Integral Signatures of Activation Functions: A 9-Dimensional Taxonomy and Stability Theory for Deep Learning
arxiv.org·15h
🧠Machine Learning
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·2d
🧬PostgreSQL Forensics
Neuro-Symbolic AI
en.wikipedia.org·4h·
Discuss: Hacker News
🔲Cellular Automata
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.com·4h
🔓Hacking
The Hidden Oracle Inside Your AI: Unveiling Data Density with Latent Space Magic by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
🧠Machine Learning
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
Autonomous AI Hacking and the Future of Cybersecurity
schneier.com·8h·
Discuss: Hacker News
🎯Threat Hunting
GPT-5 for AI-assisted discovery
johndcook.com·4h
🎯Performance Proofs
RND1: Simple, Scalable AR-to-Diffusion Conversion
radicalnumerics.ai·23h·
Discuss: Hacker News
💻Local LLMs
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🧪Protocol Fuzzing
Evaluating Gemini 2.5 Deep Think's math capabilities
epoch.ai·5h·
Discuss: Hacker News
🎯Performance Proofs
10 Data + AI Observations for Fall 2025
towardsdatascience.com·5h
🌊Stream Processing
Real-Time Anomaly Attribution via Hybrid Graph Neural Network & Causal Inference
dev.to·1d·
Discuss: DEV
🚨Incident Response
SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.org·15h
💻Local LLMs
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Counterfactual Identifiability via Dynamic Optimal Transport
arxiv.org·15h
🧠Machine Learning
6D Phase Space Reconstruction: MENT-Flow Validation on Complex High-Dimensional Distributions
hackernoon.com·2d
💎Information Crystallography
SliceFine: The Universal Winning-Slice Hypothesis for Pretrained Networks
arxiv.org·15h
🧠Neural Codecs
100 Poisoned Examples Can Hijack Any AI Model (Even GPT-4-Scale LLMs)
dev.to·23h·
Discuss: DEV
Proof Automation