Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Communications of the ACM
cacm.acm.org
Malicious
AI Models
Undermine
Software Supply-Chain Security
cacm.acm.org
·
50w
Revenge
of the
Bots
cacm.acm.org
·
50w
Is AI Making
Coders
Obsolete
?
cacm.acm.org
·
50w
AI and Art
cacm.acm.org
·
51w
Students in Advanced
Computational
Fields Are Accelerated Early
Adapters
of Generative AI Technology
cacm.acm.org
·
51w
Computer Science and the Law
cacm.acm.org
·
51w
Practical
Applications
of AI Agents
cacm.acm.org
·
51w
Who is
Liable
When AI Goes Wrong?
cacm.acm.org
·
51w
Analyzing
Krazy
Kode
cacm.acm.org
·
51w
Towards
a Better
CS
Conference Experience
cacm.acm.org
·
51w
·
Hacker News
A Growing
Concern
in
Cybersecurity
cacm.acm.org
·
51w
Is AI Security Work Best
Done
in
Academia
or Industry? Part 1
cacm.acm.org
·
51w
·
Hacker News
The
Collapse
of
GPT
cacm.acm.org
·
51w
·
Hacker News
« Page 20
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help