🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Differential Privacy

Privacy Preserving Analytics, Noise Addition, Statistical Disclosure

SENSOR: An ML-Enhanced Online Annotation Tool to Uncover Privacy Concerns from User Reviews in Social-Media Applications
arxiv.org·12h
🎛️Feed Filtering
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.il·19h·
Discuss: Hacker News
🎯Interactive Provers
Two Types of Data Privacy Controls
cacm.acm.org·2d
🕳️Information Leakage
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.be·3h
📡Bluetooth Archaeology
A Minimal DDPM
github.com·14h·
Discuss: Hacker News
🧠Machine Learning
Machine Learning Fundamentals: dimensionality reduction
dev.to·1h·
Discuss: DEV
📐Linear Algebra
Digital Forensics Round-Up, July 16 2025
forensicfocus.com·1h
🚨Incident Response
How does your phone know so many private details? How thousands of apps are exploiting mysterious indoor location tracking
english.elpais.com·1d
📡Bluetooth Archaeology
Brazil innovates on digital self-determination
protonvpn.com·3h
🖥️Self-hosted Infrastructure
Longer scans boost prediction and cut costs in brain-wide association studies
nature.com·1h
🧠Intelligence Compression
Efficient Private Inference Based on Helper-Assisted Malicious Security Dishonest Majority MPC
arxiv.org·1d
🤐Secure Multiparty
Streamline Global Client Communication with 20 Secure Accounts
news.ycombinator.com·5h·
Discuss: Hacker News
🔤EBCDIC Privacy
Fairness-Aware Grouping for Continuous Sensitive Variables: Application for Debiasing Face Analysis with respect to Skin Tone
arxiv.org·12h
🌀Differential Geometry
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
arxiv.org·1d
🎵Audio ML
Types That Count: Journey across Qualitative and Quantitative Intersection Types
iris.unito.it·1d·
Discuss: Hacker News
🔍Type Inference
Revisiting k-Means: 3 Approaches to Make It Work Better
machinelearningmastery.com·2h
📊Vector Quantization
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.com·1d
🤝Consensus Algorithms
Contrastive-KAN: A Semi-Supervised Intrusion Detection Framework for Cybersecurity with scarce Labeled Data
arxiv.org·12h
🧠Machine Learning
API Auth Is Deeper Than It Looks
nango.dev·37m·
Discuss: Hacker News
🔌Interface Evolution
Students, here are 5 key things to know when learning how to train large language models
techradar.com·23h
💻Local LLMs
Loading...Loading more...
AboutBlogChangelogRoadmap