ChatGPT and other AI models can be ‘poisoned’ to spew gibberish, researchers warn
the-independent.com·1d
🔓Hacking
Prime Portraits
archive.bridgesmathart.org·2d
📐Mathematical Art
Is ChatGPT-5 Able to Provide Proofs for Advanced Mathematics?
machinelearningmastery.com·4d
🎯Proof Tactics
Self Hosting Nightscout on Raspberry Pi
broderic.blog·3h·
Discuss: Hacker News
🔌Single Board PC
The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory
Building Luca: An AI Agent for Finance and Accounting Workflows
leapfin.com·5h·
Discuss: Hacker News
🔗Constraint Handling
A small number of samples can poison LLMs of any size
anthropic.com·2d·
🔍Vector Forensics
Bayesian Optimization for Dynamic Sample Size Allocation in A/B Testing
dev.to·2h·
Discuss: DEV
🧮Kolmogorov Bounds
VLLM Predicted Outputs
cascadetech.ai·1d·
Discuss: Hacker News
💻Local LLMs
AsyncSpade: Efficient Test-Time Scaling with Asynchronous Sparse Decoding
arxiv.org·1d
⚙️Compression Benchmarking
CVE-2025-11371: Unpatched zero-day in Gladinet CentreStack, Triofox under attack
securityaffairs.com·2h
🔓Hacking
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.io·1d·
Discuss: Hacker News
🛡️Error Boundaries
GNN Predictions: Hidden Bugs and the Verification Nightmare by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
⚙️Proof Engineering
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.com·3d·
Discuss: Hacker News
🔓Reverse engineering
Covert Quantum Learning: Privately and Verifiably Learning from Quantum Data
arxiv.org·2d
🔐Quantum Cryptography
Curing Miracle Steps in LLM Mathematical Reasoning with Rubric Rewards
arxiv.org·1d
🧮Theorem Proving
Show HN: Realization Jsmn on a Pure Zig
github.com·1d·
Discuss: Hacker News
🔗Concatenative Programming
The A.I. Prompt That Could End the World
nytimes.com·1d·
Discuss: Hacker News
Proof Automation
The Porcelain to Come
stackdiver.com·1d·
Discuss: Hacker News
🔲Cellular Automata