๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒŠ Audio Watermarks

Steganography, Copyright Protection, Inaudible Metadata, Signal Embedding

Review: EarFun Air Pro 3 Hybrid Active Noise Cancelling True Wireless Earbuds
goughlui.comยท1d
๐Ÿ‘‚Psychoacoustics
Hacking AI Agentsโ€”How Malicious Images and Pixel Manipulation Threaten Cybersecurity
scientificamerican.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Thinkspot Is Closing Down
thinkspot.comยท21hยท
Discuss: Hacker News
๐Ÿ Personal Archives
New infostealer malware snaps webcam photos when you watch porn
techspot.comยท13hยท
Discuss: r/technews
๐Ÿš€Indie Hacking
The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks
dev.toยท3dยท
Discuss: DEV
๐Ÿ•ต๏ธVector Smuggling
Speech Command Recognition Using LogNNet Reservoir Computing for Embedded Systems
arxiv.orgยท2d
๐ŸŽตAudio ML
Dynamic Photoacoustic Hemoglobin Quantification via Frequency-Modulated Pulsed Illumination
dev.toยท5hยท
Discuss: DEV
๐Ÿ”ฌOptical Physics
How to Ruin Your Weekend: Building a DIY EDR
infosecwriteups.comยท18h
๐Ÿ”eBPF
Boosting Your Anomaly Detection With LLMs
towardsdatascience.comยท1d
๐Ÿ’ปLocal LLMs
PARCO: Phoneme-Augmented Robust Contextual ASR via Contrastive Entity Disambiguation
arxiv.orgยท20h
๐ŸŽ™๏ธWhisper
A Comprehensive Guide to Differential Privacy: From Theory to User Expectations
arxiv.orgยท1d
๐Ÿ›ก๏ธDifferential Privacy
Generalized Golub-Kahan bidiagonalization for generalized saddle point systems
arxiv.orgยท1d
๐Ÿ“Linear Algebra
MobileNetV1 Paper Walkthrough: The Tiny Giant
towardsdatascience.comยท1d
โง—Information Bottleneck
Hackaday Podcast Episode 336: DIY Datasette, Egg Cracking Machine, and Screwing 3D Prints
hackaday.comยท8h
๐ŸงชCassette Hacks
WaveLLDM: Design and Development of a Lightweight Latent Diffusion Model for Speech Enhancement and Restoration
arxiv.orgยท4d
๐ŸŽตAudio ML
Odeta Rose- 404: Crime Not Found
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Hacking
Recall Gabor Communication Theory and Joint Time-Frequency Analysis
arxiv.orgยท1d
๐ŸŒˆSpectral Methods
Real-time Object Detection and Associated Hardware Accelerators Targeting Autonomous Vehicles: A Review
arxiv.orgยท20h
๐ŸฆพARM Cortex-M
The 'Swiss army knife' of malware emerges - Hook v3 can do ransomware, keylogging, DDoS, screen capture, and far more
techradar.comยท1d
๐Ÿ”“Hacking
AutoDetect: Designing an Autoencoder-based Detection Method for Poisoning Attacks on Object Detection Applications in the Military Domain
arxiv.orgยท1d
๐Ÿ”Vector Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap