🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🀐 Secure Multiparty

Privacy Computing, Federated Learning, Secret Sharing, Cryptographic Protocols

The cloud-native imperative for effective cyber resilience
theregister.comΒ·1d
πŸ’ΎPersistence Strategies
We asked 9 AI and agent builders about their top problems
unionailoop.substack.comΒ·14hΒ·
Discuss: Substack
πŸ‘οΈObservatory Systems
Deconfounding Causal Inference through Two-Branch Framework with Early-Forking for Sensor-Based Cross-Domain Activity Recognition
arxiv.orgΒ·2d
✨Effect Handlers
The Future Is Synthetic: How AI is Creating Art, Music, Code, and Reality
dev.toΒ·18hΒ·
Discuss: DEV
🎧Learned Audio
DenoiseCP-Net: Efficient Collective Perception in Adverse Weather via Joint LiDAR-Based 3D Object Detection and Denoising
arxiv.orgΒ·5h
πŸ“Projective Geometry
Stacked Intelligent Metasurfaces-Aided eVTOL Delay Sensitive Communications
arxiv.orgΒ·5h
πŸ•ΈοΈMesh Networking
Efficient Training of Large-Scale AI Models Through Federated Mixture-of-Experts: A System-Level Approach
arxiv.orgΒ·1d
🧠Intelligence Compression
Building KeyHaven: My Journey with Bolt at the World’s Largest Hackathon
dev.toΒ·1dΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Improving Trust Estimation in Human-Robot Collaboration Using Beta Reputation at Fine-grained Timescales
arxiv.orgΒ·1d
🀝Consensus Algorithms
Machine Learning Fundamentals: confusion matrix with python
dev.toΒ·18hΒ·
Discuss: DEV
πŸ”—Constraint Handling
On the Complexity of Problems on Graphs Defined on Groups
arxiv.orgΒ·1d
πŸ”—Graph Isomorphism
Centralized Copy-Paste: Enhanced Data Augmentation Strategy for Wildland Fire Semantic Segmentation
arxiv.orgΒ·5h
⛏️File Carving
Think Your Business Messages Are Private? Think Again
hackernoon.comΒ·3d
🏺Protocol Archaeology
Why the AI boom requires an Wyatt Earp
techradar.comΒ·38m
βš–οΈEmulation Ethics
Fractional Programming for Stochastic Precoding over Generalized Fading Channels
arxiv.orgΒ·5h
⚽Sphere Packing
BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication
arxiv.orgΒ·2d
πŸ‡ΈπŸ‡ͺNordic Cryptography
Who's the Mole? Modeling and Detecting Intention-Hiding Malicious Agents in LLM-Based Multi-Agent Systems
arxiv.orgΒ·2d
🎯Threat Hunting
Archetype-Aware Predictive Autoscaling with Uncertainty Quantification for Serverless Workloads on Kubernetes
arxiv.orgΒ·1d
🌊Streaming Systems
Programmable Governance for Group-Controlled Decentralized Identifiers
arxiv.orgΒ·1d
πŸ–₯️Self-hosted Infrastructure
Expediting data extraction using a large language model (LLM) and scoping review protocol: a methodological study within a complex scoping review
arxiv.orgΒ·5h
πŸ”„Archival Workflows
Loading...Loading more...
AboutBlogChangelogRoadmap