๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿค Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

The cloud-native imperative for effective cyber resilience
theregister.comยท15h
๐Ÿ’พPersistence Strategies
Linux Foundation Adopts A2A Protocol To Help Solve One of AI's Most Pressing Challenges
linux.slashdot.orgยท8h
๐Ÿ”Capability Systems
Exploiting Partial Compliance: The Redact-and-Recover Jailbreak
generalanalysis.comยท9hยท
Discuss: Hacker News
๐ŸงชCBOR Fuzzing
$BTC Bitcoin White Paper Annotated
bitcoinpaper.techยท22hยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Constraint Hypergraphs as a Unifying Framework for Digital Twins
arxiv.orgยท2h
โš™๏ธTLA+
Fair Domain Generalization: An Information-Theoretic View
arxiv.orgยท2h
๐ŸงฎKolmogorov Bounds
PB-LLMs: Privacy- and Bias-aware NLP Models using Named-Entity Recognition
arxiv.orgยท1d
๐Ÿ’ปLocal LLMs
Polyadic encryption
arxiv.orgยท2h
๐ŸŒŠStream Ciphers
Disappearing Ink: Obfuscation Breaks N-gram Code Watermarks in Theory and Practice
arxiv.orgยท2h
๐Ÿ’งDigital Watermarking
AI Agent Smart Contract Exploit Generation
arxiv.orgยท2h
๐ŸงชProtocol Fuzzing
An AI Theory of Mind Will Enhance Our Collective Intelligence
arxiv.orgยท2h
๐Ÿ”ฒCellular Automata
Advanced Strategies to Deploy Phoenix Applications with Kamal
blog.appsignal.comยท19hยท
Discuss: Hacker News
๐Ÿ Homelab Orchestration
RVISmith: Fuzzing Compilers for RVV Intrinsics
arxiv.orgยท1d
๐Ÿ›Fuzzing
High Order Collaboration-Oriented Federated Graph Neural Network for Accurate QoS Prediction
arxiv.orgยท2h
๐Ÿ•ธ๏ธGraph Embeddings
On the Inherent Privacy of Zeroth Order Projected Gradient Descent
arxiv.orgยท2h
๐Ÿ›ก๏ธDifferential Privacy
Does Movable Antenna Present A Dual-edged Nature? From the Perspective of Physical Layer Security: A Joint Design of Fixed-position Antenna and Movable Antenna
arxiv.orgยท2h
๐ŸŒŠStream Ciphers
Open source, open science, and cryptography
techradar.comยท15h
๐Ÿ”“Open Source Software
Taming Data Challenges in ML-based Security Tasks: Lessons from Integrating Generative AI
arxiv.orgยท2h
๐Ÿ”คCharacter Classification
TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture
arxiv.orgยท2h
๐Ÿ”Homomorphic Encryption
Deconfounding Causal Inference through Two-Branch Framework with Early-Forking for Sensor-Based Cross-Domain Activity Recognition
arxiv.orgยท1d
โœจEffect Handlers
Loading...Loading more...
AboutBlogChangelogRoadmap