🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Differential Privacy

Privacy Preserving Analytics, Noise Addition, Statistical Disclosure

AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·8h
🎯Threat Hunting
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.com·4h·
Discuss: Hacker News
📋DFDL
Greedy Is Good. Less Greedy May Be Better
gojiberries.io·17h·
Discuss: Hacker News
🧮Kolmogorov Complexity
Edge Association Strategies for Synthetic Data Empowered Hierarchical Federated Learning with Non-IID Data
arxiv.org·1d
🧠Machine Learning
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·11h
📋Protocol Buffers
Learning to assess subjective impressions from speech
arxiv.org·14h
👁️Perceptual Coding
Probabilistic and reinforced mining of association rules
arxiv.org·1d
🧠Learned Indexes
A Principled Approach to Randomized Selection under Uncertainty
arxiv.org·14h
🌸Bloom Variants
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.org·1d
🔗Hash Chains
Machine Learning Fundamentals: active learning
dev.to·1d·
Discuss: DEV
🤖Grammar Induction
Digital Privacy Everywhere
arxiv.org·1d
🔐Homomorphic Encryption
Fully lifted \emph{blirp} interpolation -- a large deviation view
arxiv.org·14h
🌀Fractal Compression
DRIFT: Data Reduction via Informative Feature Transformation- Generalization Begins Before Deep Learning starts
arxiv.org·14h
🧠Machine Learning
HE-LRM: Encrypted Deep Learning Recommendation Models using Fully Homomorphic Encryption
arxiv.org·1d
🔐Homomorphic Encryption
Small language model for secrets detection
wiz.io·2d·
Discuss: Hacker News
💻Local LLMs
The AI Memory Wallet Fallacy
blog.getzep.com·1d·
Discuss: Hacker News
💾Persistence Strategies
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.org·2d
🔒Language-based security
Weakly Private Information Retrieval from Heterogeneously Trusted Servers
arxiv.org·2d
📊Compression Proofs
The Internal Inconsistency of Large Language Models
blog.kortlepel.com·1d·
Discuss: Hacker News
💻Local LLMs
Rumor Detection on Social Media with Reinforcement Learning-based Key Propagation Graph Generator
arxiv.org·1d
🧠Intelligence Compression
Loading...Loading more...
AboutBlogChangelogRoadmap