Speakers
dcc.ac.uk·2d
💿FLAC Archaeology
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.com·3d
🎫Kerberos Attacks
Flag this post
Chopdi AI
📄Document Streaming
Flag this post
Plan for Learning, Not Certainty
💾Persistence Strategies
Flag this post
[D] Realized I like the coding and ML side of my PhD way more than the physics
🏴Scottish Computing
Flag this post
Budgeted Multiple-Expert Deferral
arxiv.org·1d
📐Linear Algebra
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·1d
🔒Language-based security
Flag this post
Distributional Multi-objective Black-box Optimization for Diffusion-model Inference-time Multi-Target Generation
arxiv.org·1d
🧠Machine Learning
Flag this post
My 12-Year Journey with Bahasa Melayu Wikimedia Projects
diff.wikimedia.org·1d
🌍Cultural Computing
Flag this post
Aembit Introduces Identity And Access Management For Agentic AI
hackernoon.com·1d
🔓Hacking
Flag this post
FairJudge: MLLM Judging for Social Attributes and Prompt Image Alignment
arxiv.org·4d
🏛Digital humanities
Flag this post
A Multimodal, Multitask System for Generating E Commerce Text Listings from Images
arxiv.org·4d
🤖Advanced OCR
Flag this post
Vibe Coding, Six Months Later: The Honeymoon’s Over
thenewstack.io·1d
📏Code Metrics
Flag this post
Loading...Loading more...