FedUP: Efficient Pruning-based Federated Unlearning for Model Poisoning Attacks
Nicol\`o Romandini, Cristian Borcea, Rebecca Montanari, Luca Foschini
https://arxiv.org/abs/2508.13853
PDLRecover: Privacy-preserving Decentralized Model Recovery with Machine Unlearning
Xiangman Li, Xiaodong Wu, Jianbing Ni, Mohamed Mahmoud, Maazen Alsabaan
https://arxiv.org/abs/2506.15112
packet_delays: Internet packet delays (2002)
A network representing the difference in delay observed by packet probes sent from a computer at Rice University to similar machines at different universities, in c.2002. The edge weight denotes the difference in delay of the packet in milliseconds.
This network has 10 nodes and 9567 edges.
Tags: Technological, Communication, Weighted
Mollissez pas, je compte bien faire une capture d'écran au passage du million. #DuplombDansLAile
Sub-Millisecond Event-Based Eye Tracking on a Resource-Constrained Microcontroller
Marco Giordano, Pietro Bonazzi, Luca Benini, Michele Magno
https://arxiv.org/abs/2508.13244 ht…
This story is cute: A malicious "Solidity" (that's the smart contract language Ethereum and other blockchains use) extension for Cursor, the Vibe-Coding Editor included code that steals your tokens/coins.
I find it funny for two reasons:
- Blockchainers love talking about how you need to verify things you interact with but someone wasn't checking if they have the right extension
- Programming smart contracts is hard because it's a massively hostile envir…
i was put in charge of three grandchildren for a few hours yesterday so we headed straight to ben & jerry's to split a milkshake, then explored the state theater (and even sneaked into a movie but later got thrown out for horsing around on the escalator), then i gave a nickel tour of angell/mason/haven halls, then they chased squirrels on the diag which took longer than you might think, then we looked in all the windows in nickels arcade. it all went slowly and well.
Beneath the Mask: Can Contribution Data Unveil Malicious Personas in Open-Source Projects?
Ruby Nealon
https://arxiv.org/abs/2508.13453 https://arxiv.org/p…
Privacy-Preserving Federated Learning against Malicious Clients Based on Verifiable Functional Encryption
Nina Cai, Jinguang Han
https://arxiv.org/abs/2506.12846