🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Homomorphic Encryption

Privacy-preserving Computation, Encrypted Processing, Secure Multiparty, FHE

2025-07-16: Understanding Hallucination in Large Language Models: Challenges and Opportunities
ws-dl.blogspot.com·4h·
Discuss: ws-dl.blogspot.com
✨Effect Handlers
Students, here are 5 key things to know when learning how to train large language models
techradar.com·1d
💻Local LLMs
Brazil innovates on digital self-determination
protonvpn.com·14h
🖥️Self-hosted Infrastructure
Unmoved Centre - NixOS Secrets Management
unmovedcentre.com·1d
❄Nix
Where Security Begins: 5 Insights from the Intersection of Engineering and Teaching
hackernoon.com·11h
🛡Cybersecurity
What people said about an OpenZFS bug
despairlabs.com·12h·
Discuss: Lobsters, Hacker News
🔒Type Safety
Study finds elites' offshore asset strategies shaped by home country governance
phys.org·10h
🔗Data Provenance
One Identity Everywhere: Why Digital Identity Is the Missing Infrastructure Layer in Tech
hackernoon.com·6h
🖥️Self-hosted Infrastructure
SENSOR: An ML-Enhanced Online Annotation Tool to Uncover Privacy Concerns from User Reviews in Social-Media Applications
arxiv.org·1d
🎛️Feed Filtering
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
arxiv.org·2d
🎵Audio ML
Robust 3D-Masked Part-level Editing in 3D Gaussian Splatting with Regularized Score Distillation Sampling
arxiv.org·1d
🏺Computational Archaeology
GitGuardian Humanizes Non-Human Identity Controls Inside Developer Workflows
devops.com·10h
🌳Archive Merkle Trees
SIEVE: Effective Filtered Vector Search with Collection of Indexes
arxiv.org·25m
🗂️Vector Databases
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·1d·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Urban Green Governance: IoT-Driven Management and Enhancement of Urban Green Spaces in Campobasso
arxiv.org·25m
⚡Incremental Computation
Functional Abstract Interpretation
simon.peytonjones.org·2d·
Discuss: Hacker News
🔗Functional Compilers
NOCTA: Non-Greedy Objective Cost-Tradeoff Acquisition for Longitudinal Data
arxiv.org·25m
⧗Information Bottleneck
An Offline Mobile Conversational Agent for Mental Health Support: Learning from Emotional Dialogues and Psychological Texts with Student-Centered Evaluation
arxiv.org·1d
🏛Digital humanities
Thought Purity: Defense Paradigm For Chain-of-Thought Attack
arxiv.org·25m
🛡️Proof-Carrying Archives
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.org·1d
🧮Z3 Solver
Loading...Loading more...
AboutBlogChangelogRoadmap