๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’พ Binary codes
Slopsquatting: AI's Contribution to Supply Chain Attacks
hackerone.comยท8h
๐Ÿ”’WASM Capabilities
My favorite use-case for AI is writing logs
vickiboykis.comยท1d
๐ŸŒณIncremental Parsing
Rust Language Cheat Sheet
cheats.rsยท5dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Good binding data is all you need
leashbio.substack.comยท4hยท
Discuss: Substack
๐Ÿ—‚๏ธVector Databases
A Bayesian Incentive Mechanism for Poison-Resilient Federated Learning
arxiv.orgยท20m
๐ŸคSecure Multiparty
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Diffusion Decoding for Peptide De Novo Sequencing
arxiv.orgยท1d
๐ŸงฎKolmogorov Complexity
Understanding the Basics: Linear Equations and Matrices
dev.toยท3hยท
Discuss: DEV
๐Ÿ“Linear Algebra
The great misunderstanding of the DRY principle
pmatteo.comยท2dยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Dot product on misaligned data
lemire.meยท2dยท
Discuss: Hacker News, r/cpp
๐Ÿ”ฉSystems Programming
Show HN: I built an SDK for building an AI RAG app with Supabase and pgvector
github.comยท7hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Neural Network-Guided Symbolic Regression for Interpretable Descriptor Discovery in Perovskite Catalysts
arxiv.orgยท20m
๐Ÿ•ธ๏ธAlgebraic Topology
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgยท20m
๐Ÿ•ต๏ธVector Smuggling
๐Ÿ” Design a TinyURL System (Like Bit.ly) โ€” From Scratch
dev.toยท2dยท
Discuss: DEV
๐ŸŒช๏ธBrotli
Discrete Differential Principle for Continuous Smooth Function Representation
arxiv.orgยท2d
๐ŸŒ€Differential Geometry
Deep Neural Encoder-Decoder Model to Relate fMRI Brain Activity with Naturalistic Stimuli
arxiv.orgยท20m
๐Ÿง Neural Codecs
It is 1939 and you want to use public-key cryptography
shkspr.mobiยท3dยท
Discuss: Hacker News, shkspr.mobi
๐Ÿ”Cryptographic Archaeology
The FIPS 140-3 Go Cryptographic Module
go.devยท2dยท
Discuss: Lobsters, Hacker News, r/golang, r/programming
๐ŸŒŠStream Ciphers
C-FBI: A Combinatorial method using Convolutions for Circle Fitting in Blurry Images
arxiv.orgยท1d
๐ŸŒ€Fractal Compression
SIEVE: Effective Filtered Vector Search with Collection of Indexes
arxiv.orgยท20m
๐Ÿ—‚๏ธVector Databases
Loading...Loading more...
AboutBlogChangelogRoadmap