Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท18h
๐Ÿ”ขReed-Solomon Math
What People Are Getting Wrong This Week: The North Carolina Cryptid
lifehacker.comยท16h
๐Ÿ”Tape Forensics
'Qilin' cybercrime gang claims hack on Japan's Asahi Group
japantimes.co.jpยท6h
โ›๏ธFile Carving
Dopaminergic Modulation of Short-Term Associative Memory in C. Elegans
onlinelibrary.wiley.comยท5hยท
Discuss: Hacker News
๐Ÿ“กTape Modulation
Synthetic aperture radar autofocus and calibration
hforsten.comยท1hยท
Discuss: Hacker News
๐Ÿ”ฌOptical Physics
Meet the Flummoxagon
n-e-r-v-o-u-s.comยท17hยท
Discuss: Hacker News
๐Ÿ“Mathematical Art
Baseline - ported to Go
dev.toยท13hยท
Discuss: DEV
๐ŸšNordic Shell
SECA: Semantically Equivalent and Coherent Attacks for Eliciting LLM Hallucinations
arxiv.orgยท1d
๐Ÿ‘‘Coq Tactics
Data-Driven Filtering of the Spherical Harmonics Method
arxiv.orgยท2h
๐Ÿ“ŠQuantization
D2E: Scaling Vision-Action Pretraining on Desktop Data for Transfer to Embodied AI
arxiv.orgยท2h
๐Ÿ“ŠLearned Metrics
Adapting Insider Risk mitigations for Agentic Misalignment: an empirical study
arxiv.orgยท2h
๐Ÿ•ต๏ธVector Smuggling
Bloom: Designing for LLM-Augmented Behavior Change Interactions
arxiv.orgยท2h
๐ŸŒProtocol Synthesis
Inverse Mixed-Integer Programming: Learning Constraints then Objective Functions
arxiv.orgยท1d
๐Ÿ“ˆLinear programming
Python 3.14 Unleashed: Revolutionary Features That Will Transform Your Code (Part 1)
dev.toยท2hยท
Discuss: DEV
๐Ÿ’งLiquid Types
Neon: Negative Extrapolation From Self-Training Improves Image Generation
arxiv.orgยท1d
๐Ÿ“ŠQuantization
Automated Microscopy Image Enhancement via Adaptive Fractal Noise Filtering & Semantic Contextualization
dev.toยท2dยท
Discuss: DEV
๐ŸŒ€Fractal Compression
UniShield: An Adaptive Multi-Agent Framework for Unified Forgery Image Detection and Localization
arxiv.orgยท2d
๐Ÿ”Vector Forensics
Automated Spectral Deconvolution & Peak Profiling for Bioprocess Monitoring
dev.toยท1dยท
Discuss: DEV
๐Ÿ“„Document Digitization