The OWASP AI/LLM Top 10: Understanding Security and Privacy Risks in AI-Powered Mobile Applications
nowsecure.com·20h
💻Local LLMs
Flag this post
Halfway to Hell
📟Terminal Forensics
Flag this post
11X Faster ScyllaDB Backup
📊Differential Backup
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
✅Formal Methods
Flag this post
The Ghost in the Machine Is Finally Allowed to See: A Beginner's Guide to MCP
🔌Interface Evolution
Flag this post
[$] A security model for systemd
lwn.net·18h
🛡️eBPF Security
Flag this post
EP-HDC: Hyperdimensional Computing with Encrypted Parameters for High-Throughput Privacy-Preserving Inference
arxiv.org·2d
🔐Homomorphic Encryption
Flag this post
The fascinating story of the ultimate cosmic law
newscientist.com·1d
⏰Time Crystals
Flag this post
AI Papers to Read in 2025
towardsdatascience.com·11h
📊Quantization
Flag this post
NAP: Attention-Based Late Fusion for Automatic Sleep Staging
arxiv.org·4h
🎙️Whisper
Flag this post
Region-Aware Reconstruction Strategy for Pre-training fMRI Foundation Model
arxiv.org·2d
📊Learned Metrics
Flag this post
Intelligent Computing Social Modeling and Methodological Innovations in Political Science in the Era of Large Language Models
arxiv.org·4h
🌍Cultural Algorithms
Flag this post
Beyond Basic RAG: AI Agents for Context-Aware Responses
thenewstack.io·17h
🌀Brotli Internals
Flag this post
Scientists Finally Confirm True 1D Electronic Properties in a Material
scitechdaily.com·1d
🌈Holographic Archives
Flag this post
Loading...Loading more...