PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20243Mar 4, 20243
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Published inASecuritySite: When Bob Met AlicePrivacy-Aware Machine Learning: Homomorphic Encryption and Federated LearningAt LastingAsset Limited, we’re working on new models for fraud detection using homomorphic encryption. So let’s have a quick look at some…2d ago12d ago1
Published inASecuritySite: When Bob Met AliceWASM and SecurityThe dream for developers is to port and application so that it runs fully within a browser and which can then integrate with next…4d ago4d ago
Published inASecuritySite: When Bob Met AliceWebAssembly Is Cool!I love (and hate) JavaScript, and is so powerful. But, what can we do about the speed of the code in the browser, and what about the…5d ago15d ago1
The Wonderful FN-DSAAs a student of communciations I was introduced to the Fast Fourier Transform (FFT), and just loved it, in the way it could simply…May 11May 11
Published inASecuritySite: When Bob Met AliceFinally, A New World of Digital TrustFor the Snark’s a peculiar creature, that won’t Be caught in a commonplace way. Do all that you know, and try all that you don’t: Not a…May 62May 62
Stable Diffusion v DALLE-3With image generation, Goodfellow et al. [1] defined the usage of Generative Adversarial Networks (GANs). With this, we can use two Neural…May 5May 5
Published inASecuritySite: When Bob Met AliceLlama: The AI At Everyone’s FingertipFor decades, AI (Artificial Intelligence) was a cute little subject in computer science, and where researchers gathered together in mainly…May 41May 41