Results 121 to 130 of about 10,775 (222)

Guest Editorial: Hardware Reverse Engineering and Obfuscation [PDF]

open access: yesJournal of Hardware and Systems Security, 2018
Domenic Forte, Yousef Iskander
openaire   +1 more source

Human tests for machine models: What lies “Beyond the Imitation Game”?

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract Benchmarking large language models (LLMs) is a key practice for evaluating their capabilities and risks. This paper considers the development of “BIG Bench,” a crowdsourced benchmark designed to test LLMs “Beyond the Imitation Game.” Drawing on linguistic anthropological and ethnographic analysis of the project's GitHub repository, we examine ...
Noya Kohavi, Anna Weichselbraun
wiley   +1 more source

Privacy-Aware Meta-Optics for Person Detection. [PDF]

open access: yesACS Photonics
Tasneem Z   +4 more
europepmc   +1 more source

Medical data sharing and synthetic clinical data generation - maximizing biomedical resource utilization and minimizing participant re-identification risks. [PDF]

open access: yesNPJ Digit Med
Marino S   +11 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy