🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Vector Forensics

Embedding Analysis, Model Fingerprinting, Neural Network Archaeology, AI Security

Photon-Lines Tech Notes - July 2025
photonlines.substack.com·10h·
Discuss: Substack
🏺Compression Museums
Machine Learning Fundamentals: logistic regression
dev.to·11h·
Discuss: DEV
🧠Machine Learning
AI and the Democratization of Cybercrime
cacm.acm.org·10h
🎯Threat Hunting
Not everything needs GPT. Sometimes a simple equation will do
danielball.com·13h·
Discuss: Hacker News
🧠Machine Learning
OCSVM-Guided Representation Learning for Unsupervised Anomaly Detection
arxiv.org·1d
🧠Machine Learning
Cracking the code: resilient defense and rapid recovery
techradar.com·12h
💾Persistence Strategies
Fake Videos Just Got Scarier. Luckily, This AI Can Spot Them All
scitechdaily.com·1d
🌍Cultural Algorithms
Digital Forensics Round-Up, July 30 2025
forensicfocus.com·1d
🚨Incident Response
New AI tool illuminates 'dark side' of the human genome
phys.org·3h
🧬Copy Number Variants
What happens when line between authentic and artificial is impossible to draw?
syntheticauth.ai·10h·
Discuss: Hacker News
🔐Quantum Security
(1) Fitting hierarchical models in genetics, (2) A Stan model that runs faster with 400,000 latent parameters, (3) Super-scalable penalized maximum likelihood i...
statmodeling.stat.columbia.edu·10h
🧮Kolmogorov Bounds
Threat Analysis - Public Administration - May -> July of 2025
cstromblad.com·17h
🕵️Penetration Testing
Step3
stepfun.ai·6h·
Discuss: Hacker News
🌊Streaming Algorithms
Custom TensorFlow Training Loops Made Easy
hackernoon.com·10h
🕸️Tensor Networks
Beyond the Hype: 4 Ways To Use AI for Cybersecurity Defenses
thenewstack.io·8h
🎯Threat Hunting
Explainability Through Systematicity: The Hard Systematicity Challenge for Artificial Intelligence
arxiv.org·22h
🧠Machine Learning
Unmasking Synthetic Realities in Generative AI: A Comprehensive Review of Adversarially Robust Deepfake Detection Systems
arxiv.org·1d
🧪Archive Fuzzing
How Kimi RL’ed Qualitative Data to Write Better
dbreunig.com·11h·
Discuss: Hacker News
🧠Intelligence Compression
Deriving Rope the Proper Way
nor-blog.pages.dev·5h·
Discuss: Hacker News
📐Linear Algebra
Decoding the Magic: Logistic Regression, Cross-Entropy, and Optimization
dev.to·1h·
Discuss: DEV
🧠Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap