๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒธ Bloom Variants

Probabilistic Structures, False Positive Rates, Cuckoo Filters, Counting Filters

Breaking the code in network theory: Bimodularity reveals direction of influence in complex systems
phys.orgยท1d
๐ŸŒŠSpectral Clustering
The Power of Digital Twins in Cybersecurity
cacm.acm.orgยท4h
๐Ÿ”Capability Systems
Binary Exploitation 101 - Introduction
r1ru.github.ioยท1d
๐Ÿ“ผCassette Hacking
Itโ€™s a Cold Day in Developer Hell, So I Must Roll My Own Crypto
soatok.blogยท9h
๐ŸŒณArchive Merkle Trees
Everything I Studied to Become a Machine Learning Engineer (No CS Background)
towardsdatascience.comยท3h
๐Ÿง Machine Learning
Foresight-32B Beats Frontier LLMs on Live Polymarket Predictions
blog.lightningrod.aiยท1hยท
Discuss: Hacker News
๐Ÿง Intelligence Compression
Music to Break Models By
matthodges.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ“ผCassette Hacking
Flatness-aware Curriculum Learning via Adversarial Difficulty
arxiv.orgยท17h
๐Ÿ“ŠLearned Metrics
Automated Anomaly Detection in Electrochemical Etching Microstructures via Multi-Modal Analysis
dev.toยท4hยท
Discuss: DEV
๐Ÿ“„Document Digitization
CLARIFY: A Specialist-Generalist Framework for Accurate and Lightweight Dermatological Visual Question Answering
arxiv.orgยท17h
๐Ÿ”Information Retrieval
Auditing Approximate Machine Unlearning for Differentially Private Models
arxiv.orgยท17h
๐Ÿ›ก๏ธDifferential Privacy
M^3-GloDets: Multi-Region and Multi-Scale Analysis of Fine-Grained Diseased Glomerular Detection
arxiv.orgยท1d
๐Ÿ•ณ๏ธPersistent Homology
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation
arxiv.orgยท17h
๐Ÿ”’Language-based security
Exploring Assumptions of K-means Clustering using R
dev.toยท14hยท
Discuss: DEV
๐Ÿ“šDocument Clustering
L-XAIDS: A LIME-based eXplainable AI framework for Intrusion Detection Systems
arxiv.orgยท1d
๐Ÿ”Vector Forensics
Preliminary Study on Space Utilization and Emergent Behaviors of Group vs. Single Pedestrians in Real-World Trajectories
arxiv.orgยท17h
๐Ÿ”ฒCellular Automata
Stability Optimization and Analysis of Energy Flow Networks versus Different Centrality Measurement
arxiv.orgยท1d
๐ŸคConsensus Algorithms
Linear Layouts Revisited: Stacks, Queues, and Exact Algorithms
arxiv.orgยท2d
๐Ÿ•ธ๏ธNetwork Topology
FedProtoKD: Dual Knowledge Distillation with Adaptive Class-wise Prototype Margin for Heterogeneous Federated Learning
arxiv.orgยท17h
๐Ÿ”’Privacy Preserving
Relacy Race Detector is a verifier for relaxed memory models
1024cores.netยท2dยท
Discuss: Hacker News
โšกHardware Transactional Memory
Loading...Loading more...
AboutBlogChangelogRoadmap