Skip to content

Research

Page 22 of 40

Hybrid Anomaly Detection for Bullion Coin Authentication Leveraging Acoustic Signature Analysis

research note

Hybrid Anomaly Detection for Bullion Coin Authentication Leveraging Acoustic Signature Analysis

·7 min read·Krzysztof Siwek, Tran Hoai Linh, Tomasz Gryczka et al.

This paper addresses the critical problem of authenticating bullion coins, which is increasingly challenging due to the sophistication of counterfeit coins that are visually nearly indistinguishabl…

researchacoustic-signature-analysisanomaly-detectionautoencodersnon-destructive-testing

Read note → Source paper ↗

Index-Assisted Stratified Sampling for Online Aggregation

research note

Index-Assisted Stratified Sampling for Online Aggregation

·10 min read·Yunnan Yu, Zhuoyue Zhao

This paper tackles a very specific bottleneck in sampling-based approximate query processing: index-assisted online aggregation can give low-latency answers, but for skewed data or selective predic…

researchapproximate-query-processingonline-aggregationstratified-samplingindex-assisted-sampling

Read note → Source paper ↗

'It depends on where AI is used': Players' attitude patterns and evaluative logics toward different AI applications in digital games

research note

'It depends on where AI is used': Players' attitude patterns and evaluative logics toward different AI applications in digital games

·8 min read·Ting-Chen Hsu, Jiangxu Lin, Wenran Chen et al.

This paper asks a narrower question than “do players like AI in games?” It argues that player acceptance depends on the site of intervention: the same AI label is evaluated differently when it driv…

researchplayer-attitudesgame-aithematic-analysishuman-ai-interaction

Read note → Source paper ↗

PuzzleMark: Implicit Jigsaw Learning for Robust Code Dataset Watermarking in Neural Code Completion Models

research note

PuzzleMark: Implicit Jigsaw Learning for Robust Code Dataset Watermarking in Neural Code Completion Models

·10 min read·Haocheng Huang, Yuchen Chen, Weisong Sun et al.

PuzzleMark addresses a very practical but underexplored problem: how to watermark high-value code datasets so an owner can later prove unauthorized use by neural code completion models, while avoid…

researchcode-watermarkingneural-code-completioncarrier-selectionblack-box-verification

Read note → Source paper ↗

The DAMSA Experiment

research note

The DAMSA Experiment

·13 min read·Prithak Bhattarai, Andrew Brandt, Alan Bross et al.

DAMSA is a proposed very-short-baseline beam-dump experiment designed to search for short-lived particles that decay too early to be efficiently seen in conventional long-baseline beam-dump setups

researchbeam-dumpdark-sectoraxion-like-particlesshort-baseline

Read note → Source paper ↗

Articles are CC BY 4.0 — feel free to quote with attribution