Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Hiding in Plain Sight: Secure Communication with Language Models

24.04.2026 by Ray Dalio

Existing provable secure steganography schemes exhibit varying efficiencies in information utilization, a critical factor as maximizing this rate directly impacts the amount of data concealed within a carrier signal without raising suspicion.

A new approach to steganography leverages the power of large language models to conceal information with provable security guarantees.

Categories Science

Outsmarting Attackers: A Strategic Approach to Cryptographic Algorithm Selection

24.04.2026 by Ray Dalio

The AttackerDP algorithm, when constrained by a 0.202-second execution limit, exhibits a threshold of approximately 310,310 methods-a value determined by the simulation’s parameters, including a benchmark of 500 methods with [latex]k=500[/latex] and [latex]v=1000[/latex], a success probability range of [latex]s\_{.,j} \in [0.05, 0.85][/latex], and method costs between 40 and 200 units, calculated via a linear cost function [latex]\varphi(x) = x[/latex]-suggesting that system performance is intrinsically tied to the interplay between computational budget and the defined parameter space.

This research introduces a game-theoretic model to optimize the combination of cryptographic algorithms, anticipating and responding to evolving attacker strategies.

Categories Science

Scaling Beyond Blockchain: A Deep Dive into Layer-2 Solutions

24.04.2026 by Ray Dalio

This review unravels the complex world of Layer-2 scaling technologies, explaining how they’re poised to unlock mainstream blockchain adoption.

Categories Science

Securing Communications: A Head-to-Head Coding Challenge

24.04.2026 by Ray Dalio

New research rigorously compares three leading methods for protecting data transmitted over noisy channels, revealing performance differences in practical, short-message scenarios.

Categories Science

Seeing Isn’t Believing: The Growing Threat to Self-Driving Car Sensors

24.04.2026 by Ray Dalio

A comprehensive analysis of existing research reveals a diverse landscape of attacks targeting autonomous vehicle perception systems, categorized by sensor type, attack stage, objectives, datasets, simulation environments, and assumptions regarding attacker knowledge - providing a comparative framework for evaluating the robustness of these systems against evolving threats.

A new review synthesizes the landscape of attacks targeting autonomous vehicle perception, revealing critical vulnerabilities as systems increasingly rely on multiple sensors.

Categories Science

Consistent Choices: Replicable Bandit Algorithms for Reliable Decision-Making

24.04.2026 by Ray Dalio

This review explores how to build multi-armed and linear bandit algorithms that consistently select the same actions under repeated runs, improving the reliability of reinforcement learning systems.

Categories Science

Scaling Attention: A New Approach to Long Contexts

23.04.2026 by Ray Dalio

The performance estimation reveals a distinction between SDPA, functioning as a baseline, and Stream-CQSA, suggesting that systems, despite inevitable decay, can be refined to offer nuanced operational characteristics-a testament to adaptation within the constraints of time.

Researchers have developed a method for significantly extending the length of sequences processed by attention mechanisms without requiring hardware modifications.

Categories Science

Whispers in the Wireless: Hiding Data in Wi-Fi Signals

23.04.2026 by Ray Dalio

A Wi-Fi steganography system conceals data within the seemingly innocuous structure of wireless network traffic, offering a covert communication channel by exploiting the inherent redundancies and flexibility of the [latex]802.11[/latex] protocol.

Researchers have developed a system to embed secret messages within the normally unused components of Wi-Fi transmissions, offering a new avenue for covert communication.

Categories Science

Containing the AI Frontier: A Formal Verification Approach

23.04.2026 by Ray Dalio

New research details how rigorous pre-deployment checks can bolster the security of AI sandbox infrastructure and prevent potentially catastrophic model escapes.

Categories Science

Beyond Sums and Differences: Homomorphic Encryption Gets a Comparative Edge

23.04.2026 by Ray Dalio

A new technique streamlines privacy-preserving computation by efficiently combining arithmetic and comparison operations within fully homomorphic encryption schemes.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page4 Page5 Page6 … Page172 Next →
© 2026 Investment Policy • Built with GeneratePress