🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎵 Spectral Hashing

Audio Fingerprinting, Perceptual Hashing, Content Identification, Signal Processing

Real-Time Gait Analysis & Personalized Biometrics Security SDK for Wearables
dev.to·6h·
Discuss: DEV
🎵Audio Hashing
HyperKD: Distilling Cross-Spectral Knowledge in Masked Autoencoders via Inverse Domain Shift with Spatial-Aware Masking and Specialized Loss
arxiv.org·19h
🧠Machine Learning
Sniffing and Injecting on 5G NR
github.com·9h·
Discuss: Hacker News
📼Cassette Hacking
A new way to test how well AI systems classify text
news.mit.edu·1d
🔤Character Classification
Leveraging Malware Sandboxes for Threat Analysis: How They Work, What They Reveal — Decision-Making Processes
cyberwarhead.com·7h
🦠Malware Analysis
2024 Device intelligence by the numbers
fingerprint.com·3h
🔗Binary Similarity
What Exif Data Reveals About Your Site
brainbaking.com·11h
🔍Format Forensics
Smooth Minimum for Signed Distance Fields (2013)
iquilezles.org·1h·
Discuss: Hacker News
🌀Differential Geometry
Databricks: Recognizing and avoiding security vulnerabilities in vibe coding
heise.de·16h
📜Proof Carrying Code
Writing an LLM from scratch - Tutorial series
gilesthomas.com·6h
💻Local LLMs
A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode
unit42.paloaltonetworks.com·13h
🦠Malware Analysis
The Brain Behind Next-Generation Cyber Attacks
blog.checkpoint.com·9h
🎯Threat Hunting
I spent weeks understanding Netflix's recommendation system - here's what I learned (Matrix Factorization breakdown + working code)
beyondit.blog·1d
🎛️Feed Filtering
Building a Simple AI DAW
blog.jonaylor.com·8h·
Discuss: Hacker News
🎧Learned Audio
Cornell Researchers Develop Invisible Light-Based Watermark To Detect Deepfakes
slashdot.org·1d
💧Digital Watermarking
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments
usenix.org·1d
🛡️WASM Sandboxing
Hyperdimensional Tensor Network Encoding for Quantum Federated Learning
dev.to·1h·
Discuss: DEV
🕸️Tensor Networks
Learning to Detect Unknown Jailbreak Attacks in Large Vision-Language Models: A Unified and Accurate Approach
arxiv.org·19h
🦾ARM Cortex-M
Multimodal Fusion And Sparse Attention-based Alignment Model for Long Sequential Recommendation
arxiv.org·19h
🔍Information Retrieval
Finding MLB Player Types with K-Means Clustering
runningonnumbers.com·2d·
Discuss: Hacker News
🌊Spectral Clustering
Loading...Loading more...
AboutBlogChangelogRoadmap