Unverified COTS hardware enables persistent attacks in small satellites via SpyChain
securityaffairs.com·3h
Scalable Face Security Vision Foundation Model for Deepfake, Diffusion, and Spoofing Detection
arxiv.org·7h
A Denotational Product Construction for Temporal Verification of Effectful Higher-Order Programs
arxiv.org·7h
Benchmarking Deep Learning Models for Laryngeal Cancer Staging Using the LaryngealCT Dataset
arxiv.org·7h
RO-Bench: Large-scale robustness evaluation of MLLMs with text-driven counterfactual videos
arxiv.org·1d
Audit-of-Understanding: Posterior-Constrained Inference for Mathematical Reasoning in Language Models
arxiv.org·7h
Reasoning as Representation: Rethinking Visual Reinforcement Learning in Image Quality Assessment
arxiv.org·7h
TCMA: Text-Conditioned Multi-granularity Alignment for Drone Cross-Modal Text-Video Retrieval
arxiv.org·7h
Loading...Loading more...