Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.com·2h
🔢Reed-Solomon Math
Meet the Flummoxagon
n-e-r-v-o-u-s.com·1h
📐Mathematical Art
What People Are Getting Wrong This Week: The North Carolina Cryptid
lifehacker.com·19m
🔍Tape Forensics
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.com·1d
🔓Hacking
AI generated 3D textures for artists
aitextured.com·1d·
Discuss: Hacker News
📸PNG Optimization
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🔐PKI Archaeology
An Senegalese Legal Texts Structuration Using LLM-augmented Knowledge Graph
arxiv.org·1d
📋Document Grammar
Unsupervised Active Learning via Natural Feature Progressive Framework
arxiv.org·10h
🧠Machine Learning
Rewriting History: Aligning AI Through Counterfactual Learning by Arvind Sundararajan
dev.to·8h·
Discuss: DEV
🤖AI Curation
Unlocking Uniqueness: Mastering the Unique Character Algorithm in Go
dev.to·22h·
Discuss: DEV
🌳Trie Structures
Inspiring Google Developers video retrospective
dev.to·15h·
Discuss: DEV
🔌Archive APIs
Automatic Building Code Review: A Case Study
arxiv.org·1d
📏Code Metrics
POEM: Explore Unexplored Reliable Samples to Enhance Test-Time Adaptation
arxiv.org·10h
🧮Kolmogorov Complexity
Aria: An Agent For Retrieval and Iterative Auto-Formalization via Dependency Graph
arxiv.org·10h
Proof Automation
CCD-Bench: Probing Cultural Conflict in Large Language Model Decision-Making
arxiv.org·10h
🌍Cultural Algorithms
SpeechCT-CLIP: Distilling Text-Image Knowledge to Speech for Voice-Native Multimodal CT Analysis
arxiv.org·1d
🎙️Whisper
Bidirectional Mammogram View Translation with Column-Aware and Implicit 3D Conditional Diffusion
arxiv.org·10h
Bidirectional Programming
Distribution Preference Optimization: A Fine-grained Perspective for LLM Unlearning
arxiv.org·10h
💻Local LLMs