๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ง Digital Watermarking

Steganography, Copyright Protection, Archive Authentication, Invisible Metadata

Treasure trove of vintage 1940s movies on 16mm rescued from house clearance by Harrogate Film Society
madcornishprojectionist.co.ukยท1d
๐Ÿ“ผCassette Archaeology
You need to get started on ADA Title II compliance now: How to strategize funding, slash risk, and ensure ROI
deque.comยท22h
๐ŸššData Migration
Discrete Differential Geometry Lecture 2B: Introduction to Manifolds
youtube.comยท2d
๐ŸŒ€Differential Geometry
Conversations remotely detected from cell phone vibrations, researchers report
psu.eduยท1dยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Amazon Drone Beehive Concept (2019)
etrr.springeropen.comยท1dยท
Discuss: Hacker News
๐Ÿ“ผCassette Protocols
The iHost โ€“ Thoughts about the future of Self-Hosting
kiranet.orgยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Federation
Show HN: Generative Graphics LLM Benchmark
ggbench.comยท23hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Emulators
That “Amazon Safety Recall” message may well be a scam
malwarebytes.comยท1h
๐Ÿฆ Malware Analysis
Federated Learning with Differential Privacy for Edge-Based Anomaly Detection in Industrial IoT
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธDifferential Privacy
Show HN: I built an offline, openโ€‘source desktop Pixel Art Editor in Python
github.comยท16hยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWASM Archives
Perceptual Evaluation of GANs and Diffusion Models for Generating X-rays
arxiv.orgยท10h
๐Ÿ“ŠLearned Metrics
ImpliHateVid: A Benchmark Dataset and Two-stage Contrastive Learning Framework for Implicit Hate Speech Detection in Videos
arxiv.orgยท10h
๐ŸŽž๏ธMKV Analysis
\(X\)-evolve: Solution space evolution powered by large language models
arxiv.orgยท10h
๐Ÿ› Language Design
Deploying Medical Semantic Search with Lightweight MLOps Pipelines
dev.toยท1dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Fake TikTok shops found spreading malware to unsuspecting victims - here's how to stay safe
techradar.comยท17h
๐ŸŽซKerberos Attacks
What WhatsApp and Signal reveal, despite encryption
heise.deยท19h
๐Ÿ“กFeed Security
Automated Anomaly Detection and Predictive Maintenance in Cryogenic Pump Systems via Dynamic Bayesian Networks
dev.toยท1hยท
Discuss: DEV
๐ŸŒŠStream Processing
Efficient Edge LLMs Deployment via HessianAware Quantization and CPU GPU Collaborative
arxiv.orgยท10h
๐Ÿ’ปLocal LLMs
Automated Anomaly Detection and 3D Reconstruction in Submerged Archaeological Site Mapping via Multi-Modal Sensor Fusion
dev.toยท1dยท
Discuss: DEV
๐ŸบComputational Archaeology
Enhanced Atomic Force Microscopy for Nanoscale Material Property Mapping via Deep Learning
dev.toยท1dยท
Discuss: DEV
๐Ÿค–Advanced OCR
Loading...Loading more...
AboutBlogChangelogRoadmap