unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Pre-Training AnLLMs: Leveraging RedPajama Data for Enhanced Performance
Authors:(1) Jianhui Pang, from the University of Macau, and work was done when Jianhui Pang and Fa...
2024-10-11 04:2:5 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
anchor
anllm
perplexity
jianhui
ye
Anchor-based Large Language Models: Experiments and Implementation
Authors:(1) Jianhui Pang, from the University of Macau, and work was done when Jianhui Pang and Fa...
2024-10-11 04:1:40 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
anchor
anllm
experiments
fanghua
jianhui
Improving Real-Time Inference with Anchor Tokens
Authors:(1) Jianhui Pang, from the University of Macau, and work was done when Jianhui Pang and Fa...
2024-10-11 04:1:30 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
anchor
inference
caches
ye
fanghua
The Role of Anchor Tokens in Self-Attention Networks
Authors:(1) Jianhui Pang, from the University of Macau, and work was done when Jianhui Pang and Fa...
2024-10-11 04:1:4 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
anchor
sequences
fanghua
pang
jianhui
Unlocking the Mechanics of Decoder-Only Transformers and Self-Attention
Authors:(1) Jianhui Pang, from the University of Macau, and work was done when Jianhui Pang and Fa...
2024-10-11 04:0:56 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
inference
pang
anchor
jianhui
ye
How Anchor Tokens Transform Sequence Information Compression in LLMs
Authors:(1) Jianhui Pang, from the University of Macau, and work was done when Jianhui Pang and Fa...
2024-10-11 04:0:49 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
anchor
ye
jianhui
fanghua
gist
Anchor-based Large Language Models
Authors:(1) Jianhui Pang, from the University of Macau, and work was done when Jianhui Pang and Fa...
2024-10-11 04:0:42 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
anchor
inference
llms
memory
efficiency
How to Use Hugging Face Models with Ollama
Ollama is one of my favorite ways to experiment with local AI models. It’s a CLI that also runs an A...
2024-10-11 03:54:18 | 阅读: 3 |
收藏
|
Unsupervised Learning - danielmiessler.com
ollama
modelfile
hugging
orenguteng
lexi
OpenAI disrupts 20 campaigns to misuse its tech as federal officials mull international use of AI
OpenAI said it has disrupted more than 20 operations this year by nation-states and affiliates to a...
2024-10-11 03:46:24 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
water
einstein
openai
israel
How the Auth0 and Aembit Integration Boosts Non-Human Access Security
Thankfully, Auth0 has also implemented the ability for developers to outsource this element of acce...
2024-10-11 03:45:10 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
client
workload
aembit
auth0
developers
[StalkPhish.io] Phishing Kit family enrichment
Since last summer, StalkPhish.io, our advanced platform dedicated to combating bank fraud, phishi...
2024-10-11 03:16:47 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - stalkphish.com
phishing
stalkphish
kits
phishingkit
analysis
权威机构推荐:360引领中国网络安全软件技术发展趋势
IDC TechScape近日,全球领先的IT市场研究和咨询公司IDC发布《IDC TechScape:中国网络安全软件技术发展路线图,2024》报告(Doc#CHC52608824,2024年10月...
2024-10-11 03:12:0 | 阅读: 13 |
收藏
|
360数字安全 - mp.weixin.qq.com
安全
网络
威胁
浏览器
攻击
重磅!国家发展改革委、国家数据局等部门联合印发《国家数据标准体系建设指南》
近日,国家发展改革委、国家数据局、中央网信办、工业和信息化部、财政部、国家标准委联合印发了《国家数据标准体系建设指南》(以下简称《建设指南》),此举标志着我国数据标准体系建设的全面启动。《建设指南》旨...
2024-10-11 03:12:0 | 阅读: 8 |
收藏
|
360数字安全 - mp.weixin.qq.com
数据
安全
流通
网络
Remediation vs. Mitigation: The Choice Between Instant or Indirect Action
Organizations are constantly faced with the challenge of addressing vulnerabilities...
2024-10-11 03:0:28 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
permanent
veriti
immediate
remediate
US, UK warn of Russian APT29 hackers targeting Zimbra, TeamCity servers
error code: 1106...
2024-10-11 03:0:22 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
Marriott settles with FTC, to pay $52 million over data breaches
error code: 1106...
2024-10-11 03:0:21 | 阅读: 1 |
收藏
|
Over Security - Cybersecurity news aggregator - www.bleepingcomputer.com
1106
USENIX NSDI ’24 – Resiliency at Scale: Managing Google’s TPUv4 Machine Learning Supercomputer
Authors/Presenters:Yazhou Zu, Alireza Ghaffarkhah, Hoang-Vu Dang, Brian Towles, Steven...
2024-10-11 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
presenters
vu
yazhou
Vulnerability Prioritization & the Magic 8 Ball
Last month marks 25 years of operation for the CVE (Common Vulnerabilities and Exposure...
2024-10-11 02:57:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
eclypsium
ball
shady
Mozilla fixes critical Firefox bug exploited in the wild
Mozilla has patched a serious security flaw in its Firefox web browser that the company said is bei...
2024-10-11 02:46:26 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
mozilla
security
memory
exploited
attackers
Mozilla 修复已遭利用的 Firefox 0day漏洞
聚焦源代码安全,网罗国内外最新资讯!编译:代码卫士Mozilla 发布紧急安全更新,修复了 Firefox 浏览器中的一个严重的释放后使用漏洞 (CVE-2024-9680),目前该漏洞已遭利用。该...
2024-10-11 02:16:0 | 阅读: 17 |
收藏
|
代码卫士 - mp.weixin.qq.com
漏洞
修复
mozilla
卫士
安全
Previous
212
213
214
215
216
217
218
219
Next