Active
Recent
Comments
Search
Login
Login
arxiv.org: 653 stories from 201 submitters
2
Sparks of Artificial General Intelligence: Early experiments with GPT-4
pdf
ai
arxiv.org
via
river
2 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
27
An aperiodic monotile
☶
pdf
math
arxiv.org
via
calvin
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
15
GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models
pdf
ai
arxiv.org
via
Corbin
6 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
A classification of S-boxes generated by Orthogonal Cellular Automata
☶
pdf
cryptography
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Mark My Words: Dangers of Watermarked Images in ImageNet
☶
pdf
ai
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Automatic verification of transparency protocols (extended version)
☶
pdf
formalmethods
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
EavesDroid : Eavesdropping User Behaviors via OS Side-Channels on Smartphones
☶
pdf
android
privacy
security
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan
☶
pdf
security
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Modeling and Exploration of Gain Competition Attacks in Optical Network-on-Chip Architectures
☶
pdf
hardware
security
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Exploiting Input Sanitization for Regex Denial of Service
☶
pdf
programming
security
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Optimization and Amplification of Cache Side Channel Signals
☶
pdf
assembly
hardware
security
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Dishing Out DoS: How to Disable and Secure the Starlink User Terminal
☶
pdf
security
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Counterfeit Chip Detection using Scattering Parameter Analysis
☶
pdf
hardware
arxiv.org
via
calvin
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Capstone: A Capability-based Foundation for Trustless Secure Memory Access
hardware
security
arxiv.org
via
asb
26 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Coinductive guide to inductive transformer heads
ai
compsci
haskell
math
arxiv.org
authored by
adamnemecek
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
The Usability of Advanced Type Systems: Rust as a Case Study
plt
rust
arxiv.org
via
mpweiher
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
5
Poisoning Web-Scale Training Datasets is Practical
ai
security
arxiv.org
via
df
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
17
C-rusted: The Advantages of Rust, in C, without the Disadvantages
c
plt
arxiv.org
via
dzwdz
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
22 comments
22
5
CBMC: The C Bounded Model Checker
c
testing
arxiv.org
via
vrthra
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Toolformer: Language Models Can Teach Themselves to Use Tools
ai
arxiv.org
via
azhenley
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation
☶
pdf
hardware
security
arxiv.org
via
calvin
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
☶
pdf
hardware
security
arxiv.org
via
calvin
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
SSO-MONITOR: Fully-Automatic Large-Scale Landscape, Security, & Privacy Analyses of SSO in the Wild
☶
pdf
privacy
web
arxiv.org
via
calvin
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
☶
pdf
security
arxiv.org
via
calvin
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Icicle: A Re-Designed Emulator for Grey-Box Firmware Fuzzing
☶
pdf
reversing
arxiv.org
via
calvin
1 month ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>