Kickstarted a credit-card-sized dice replacement.
For IRL D&D it was fine, but dials spin forever. Made dice tray pointless, while less satisfying. Even though I choose yellow text on black, hard for me to see in mood-lit basement on table
For Shadowrun, 6D6 is embarrassingly insufficient, given I regularly roll 14D6. The VTT roller is far better (since it does the math on pools and successes).
But they’re sturdy and hefty! Which means my mini metal dice are lighter an…
Inside job
When an account gets hacked, social media giant Meta offers little support, spawning a shadowy network of brokers and Meta employees who profit from helping users get back online
https://www.theglobeandmail.com/canada/art
Good film... but OMG my son lost his everlovin' mind watching 'A #Minecraft Movie', screaming at not just the 'Chicken Jockey' but also the 'music', 'mods', YouTubers, 'Alex' & more.
✅ ‘A Minecraft Movie’ Ends Its Theatrical Run. How Much Did It Make?
Tree-Structured Parzen Estimator Can Solve Black-Box Combinatorial Optimization More Efficiently
Kenshin Abe, Yunzhuo Wang, Shuhei Watanabe
https://arxiv.org/abs/2507.08053 https://arxiv.org/pdf/2507.08053 https://arxiv.org/html/2507.08053
arXiv:2507.08053v1 Announce Type: new
Abstract: Tree-structured Parzen estimator (TPE) is a versatile hyperparameter optimization (HPO) method supported by popular HPO tools. Since these HPO tools have been developed in line with the trend of deep learning (DL), the problem setups often used in the DL domain have been discussed for TPE such as multi-objective optimization and multi-fidelity optimization. However, the practical applications of HPO are not limited to DL, and black-box combinatorial optimization is actively utilized in some domains, e.g., chemistry and biology. As combinatorial optimization has been an untouched, yet very important, topic in TPE, we propose an efficient combinatorial optimization algorithm for TPE. In this paper, we first generalize the categorical kernel with the numerical kernel in TPE, enabling us to introduce a distance structure to the categorical kernel. Then we discuss modifications for the newly developed kernel to handle a large combinatorial search space. These modifications reduce the time complexity of the kernel calculation with respect to the size of a combinatorial search space. In the experiments using synthetic problems, we verified that our proposed method identifies better solutions with fewer evaluations than the original TPE. Our algorithm is available in Optuna, an open-source framework for HPO.
toXiv_bot_toot
A Neurosymbolic Framework for Interpretable Cognitive Attack Detection in Augmented Reality
Rongqian Chen, Allison Andreyev, Yanming Xiu, Mahdi Imani, Bin Li, Maria Gorlatova, Gang Tan, Tian Lan
https://arxiv.org/abs/2508.09185
Side view of a decorated electric box inspired by the anime となりのトトロ (My Neighbor Totoro)
#photo #photography #ithaca #art
SLIP: Soft Label Mechanism and Key-Extraction-Guided CoT-based Defense Against Instruction Backdoor in APIs
Zhengxian Wu, Juan Wen, Wanli Peng, Haowei Chang, Yinghan Zhou, Yiming Xue
https://arxiv.org/abs/2508.06153
Urban Solitude IV 🈳
城市孤独 IV 🈳
📷 Pentax MX
🎞️Fujifilm Neopan SS, expired 1995
buy me ☕️ ?/请我喝杯☕️?
#filmphotography
Rethinking the Privacy of Text Embeddings: A Reproducibility Study of "Text Embeddings Reveal (Almost) As Much As Text"
Dominykas Seputis, Yongkang Li, Karsten Langerak, Serghei Mihailov
https://arxiv.org/abs/2507.07700
Spectral Masking and Interpolation Attack (SMIA): A Black-box Adversarial Attack against Voice Authentication and Anti-Spoofing Systems
Kamel Kamel, Hridoy Sankar Dutta, Keshav Sood, Sunil Aryal
https://arxiv.org/abs/2509.07677
Efficient optimization of expensive black-box simulators via marginal means, with application to neutrino detector design
Hwanwoo Kim, Simon Mak, Ann-Kathrin Schuetz, Alan Poon
https://arxiv.org/abs/2508.01834

Efficient optimization of expensive black-box simulators via marginal means, with application to neutrino detector design
With advances in scientific computing, computer experiments are increasingly used for optimizing complex systems. However, for modern applications, e.g., the optimization of nuclear physics detectors, each experiment run can require hundreds of CPU hours, making the optimization of its black-box simulator over a high-dimensional space a challenging task. Given limited runs at inputs $\mathbf{x}_1, \cdots, \mathbf{x}_n$, the best solution from these evaluated inputs can be far from optimal, part…
Transferable Direct Prompt Injection via Activation-Guided MCMC Sampling
Minghui Li, Hao Zhang, Yechao Zhang, Wei Wan, Shengshan Hu, pei Xiaobing, Jing Wang
https://arxiv.org/abs/2509.07617
Algorithmic Complexity Attacks on All Learned Cardinality Estimators: A Data-centric Approach
Yingze Li, Xianglong Liu, Dong Wang, Zixuan Wang, Hongzhi Wang, Kaixing Zhang, Yiming Guan
https://arxiv.org/abs/2507.07438
Componentwise Automata Learning for System Integration (Extended Version)
Hiroya Fujinami, Masaki Waga, Jie An, Kohei Suenaga, Nayuta Yanagisawa, Hiroki Iseri, Ichiro Hasuo
https://arxiv.org/abs/2508.04458
Trust-region Filter Algorithms utilising Hessian Information for Grey-Box Optimisation
Gul Hameed, Tao Chen, Antonio del Rio Chanona, Lorenz T. Biegler, Michael Short
https://arxiv.org/abs/2509.01651
The current bane of my life. Those who know what this is, know my pain.
👊 Building my own paper tape punch
#hardware #technology
If you need me, I'll be in my office.
Today has been mainly about stripping down my favourite mountain bike for repainting and renovation.
#BikeTooter
So arguably the Pac-Man ghost logic is the exact opposite of “AI”.
It’s extremely well defined behavior based on very basic deterministic algorithms that are so simple a 8-year old player can understand them and anticipate them correctly for those high-scores.
The game actually is famous for the simple enemy logic and studied by games designers for it.
Pac-Man enemy behavior:
deterministic, well-defined algorithm that can easily be executed on the most primitive* computer hardware
“AI”:
black-box algorithm with indeterministic behavior that requires a metric shitload of compute
—
*By “primitive computer hardware” I mean that the Pac-Man arcade machine runs on a Zilog Z80 CPU with 8,500 transistors.The CPU in the phone you are reading this on has (latest iPhone as example) 15 billion transistors or so (almost 2 million times more) and runs tens of thousands of times faster.
Replaced article(s) found for cs.LG. https://arxiv.org/list/cs.LG/new
[5/5]:
- Wild refitting for black box prediction
Martin J. Wainwright
…
Urban Snaps 📸
城市抓拍 📸
📷 Pentax MX
🎞️Fujifilm Neopan SS, expired 1995
buy me ☕️ ?/请我喝杯☕️?
#filmphotography
Quantifying Cross-Attention Interaction in Transformers for Interpreting TCR-pMHC Binding
Jiarui Li, Zixiang Yin, Haley Smith, Zhengming Ding, Samuel J. Landry, Ramgopal R. Mettu
https://arxiv.org/abs/2507.03197
Correct Black-Box Monitors for Distributed Deadlock Detection: Formalisation and Implementation (Technical Report)
Rados{\l}aw Jan Rowicki, Adrian Francalanza, Alceste Scalas
https://arxiv.org/abs/2508.14851
ProvX: Generating Counterfactual-Driven Attack Explanations for Provenance-Based Detection
Weiheng Wu, Wei Qiao, Teng Li, Yebo Feng, Zhuo Ma, Jianfeng Ma, Yang Liu
https://arxiv.org/abs/2508.06073
Demystifying Sequential Recommendations: Counterfactual Explanations via Genetic Algorithms
Domiziano Scarcelli, Filippo Betello, Giuseppe Perelli, Fabrizio Silvestri, Gabriele Tolomei
https://arxiv.org/abs/2508.03606
Does magnetic field promote or suppress fragmentation in AGN disks? Results from local shearing box simulations with simple cooling
Tsun Hin Navin Tsung, Mitchell C. Begelman, Philip J. Armitage, Yan-Fei Jiang, Hannalore J. Gerling-Dunsmore
https://arxiv.org/abs/2507.21991
Investigating Advanced Reasoning of Large Language Models via Black-Box Interaction
Congchi Yin, Tianyi Wu, Yankai Shu, Alex Gu, Yunhan Wang, Jun Shao, Xun Jiang, Piji Li
https://arxiv.org/abs/2508.19035
Save me your fake nostalgia, people. There is only one true #BSOD, and it never was blue. 💣
My project that I completed yesterday. An old patio umbrella base, a fence post from a big box store, two old wall brackets for flower baskets, a couple of bird feeders that were on sale at CanTire, and a repurposed squirrel baffle. About $100 in total cost, not including the black oil seed. It's positioned right outside our sunroom for bifd watching, by us and our cat Casper.
#DIY #Birdwatching #Gardening
Towards Interpretable PolSAR Image Classification: Polarimetric Scattering Mechanism Informed Concept Bottleneck and Kolmogorov-Arnold Network
Jinqi Zhang, Fangzhou Han, Di Zhuang, Lamei Zhang, Bin Zou, Li Yuan
https://arxiv.org/abs/2507.03315
Black-box optimization using factorization and Ising machines
Ryo Tamura, Yuya Seki, Yuki Minamoto, Koki Kitai, Yoshiki Matsuda, Shu Tanaka, Koji Tsuda
https://arxiv.org/abs/2507.18003
Black-Box Test Code Fault Localization Driven by Large Language Models and Execution Estimation
Ahmadreza Saboor Yaraghi, Golnaz Gharachorlu, Sakina Fatima, Lionel C. Briand, Ruiyuan Wan, Ruifeng Gao
https://arxiv.org/abs/2506.19045
Uneven Lives VII 👁️
不工整人生 VII 👁️
📷 Minolta Hi-Matic AF
🎞️ERA 100, expired 1994
#filmphotography #Photography #blackandwhite
Towards a 3D Transfer-based Black-box Attack via Critical Feature Guidance
Shuchao Pang, Zhenghan Chen, Shen Zhang, Liming Lu, Siyuan Liang, Anan Du, Yongbin Zhou
https://arxiv.org/abs/2508.15650
A Foundation Model for Chest X-ray Interpretation with Grounded Reasoning via Online Reinforcement Learning
Qika Lin, Yifan Zhu, Bin Pu, Ling Huang, Haoran Luo, Jingying Ma, Zhen Peng, Tianzhe Zhao, Fangzhi Xu, Jian Zhang, Kai He, Zhonghong Ou, Swapnil Mishra, Mengling Feng
https://arxiv.org/abs/2509.03906
Hijacking JARVIS: Benchmarking Mobile GUI Agents against Unprivileged Third Parties
Guohong Liu, Jialei Ye, Jiacheng Liu, Yuanchun Li, Wei Liu, Pengzhi Gao, Jian Luan, Yunxin Liu
https://arxiv.org/abs/2507.04227
Explainable Knowledge Graph Retrieval-Augmented Generation (KG-RAG) with KG-SMILE
Zahra Zehtabi Sabeti Moghaddam, Zeinab Dehghani, Maneeha Rani, Koorosh Aslansefat, Bhupesh Kumar Mishra, Rameez Raja Kureshi, Dhavalkumar Thakker
https://arxiv.org/abs/2509.03626
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
Biao Yi, Tiansheng Huang, Sishuo Chen, Tong Li, Zheli Liu, Zhixuan Chu, Yiming Li
https://arxiv.org/abs/2506.16447
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for Large-scale Model Distribution
Zhicheng Zhang, Peizhuo Lv, Mengke Wan, Jiang Fang, Diandian Guo, Yezeng Chen, Yinlong Liu, Wei Ma, Jiyan Sun, Liru Geng
https://arxiv.org/abs/2507.20650
Removing Box-Free Watermarks for Image-to-Image Models via Query-Based Reverse Engineering
Haonan An, Guang Hua, Hangcheng Cao, Zhengru Fang, Guowen Xu, Susanto Rahardja, Yuguang Fang
https://arxiv.org/abs/2507.18034
PREE: Towards Harmless and Adaptive Fingerprint Editing in Large Language Models via Knowledge Prefix Enhancement
Xubin Yue, Zhenhua Xu, Wenpeng Xing, Jiahui Yu, Mohan Li, Meng Han
https://arxiv.org/abs/2509.00918