🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🤐 Secure Multiparty
Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Aligning IT and security teams for optimal business success
techradar.com
·
1d
🔐
Capability Systems
Prioritized Software and Services List + MITRE Tactics Part VI
optiv.com
·
20h
🏠
Homelab Security
Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector
tenable.com
·
1d
🔐
Capability Security
ML Systems: Motivating Dense Models
jacobkahn.me
·
1d
·
Discuss:
Hacker News
🧠
Machine Learning
Hybrid AI-Driven Intrusion Detection: Framework Leveraging Novel Feature Selection for Enhanced Network Security
arxiv.org
·
2d
🎯
Threat Hunting
AI Watermarks: Guarding Your Million-Dollar Machines Against Data Hijackers
dev.to
·
2d
·
Discuss:
DEV
🕵️
Vector Smuggling
Real-Time Gas Mixture Discrimination Using Bayesian Compressed Sensing & Hyperdimensional Encoding
dev.to
·
6h
·
Discuss:
DEV
🌀
Differential Geometry
Architecting UltraNews: Building a Real-Time News Intelligence Platform That Scales
dev.to
·
11h
·
Discuss:
DEV
🌊
Stream Processing
Managing Correlations in Data and Privacy Demand
arxiv.org
·
1d
🛡️
Differential Privacy
Too Noisy to Collude? Algorithmic Collusion Under Laplacian Noise
arxiv.org
·
1d
🤝
Consensus Algorithms
ActivityPub message rewrite facility (MRF) based on WASM
aumetra.xyz
·
10h
·
Discuss:
Hacker News
🔒
WASM Capabilities
Cut Costs, Not Accuracy: LLM-Powered Data Processing with Guarantees
arxiv.org
·
1d
💻
Local LLMs
Show HN: No More Vendor Lock-In: Our Open-Source Protocol for AI Portability
github.com
·
1d
·
Discuss:
Hacker News
🔌
Interface Evolution
Civics Is Boring. So, Let's Encrypt Something
queue.acm.org
·
2d
·
Discuss:
Hacker News
🔒
Language-based security
MCP OAuth 2.1 - A Complete Guide
dev.to
·
1d
·
Discuss:
DEV
🔐
PAKE Protocols
On the MIA Vulnerability Gap Between Private GANs and Diffusion Models
arxiv.org
·
1d
💻
Local LLMs
Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan
dev.to
·
2d
·
Discuss:
DEV
🔍
Vector Forensics
The Angels and Demons of Nondeterminism
buttondown.com
·
1d
·
Discuss:
Hacker News
💻
Programming languages
Warming Up for Zeroth-Order Federated Pre-Training with Low Resource Clients
arxiv.org
·
1d
📊
Quantization
Preference Robustness for DPO with Applications to Public Health
arxiv.org
·
1d
🧮
Kolmogorov Bounds
Loading...
Loading more...
« Page 3
•
Page 5 »