Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Semantic Communication’s Unexpected Resilience

26.03.2026 by Ray Dalio

Semantic communication systems demonstrate greater robustness against adversarial attacks than classical systems, consistently requiring a higher minimum attack power [latex]\rho^{\*}[/latex] to achieve comparable distortion in image transmission-a testament to their inherent resilience.

New research reveals that semantic communication systems demonstrate surprising robustness against adversarial attacks, challenging conventional wisdom about their vulnerability.

Categories Science

Building Trust in AI Agent Networks

26.03.2026 by Ray Dalio

As AI agents proliferate, ensuring the security of their interactions is paramount, and this paper reveals hidden vulnerabilities when these protocols are combined.

Categories Science

Beyond the Ground: Securing Space Systems with Decentralized Trust

26.03.2026 by Ray Dalio

The Space Fabric Architecture integrates Secure Execution and Attestation Processes (SEAP) alongside trusted components of Threat Analysis (TA) and Trusted Platform Modules (TPM) to establish a robust and secure system foundation.

A new architecture is proposed to relocate the root of trust to orbital platforms, bolstering the security of satellite networks and the workloads they support.

Categories Science

Beyond the Limit: Building Robust Networks with Faster Distance Queries

26.03.2026 by Ray Dalio

Researchers have devised a new method for creating fault-tolerant distance oracles and spanners that dramatically reduces space complexity without sacrificing accuracy.

Categories Science

Beyond Pixels: Reinforcement Learning Powers Reliable Image Transmission

26.03.2026 by Ray Dalio

The proposed JS3C framework establishes a foundation for systems to navigate inevitable decay, prioritizing sustained functionality over resisting the passage of time-a principle akin to accepting [latex] \Delta t [/latex] as an inherent property of existence rather than an adversary to be overcome.

A new approach to semantic communication utilizes adaptive retransmission strategies to drastically improve the reliability and efficiency of image delivery over challenging network conditions.

Categories Science

Squeezing Secrets From Tiny AI: The Risks to Edge Language Models

26.03.2026 by Ray Dalio

The study delineates a threat framework for knowledge extraction from large language models deployed on edge devices, highlighting that despite operating under quantization-such as [latex]INT4[/latex] or [latex]INT8[/latex]-and resource constraints that limit query budgets and introduce noise, strategically designed queries can still elicit substantial behavioral knowledge from these models, contrasting with traditional extraction methods reliant on full-precision teacher models and abundant computational resources.

As powerful language models shrink to run on devices like phones and IoT sensors, a new study reveals that reducing their size doesn’t necessarily protect the valuable knowledge they contain.

Categories Science

Shaping Secrets: A New Path to Post-Quantum Encryption

26.03.2026 by Ray Dalio

The HyperFrog v33.1 reference implementation, tested on an AMD Ryzen 9 5950X processor in a single-threaded configuration, demonstrates performance characteristics shaped by a mining-style precomputation for key generation, with subsequent encapsulation and decapsulation operations optimized for speed following initialization-a configuration indicative of system design prioritizing initial setup cost against rapid operational throughput.

Researchers are exploring how the geometry of complex 3D shapes can underpin more secure key exchange mechanisms in the age of quantum computing.

Categories Science

Securing 5G’s Wireless Edge with Quantum Encryption

26.03.2026 by Ray Dalio

The architecture accommodates non-3GPP access networks within the broader 5G framework, extending connectivity beyond traditional cellular infrastructure and suggesting a system designed for integration rather than isolation as it matures.

Researchers demonstrate a practical approach to bolstering 5G network security for non-3GPP devices by integrating Quantum Key Distribution with standard IPsec protocols.

Categories Science

Beyond the Crystal: Unveiling Hidden Order in Quantum Magnets

26.03.2026 by Ray Dalio

The implementation of the [latex]\pi\pi[/latex]-flux condition within the investigated gauge for the IGT relies on a two-site unit cell comprising sublattices designated AA and BB, where the sign of [latex]\rho^{z}\_{ij}[/latex]-indicated by dashed (red, [latex]\rho^{z}\_{ij}=-1[/latex]) or solid (black, [latex]\rho^{z}\_{ij}=+1[/latex]) links-determines the specific gauge choice.

New research demonstrates a pathway from seemingly simple magnetic models to exotic states of matter exhibiting both crystalline and topological order.

Categories Science

Hidden in Plain Sight: A New Approach to Private Data Aggregation

26.03.2026 by Ray Dalio

A compressed two-layer privacy protocol demonstrates an inherent trade-off between data privacy and utility, revealing that minimizing the privacy parameter [latex]\varepsilon[/latex] to approximately 13-achieved with nine decoys-necessitates operating at a signal-to-noise ratio near one, where the signal is comparable to noise, and results in only a marginal 0.3% reduction in prior uncertainty as measured by normalized mean-squared error.

Researchers have developed a novel framework, PolyVeil, that leverages geometric principles to securely combine private data streams without relying on conventional cryptographic methods.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page4 Page5 Page6 … Page155 Next →
© 2026 Investment Policy • Built with GeneratePress