Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Securing the Vote: A Quantum-Resistant E-Voting System

22.12.2025 by Ray Dalio

The system details communication flow within the $Voting\ Phase$ of the E2E-PQ-EVot framework, illustrating how decisions are propagated and tallied during the voting process.

Researchers have developed a new end-to-end verifiable e-voting protocol designed to withstand the threat of quantum computers and ensure secure, transparent elections.

Categories Science

Securing the Quantum Horizon: Encryption for the Cloud

22.12.2025 by Ray Dalio

A quantum cloud architecture facilitates homomorphic addition through the implementation of the Chen algorithm, enabling computations on encrypted data without decryption.

As quantum computing power grows, protecting data in the cloud demands new cryptographic approaches, and this review explores how homomorphic encryption can bridge the gap.

Categories Science

Reviving Lost Audio: Semantic Guidance for Speech Enhancement

22.12.2025 by Ray Dalio

The proposed CogSR architecture establishes a framework for reasoning about and manipulating complex systems, effectively deconstructing established norms to explore the boundaries of operational possibility.

A new framework leverages the power of language models to intelligently restore degraded speech, even from extremely low-bandwidth sources.

Categories Science

Smarter Caching for Faster AI

22.12.2025 by Ray Dalio

The system integrates a chunk-aware key-value placement plan within a paged key-value store, orchestrating recomputation of necessary tokens and fused RoPE to optimize attention mechanisms-a design acknowledging that every architectural decision foreshadows eventual limitations within the serving stack.

A new approach to memory management dramatically improves the speed and efficiency of large language model inference.

Categories Science

Beyond Timelocks: Unlocking Bitcoin’s Hidden Potential

22.12.2025 by Ray Dalio

A new protocol leverages Bitcoin’s existing infrastructure to enable faster, cheaper discovery of assets and applications on the network.

Categories Science

Charging Ahead with Risk: Unmasking Vulnerabilities in EV Payment Systems

21.12.2025 by Ray Dalio

Network traffic analysis, as captured in detailed session logs, reveals the communication patterns exploited during the charging attack, documenting the precise sequence of data exchanged.

A new analysis reveals critical security flaws in ISO 15118 plug and charge technology, potentially exposing electric vehicle owners to malicious attacks during charging sessions.

Categories Science

Beyond the Pixel: Streamlining Immersive Reality with AI

21.12.2025 by Ray Dalio

Point cloud data undergoes successive downsampling to varying resolutions-50%, 25%, and 12.5%-before attribute-based encryption (ABE) secures it at the source, enabling efficient content delivery via a CDN, after which clients utilize AI/ML models to reconstruct full resolution frames following decryption-a process demonstrating a scalable architecture balancing data reduction, security, and client-side processing.

A new framework leverages artificial intelligence and advanced encryption to deliver high-fidelity volumetric experiences with reduced bandwidth and latency.

Categories Science

Unique Wireless Signals Unlock Secure Device IDs

21.12.2025 by Ray Dalio

An access authentication system leverages radio frequency fingerprinting (RFFI) to uniquely identify IoT devices-such as smartphones, cameras, and drones-by capturing and analyzing their wireless signals, filtering noise, extracting distinctive features, and classifying these fingerprints to determine access privileges.

Researchers are leveraging subtle imperfections in radio frequencies to identify devices without relying on traditional authentication methods.

Categories Science

Spotting Rogue Apps: AI-Powered Threat Detection in Microsoft Entra ID

21.12.2025 by Ray Dalio

The comparative analysis of tri-gram similarity across large language models reveals nuanced distinctions in their reasoning processes when assessing permission-related risks, suggesting that while models may arrive at similar conclusions, the pathways they take to do so-and therefore their inherent vulnerabilities-can diverge significantly.

Researchers have developed a new approach to identify potentially malicious applications registered within Microsoft Entra ID by analyzing permission requests and user consent patterns.

Categories Science

When AI Assistants Spill the Beans: A New Privacy Threat

21.12.2025 by Ray Dalio

The dataset construction rigorously defines a process for generating synthetic data, ensuring a controlled and quantifiable foundation for subsequent analysis and model training.

The increasing use of AI agents to access external tools creates a significant privacy risk as sensitive data can be inadvertently leaked through tool interactions.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page42 Page43 Page44 … Page84 Next →
© 2026 Investment Policy • Built with GeneratePress