Skip to content
  • 0 Votes
    1 Posts
    0 Views
    h4ckernews@mastodon.socialH
    Missile Defense Is NP-Completehttps://smu160.github.io/posts/missile-defense-is-np-complete/#HackerNews #MissileDefense #NPComplete #Algorithms #ComputerScience #HackerNews
  • 0 Votes
    1 Posts
    4 Views
    chigaze@mstdn.caC
    In an era when tech bros are ruining everything it's good to remember that before 1980s marketing attempted to drive women out of computing they pioneered it. #InternationalWomensDay #computing #computerscience #computerhistoryhttps://www.gracehopper.com/blog/15-remarkable-women-programmers-who-transformed-the-tech-worldhttps://allthatsinteresting.com/margaret-hamiltonhttps://web.archive.org/web/20191130180008/https://www.nytimes.com/2019/02/13/magazine/women-coding-computer-programming.html
  • 0 Votes
    1 Posts
    0 Views
    journeysinfilm@hcommons.socialJ
    Celebrate women of computing history with film for Women's History Month! These outstanding films about heroes of computing will get students of all genders excited about computer and IT careers. For grades 4 and up. Breaking Enigma Her War, Her Story Hidden FiguresLearn more:https://journeysinfilm.org/three-films-that-celebrate-heroes-of-computing/?utm_source=Mastodon&utm_medium=Social+Media&utm_campaign=whm&utm_content=Link @histodons#WomensHistoryMonth #WomensHistory #InternationalWomensDay #ComputerScience #Education #History #Histodons #Homeschooling #HiddenFigures #BletchleyPark
  • 0 Votes
    1 Posts
    3 Views
    academiceurope@mstdn.businessA
    Job AlertDoctoral Candidate in computer vision and machine learning for developing novel deep learning methodDeadline: 2026-03-30Location: Switzerland - Zürichhttps://www.academiceurope.com/ads/doctoral-candidate-in-computer-vision-and-machine-learning-for-developing-novel-deep-learning-method/#hiring #ComputerScience #DataScience #ElectricalEngineering #Mathematics #phd #computervision
  • 0 Votes
    2 Posts
    3 Views
    tajuyantachyon@chaos.socialT
    @gutenberg_org An 8.5" Floppy 🤩They came with 120 kB capacity, capable for thousands of lines of code. In basic.
  • 0 Votes
    1 Posts
    4 Views
    prometheus@infosec.exchangeP
    Large-scale online deanonymization with LLMsFrom Cornel University Computer Science We show that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker News users and Anthropic Interviewer participants at high precision, given pseudonymous online profiles and conversations alone, matching what would take hours for a dedicated human investigator. We then design attacks for the closed-world setting. Given two databases of pseudonymous individuals, each containing unstructured text written by or about that individual, we implement a scalable attack pipeline that uses LLMs to: (1) extract identity-relevant features, (2) search for candidate matches via semantic embeddings, and (3) reason over top candidates to verify matches and reduce false positives. Compared to classical deanonymization work (e.g., on the Netflix prize) that required structured data, our approach works directly on raw user content across arbitrary platforms. We construct three datasets with known ground-truth data to evaluate our attacks. The first links Hacker News to LinkedIn profiles, using cross-platform references that appear in the profiles. Our second dataset matches users across Reddit movie discussion communities; and the third splits a single user's Reddit history in time to create two pseudonymous profiles to be matched. In each setting, LLM-based methods substantially outperform classical baselines, achieving up to 68% recall at 90% precision compared to near 0% for the best non-LLM method. Our results show that the practical obscurity protecting pseudonymous users online no longer holds and that threat models for online privacy need to be reconsidered.Simon Lermen, Daniel Paleka, Joshua Swanson, Michael Aerni, Nicholas Carlini, Florian Tramèhttps://arxiv.org/abs/2602#computerscience #cornelluniversity #AiResearch #privacy #anonymity #llm #HackNews #athropic #pseudonymity #deanonymization
  • 0 Votes
    1 Posts
    5 Views
    prometheus@infosec.exchangeP
    Large-scale online deanonymization with LLMsSimon Lermen, Daniel Paleka, Joshua Swanson, Michael Aerni, Nicholas Carlini, Florian TramèFrom Cornel University Computer Science We show that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker News users and Anthropic Interviewer participants at high precision, given pseudonymous online profiles and conversations alone, matching what would take hours for a dedicated human investigator. We then design attacks for the closed-world setting. Given two databases of pseudonymous individuals, each containing unstructured text written by or about that individual, we implement a scalable attack pipeline that uses LLMs to: (1) extract identity-relevant features, (2) search for candidate matches via semantic embeddings, and (3) reason over top candidates to verify matches and reduce false positives. Compared to classical deanonymization work (e.g., on the Netflix prize) that required structured data, our approach works directly on raw user content across arbitrary platforms. We construct three datasets with known ground-truth data to evaluate our attacks. The first links Hacker News to LinkedIn profiles, using cross-platform references that appear in the profiles. Our second dataset matches users across Reddit movie discussion communities; and the third splits a single user's Reddit history in time to create two pseudonymous profiles to be matched. In each setting, LLM-based methods substantially outperform classical baselines, achieving up to 68% recall at 90% precision compared to near 0% for the best non-LLM method. Our results show that the practical obscurity protecting pseudonymous users online no longer holds and that threat models for online privacy need to be reconsidered.https://arxiv.org/abs/2602.16800#computerscience #cornelluniversity #AiResearch #privacy #anonymity #llm #HackNews #athropic #pseudonymity #deanonymization
  • 0 Votes
    1 Posts
    3 Views
    abucci@buc.ciA
    There are physical systems with the following property: depending on how you choose to measure the system and how you choose to process your measurements, the system can appear to be any computational system you like.Even a particularly simple system such as a spinning disk that is painted half white ("1") and half black ("0"), where what we observe is a string of 0's and 1's corresponding to the colors, can have this property.#ComputerScience #systems #ComplexSystems #observability #computationalism
  • 0 Votes
    1 Posts
    1 Views
    academiceurope@mstdn.businessA
    Job AlertSenior Researcher Advanced Machine Learning (f/m/d) Deadline: open until filled  Location: Austria - St. Pölten  https://www.academiceurope.com/ads/senior-researcher-advanced-machine-learning-f-m-d/#hiring #MachineLearning #AIJobs #computerscience #informatics #DataScience #PhDJobs