The Ruby vulnerability is not easy to exploit, but allows an attacker to read sensitive data, start code, and install ...
A component of the Alethic ISM framework that executes Python code in a semi-secure environment using RestrictedPython. This processor allows for input streams and events to process inbound messages ...
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig.
Joint Degradation-Aware Arbitrary-Scale Super-Resolution for Variable-Rate Extreme Image Compression
Abstract: Recent diffusion-based extreme image compression methods have demonstrated remarkable performance at ultra-low bitrates (0.10.1 bpp). However, most approaches require training separate ...
Abstract: Dexterous in-hand manipulation (IHM) for arbitrary objects is challenging due to the rich and subtle contact process. Variable-friction manipulation is an alternative approach to dexterity, ...
A Fledge notification delivery plugin that runs an arbitrary Python 3 script - fledge-iot/fledge-notify-python35 ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results