Tootfinder

Opt-in global Mastodon full text search. Join the index!

@arXiv_csCL_bot@mastoxiv.page
2025-10-01 11:35:47

Generating Difficult-to-Translate Texts
Vil\'em Zouhar, Wenda Xu, Parker Riley, Juraj Juraska, Mara Finkelstein, Markus Freitag, Dan Deutsch
arxiv.org/abs/2509.26592

@arXiv_csCR_bot@mastoxiv.page
2025-10-01 09:32:18

SoK: Systematic analysis of adversarial threats against deep learning approaches for autonomous anomaly detection systems in SDN-IoT networks
Tharindu Lakshan Yasarathna, Nhien-An Le-Khac
arxiv.org/abs/2509.26350

@arXiv_mathNA_bot@mastoxiv.page
2025-10-01 09:43:58

HANN: Homotopy auxiliary neural network for solving nonlinear algebraic equations
Ling-Zhe Zai, Lei-Lei Guo, Zhi-Yong Zhang
arxiv.org/abs/2509.26358

@NFL@darktundra.xyz
2025-10-08 00:26:36

Weaknesses of each one-loss team, plus Week 6 fantasy prep nytimes.com/athletic/6698191/2

@Techmeme@techhub.social
2025-11-24 14:40:52

Amazon unveils its Autonomous Threat Analysis system, born from a 2024 internal hackathon, to use AI agents competing in teams to identify vulnerabilities (Lily Hay Newman/Wired)
wired.com/story/amazon-autonom

@NFL@darktundra.xyz
2025-10-10 13:59:27

Reid's debut NFL draft QB Hot Board: Strengths and weaknesses for the top 14 passers espn.com/nfl/draft2026/story/_

@curiouscat@fosstodon.org
2025-10-15 18:02:31

...normally that won’t be the case, even when the person seems nearly totally to blame (and that isn’t even a very common situation) normally there are obvious weaknesses in the system that put them in the place to fail and will likely put anyone else in the same place in the future.

@arXiv_csLG_bot@mastoxiv.page
2025-10-08 10:49:09

Neighborhood-Adaptive Generalized Linear Graph Embedding with Latent Pattern Mining
S. Peng, L. Hu, W. Zhang, B. Jie, Y. Luo
arxiv.org/abs/2510.05719

@raiders@darktundra.xyz
2025-10-08 12:32:50

1 Drive Explains Raiders' Offensive Struggles si.com/nfl/raiders/las-vegas-z

@cowboys@darktundra.xyz
2025-11-04 15:30:43

TRADE: Cowboys land potential impact defender Logan Wilson insidethestar.com/trade-cowboy

@arXiv_csSE_bot@mastoxiv.page
2025-10-02 10:32:41

Semantics-Aligned, Curriculum-Driven, and Reasoning-Enhanced Vulnerability Repair Framework
Chengran Yang, Ting Zhang, Jinfeng Jiang, Xin Zhou, Haoye Tian, Jieke Shi, Junkai Chen, Yikun Li, Eng Lieh Ouh, Lwin Khin Shar, David Lo
arxiv.org/abs/2510.01002

@arXiv_csPL_bot@mastoxiv.page
2025-10-10 07:44:48

Type, Ability, and Effect Systems: Perspectives on Purity, Semantics, and Expressiveness
Yuyan Bao, Tiark Rompf
arxiv.org/abs/2510.07582 ar…

@arXiv_csCR_bot@mastoxiv.page
2025-10-15 09:00:11

Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications
Urvashi Kishnani, Sanchari Das
arxiv.org/abs/2510.12031

@arXiv_csMA_bot@mastoxiv.page
2025-10-07 07:45:17

LegalSim: Multi-Agent Simulation of Legal Systems for Discovering Procedural Exploits
Sanket Badhe
arxiv.org/abs/2510.03405 arxiv.org/pdf/2…

@arXiv_csCL_bot@mastoxiv.page
2025-10-03 10:55:51

InfoMosaic-Bench: Evaluating Multi-Source Information Seeking in Tool-Augmented Agents
Yaxin Du, Yuanshuo Zhang, Xiyuan Yang, Yifan Zhou, Cheng Wang, Gongyi Zou, Xianghe Pang, Wenhao Wang, Menglan Chen, Shuo Tang, Zhiyu Li, Siheng Chen
arxiv.org/abs/2510.02271

@arXiv_csCR_bot@mastoxiv.page
2025-10-06 09:45:09

MALF: A Multi-Agent LLM Framework for Intelligent Fuzzing of Industrial Control Protocols
Bowei Ning, Xuejun Zong, Kan He
arxiv.org/abs/2510.02694

@arXiv_csCR_bot@mastoxiv.page
2025-10-08 10:12:29

"Your Doctor is Spying on You": An Analysis of Data Practices in Mobile Healthcare Applications
Luke Stevenson, Sanchari Das
arxiv.org/abs/2510.06015