forensics Round-Up, September 03 2025
forensicfocus.comยท13h
๐ŸšจIncident Response
InfoSec News Nuggets 9/3/2025
aboutdfir.comยท19h
๐Ÿ›กCybersecurity
Mixxx 2.5.3 Released
mixxx.orgยท16hยท
Discuss: Hacker News
๐ŸŽต8-track Revival
Created my first bot today
dev.toยท9hยท
Discuss: DEV
๐Ÿ”งBinary Parsing
Invariant Features for Global Crop Type Classification
arxiv.orgยท29m
๐Ÿ“ŠLearned Metrics
AttenTrack: Mobile User Attention Awareness Based on Context and External Distractions
arxiv.orgยท1d
๐ŸงญContent Discovery
HyPV-LEAD: Proactive Early-Warning of Cryptocurrency Anomalies through Data-Driven Structural-Temporal Modeling
arxiv.orgยท29m
๐Ÿ”—Hash Chains
Speech Intelligibility Assessment with Uncertainty-Aware Whisper Embeddings and sLSTM
arxiv.orgยท29m
๐ŸŽ™๏ธWhisper
Unsupervised Identification and Replay-based Detection (UIRD) for New Category Anomaly Detection in ECG Signal
arxiv.orgยท1d
๐Ÿง Machine Learning
How Bitcoin Uses Hashes and Digital Signatures to Keep Transactions Honest
hackernoon.comยท22h
๐Ÿ”—Hash Chains
A Fluid Antenna Enabled Physical Layer Key Generation for Next-G Wireless Networks
arxiv.orgยท1d
๐ŸŒŠStream Ciphers
ANNIE: Be Careful of Your Robots
arxiv.orgยท29m
๐Ÿ”ฒCellular Automata
Warming Up for Zeroth-Order Federated Pre-Training with Low Resource Clients
arxiv.orgยท29m
๐Ÿ“ŠQuantization
Measuring cryptographic strength in liters of boiling water
johndcook.comยท1dยท
Discuss: Hacker News
๐ŸŒŠStream Ciphers
Continuous Saudi Sign Language Recognition: A Vision Transformer Approach
arxiv.orgยท29m
๐Ÿค–Advanced OCR
Augmented Shuffle Differential Privacy Protocols for Large-Domain Categorical and Key-Value Data
arxiv.orgยท1d
๐Ÿ›ก๏ธDifferential Privacy
Precision Microscopy Data Augmentation via Spectral Decomposition & Generative Adversarial Networks
dev.toยท2hยท
Discuss: DEV
๐Ÿ“„Document Digitization
Safe Sharing of Fast Kernel-Bypass I/O Among Nontrusting Applications
arxiv.orgยท29m
๐Ÿ”eBPF
HunyuanVideo-Foley: AI-Powered Foley Audio Generation for Video Creators
dev.toยท1dยท
Discuss: DEV
๐ŸŽงLearned Audio
Background Matters Too: A Language-Enhanced Adversarial Framework for Person Re-Identification
arxiv.orgยท29m
๐Ÿ“ŠLearned Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap