๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿค Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

Aligning IT and security teams for optimal business success
techradar.comยท1d
๐Ÿ”Capability Systems
AI and the Fight Between Democracy and Autocracy
theatlantic.comยท9h
๐Ÿ”ฒCellular Automata
Prioritized Software and Services List + MITRE Tactics Part VI
optiv.comยท22h
๐Ÿ Homelab Security
Identity-First Security: Mitigating the Cloudโ€™s Greatest Risk Vector
tenable.comยท1d
๐Ÿ”Capability Security
Algorithms that address malicious noise could result in more accurate, dependable quantum computing
phys.orgยท1d
๐Ÿ”Quantum Security
Merge Forward Meeting - 2025-09-02
youtube.comยท1d
๐ŸŒŠApache Kafka
Digest #178: GitHub Secrets Leak, Building an AI Server, Dockerโ†’Kubernetes and ArgoCD Anti-Patterns
devopsbulletin.comยท3h
โ„๏ธNix Flakes
Show HN: Higher-order transform streams: 10x faster AI with recursive prompts
timetler.comยท2dยท
Discuss: Hacker News, r/programming
๐ŸŒŠStream Processing
Warming Up for Zeroth-Order Federated Pre-Training with Low Resource Clients
arxiv.orgยท1d
๐Ÿ“ŠQuantization
Preference Robustness for DPO with Applications to Public Health
arxiv.orgยท1d
๐ŸงฎKolmogorov Bounds
Centralized vs. Federated Learning for Educational Data Mining: A Comparative Study on Student Performance Prediction with SAEB Microdata
arxiv.orgยท2d
๐Ÿง Machine Learning
Strategic Analysis of Dissent and Self-Censorship
arxiv.orgยท15h
๐ŸŒก๏ธArchive Physics
Partition Algorithm in Data Mining โ€“ An Easy Introduction for Beginners
dev.toยท13hยท
Discuss: DEV
๐ŸŽฏContent Recommendation
HyPV-LEAD: Proactive Early-Warning of Cryptocurrency Anomalies through Data-Driven Structural-Temporal Modeling
arxiv.orgยท1d
๐Ÿ”—Hash Chains
Secure Password Generator Based on Secure Pseudo-Random Number Generator
arxiv.orgยท1d
๐Ÿ”“Password Cracking
Drivel-ology: Challenging LLMs with Interpreting Nonsense with Depth
arxiv.orgยท15h
๐Ÿ›Digital humanities
Multilinear and Linear Programs for Partially Identifiable Queries in Quasi-Markovian Structural Causal Models
arxiv.orgยท15h
๐ŸงฎKolmogorov Bounds
Multi-level SSL Feature Gating for Audio Deepfake Detection
arxiv.orgยท1d
๐Ÿ”ŠAcoustic Forensics
How Data-Driven Token Marketing Services Redefine Crypto Growth
dev.toยท13hยท
Discuss: DEV
๐Ÿ“ŠFeed Optimization
AI, Computer Vision, and Deep Learning: Seeing the World Through Algorithms
dev.toยท16hยท
Discuss: DEV
๐Ÿค–Advanced OCR
Loading...Loading more...
AboutBlogChangelogRoadmap