Leaderboard
thomasrigby.comยท11h
โญAwesome lists
Flag this post
Big firmware update for MU1 and MU2
grimmaudio.comยท3h
๐ตAudio Streaming
Flag this post
“Sneaky” new Android malware takes over your phone, hiding in fake news and ID apps
malwarebytes.comยท7h
๐ฆ Malware Analysis
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
๐Operating system internals
Flag this post
Ukraine First To Demo Open Source Security Platform To Help Secure Power Grid
hardware.slashdot.orgยท19h
๐Hacking
Flag this post
Lithium-Ion Batteries: WHY They Demand Respect
hackaday.comยท5h
โ๏ธDIY Electronics
Flag this post
Digital Twin based Automatic Reconfiguration of Robotic Systems in Smart Environments
arxiv.orgยท15h
๐ Homelab Automation
Flag this post
Quantum-Powered AI: Revolutionizing Collateral Management by Arvind Sundararajan
๐Quantum Cryptography
Flag this post
Probabilistic Robustness for Free? Revisiting Training via a Benchmark
arxiv.orgยท15h
๐ง Machine Learning
Flag this post
Federated Anomaly Detection for Robot Surveillance Data with Differential Privacy
๐Privacy Preserving
Flag this post
pDANSE: Particle-based Data-driven Nonlinear State Estimation from Nonlinear Measurements
arxiv.orgยท1d
๐Differential Geometry
Flag this post
CM-LIUW-Odometry: Robust and High-Precision LiDAR-Inertial-UWB-Wheel Odometry for Extreme Degradation Coal Mine Tunnels
arxiv.orgยท15h
๐๏ธCassette DSP
Flag this post
3rd November โ Threat Intelligence Report
research.checkpoint.comยท1d
๐Hacking
Flag this post
Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails
๐Archival Workflows
Flag this post
Explore More, Learn Better: Parallel MLLM Embeddings under Mutual Information Minimization
arxiv.orgยท15h
๐งฎKolmogorov Complexity
Flag this post
Loading...Loading more...