Note
hsu.cyΒ·12h
πABNF Parsing
Flag this post
Your AI-driven threat hunting is only as good as your data platform and pipeline
cybersecuritydive.comΒ·1h
πData Provenance
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
π¦Package Managers
Flag this post
Show HN: Claude Code disrupted programming. Bringing that power to office worker
π€Archive Automation
Flag this post
Automated Material Mixing Optimization for Large-Scale 3D Printed Concrete Structures via Bayesian Reinforcement Learning
πΊComputational Archaeology
Flag this post
Speech-DRAME: A Framework for Human-Aligned Benchmarks in Speech Role-Play
arxiv.orgΒ·2d
ποΈWhisper
Flag this post
PDE-SHARP: PDE Solver Hybrids Through Analysis & Refinement Passes
arxiv.orgΒ·2d
πFunctional Compilers
Flag this post
My Thoughts on the 2025 Stack Overflow Survey: The Hype, the Reality, the Gap
πCode Metrics
Flag this post
TabGemma: Text-Based Tabular ICL via LLM using Continued Pretraining and Retrieval
arxiv.orgΒ·6h
πDocument Grammar
Flag this post
Probing Knowledge Holes in Unlearned LLMs
arxiv.orgΒ·2d
π§ͺBinary Fuzzing
Flag this post
Exploratory Analysis of Cyberattack Patterns on E-Commerce Platforms Using Statistical Methods
arxiv.orgΒ·6h
π―Threat Hunting
Flag this post
Nonlinear Instabilities in Computer Network Dynamics
arxiv.orgΒ·1d
πΈοΈNetwork Topology
Flag this post
ARC-GEN: A Mimetic Procedural Benchmark Generator for the Abstraction and Reasoning Corpus
arxiv.orgΒ·2d
πCode Metrics
Flag this post
Loading...Loading more...