๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Privacy Preserving

Homomorphic Encryption, Differential Privacy, Federated Learning, Secure Computation

Worth Reading 062425
rule11.techยท9h
๐ŸŒDNS over QUIC
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท20hยท
Discuss: DEV
๐ŸŽตSpectral Hashing
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comยท12h
๐Ÿฆ Malware Analysis
Toward Environmentally Equitable AI
cacm.acm.orgยท9h
๐Ÿ”ฒCellular Automata
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.comยท10hยท
Discuss: Hacker News
๐Ÿ“‹DFDL
Machines of Faithful Obedience
windowsontheory.orgยท1d
๐Ÿ”ฒCellular Automata
Veiled in the Sea of Chains, Hidden in the Mountain of Coins: Privacy Security as Both Constraint and Path Forward
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Blockchain Archives
Edge Association Strategies for Synthetic Data Empowered Hierarchical Federated Learning with Non-IID Data
arxiv.orgยท1d
๐Ÿง Machine Learning
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.orgยท1d
๐Ÿ”ขBitwise Algorithms
AlphaGenome: AI for better understanding the genome
deepmind.googleยท10hยท
Discuss: Hacker News
๐ŸงฌCopy Number Variants
Behavioral Anomaly Detection in Distributed Systems via Federated Contrastive Learning
arxiv.orgยท20h
๐Ÿ‘๏ธObservatory Systems
Tech Breakthroughs of June 2025
dev.toยท19hยท
Discuss: DEV
๐Ÿ–ฅ๏ธModern Terminals
What LLMs Know About Their Users
schneier.comยท13hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Show HN: Laburity โ€“ Dark and Deep Web Monitoring
laburity.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Trump knocks down barriers around personal data, raising alarm
thehill.comยท14hยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toยท11hยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comยท17h
๐Ÿ“‹Protocol Buffers
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.toยท10hยท
Discuss: DEV
๐Ÿง Machine Learning
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lolยท1dยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Digital Privacy Everywhere
arxiv.orgยท1d
๐Ÿ”Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap