🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🤐 Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

Single Transferable Vote and blocs
notstatschat.rbind.io·1d
🤝Paxos Consensus
A default McDonald's password left millions exposed
smartcompany.com.au·5h·
Discuss: Hacker News
🔓Hacking
Monitoring My Homelab, Simply
b.tuxes.uk·1d·
Discuss: Lobsters, Hacker News
📊Homelab Monitoring
Introducing Phi-4-mini-flash-reasoning
azure.microsoft.com·1d·
Discuss: Hacker News
🧮Z3 Applications
How to scale RL to 10^26 FLOPs
blog.jxmo.io·19h·
Discuss: Hacker News
🔮Proof Search
Censorship, Surveillance, and the Splinternet: Why We Need a Decentralized Web
hackernoon.com·4d
🖥️Self-hosted Infrastructure
Scientists develop novel recording tool to monitor protein kinase activities in living cells
phys.org·23h
🧲Magnetic Resonance
The Future Is Synthetic: How AI is Creating Art, Music, Code, and Reality
dev.to·2d·
Discuss: DEV
🎧Learned Audio
Show HN: LlamaFarm – Working on binary AI Project deployment – (early preview)
github.com·18h·
Discuss: Hacker News
🌀Brotli Internals
Machine Learning Fundamentals: confusion matrix with python
dev.to·2d·
Discuss: DEV
🔗Constraint Handling
Deconfounding Causal Inference through Two-Branch Framework with Early-Forking for Sensor-Based Cross-Domain Activity Recognition
arxiv.org·3d
✨Effect Handlers
MoSE: Skill-by-Skill Mixture-of-Expert Learning for Autonomous Driving
arxiv.org·11h
🧠Intelligence Compression
MCP Deep Dive: the Great, the Broken, and the Downright Dangerous
dev.to·2d·
Discuss: DEV
⚡gRPC
Deep Survival Analysis in Multimodal Medical Data: A Parametric and Probabilistic Approach with Competing Risks
arxiv.org·11h
🧠Machine Learning
DenoiseCP-Net: Efficient Collective Perception in Adverse Weather via Joint LiDAR-Based 3D Object Detection and Denoising
arxiv.org·1d
📐Projective Geometry
Centralized Copy-Paste: Enhanced Data Augmentation Strategy for Wildland Fire Semantic Segmentation
arxiv.org·1d
⛏️File Carving
Think Your Business Messages Are Private? Think Again
hackernoon.com·4d
🏺Protocol Archaeology
Towards Solving More Challenging IMO Problems via Decoupled Reasoning and Proving
arxiv.org·1d
🧮Theorem Proving
BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication
arxiv.org·3d
🇸🇪Nordic Cryptography
Who's the Mole? Modeling and Detecting Intention-Hiding Malicious Agents in LLM-Based Multi-Agent Systems
arxiv.org·3d
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap