🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Differential Privacy

Privacy Preserving Analytics, Noise Addition, Statistical Disclosure

SENSOR: An ML-Enhanced Online Annotation Tool to Uncover Privacy Concerns from User Reviews in Social-Media Applications
arxiv.org·7h
🎛️Feed Filtering
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.il·14h·
Discuss: Hacker News
🎯Interactive Provers
Two Types of Data Privacy Controls
cacm.acm.org·1d
🕳️Information Leakage
A Minimal DDPM
github.com·9h·
Discuss: Hacker News
🧠Machine Learning
How does your phone know so many private details? How thousands of apps are exploiting mysterious indoor location tracking
english.elpais.com·1d
📡Bluetooth Archaeology
Efficient Private Inference Based on Helper-Assisted Malicious Security Dishonest Majority MPC
arxiv.org·1d
🤐Secure Multiparty
Streamline Global Client Communication with 20 Secure Accounts
news.ycombinator.com·31m·
Discuss: Hacker News
🔤EBCDIC Privacy
Fairness-Aware Grouping for Continuous Sensitive Variables: Application for Debiasing Face Analysis with respect to Skin Tone
arxiv.org·7h
🌀Differential Geometry
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
arxiv.org·1d
🎵Audio ML
Types That Count: Journey across Qualitative and Quantitative Intersection Types
iris.unito.it·1d·
Discuss: Hacker News
🔍Type Inference
Students, here are 5 key things to know when learning how to train large language models
techradar.com·18h
💻Local LLMs
We Built a Private Algorand Network to Crack the Code of Transaction Ordering
hackernoon.com·19h
🤝Consensus Algorithms
Contrastive-KAN: A Semi-Supervised Intrusion Detection Framework for Cybersecurity with scarce Labeled Data
arxiv.org·7h
🧠Machine Learning
What browser fingerprinting tests like Amiunique show, and what they miss
blog.castle.io·2h·
Discuss: Hacker News
🔓Hacking
Machine Learning Fundamentals: data preprocessing project
dev.to·2d·
Discuss: DEV
⚙️Batch Processing
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.org·7h
🔗Hash Chains
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.org·7h
🌐DNS Security
Relative Entropy Pathwise Policy Optimization
arxiv.org·7h
🧮Kolmogorov Complexity
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·11h·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection
arxiv.org·7h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap