Deep learning models face significant security challenges that need addressing for safe use.
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Mostafa Mohamad
― 5 min read
Cutting edge science explained simply
Deep learning models face significant security challenges that need addressing for safe use.
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Mostafa Mohamad
― 5 min read
Latest Articles
Suparna Kundu, Quinten Norga, Angshuman Karmakar
― 5 min read
Md Tauseef Alam, Raju Halder, Abyayananda Maiti
― 5 min read
Joshua Tito Amael, Jazi Eko Istiyanto, Oskar Natan
― 7 min read
Joshua Tito Amael, Oskar Natan, Jazi Eko Istiyanto
― 5 min read
Hao Jian Huang, Bekzod Iskandarov, Mizanur Rahman
― 8 min read
Organizations face tough choices during ransomware attacks. Learn how to navigate decisions effectively.
Pranjal Sharma
― 5 min read
A system for private histogram estimation that safeguards user privacy while providing accurate data insights.
Ali Shahin Shamsabadi, Peter Snyder, Ralph Giles
― 6 min read
A new technique reveals weaknesses in AI safety measures for language models.
Emet Bethany, Mazal Bethany, Juan Arturo Nolazco Flores
― 6 min read
Federated Learning boosts privacy and efficiency in smart grid operations.
Zikai Zhang, Suman Rath, Jiaohao Xu
― 6 min read
This article explores a method to understand black box machine learning models without training data.
Jonathan Rosenthal, Shanchao Liang, Kevin Zhang
― 6 min read
Examining the privacy issues linked to third-party SDKs in mobile applications.
Mark Huasong Meng, Chuan Yan, Yun Hao
― 4 min read
A new system enhances privacy for participants in research studies.
Echo Meißner, Frank Kargl, Benjamin Erb
― 5 min read
Examining how sanctions affect crypto transactions of sanctioned entities.
Francesco Zola, Jon Ander Medina, Raul Orduna
― 7 min read
FreeMark enables watermarking of deep learning models without affecting performance.
Yuzhang Chen, Jiangnan Zhu, Yujie Gu
― 5 min read
A look at how attackers replicate neural networks with limited output access.
Yi Chen, Xiaoyang Dong, Jian Guo
― 6 min read
CountChain uses blockchain to improve accuracy and trust in counting for online advertising.
Behkish Nassirzadeh, Stefanos Leonardos, Albert Heinle
― 6 min read
This article explores how QUBO can enhance cryptographic solutions.
Gregory Morse, Tamás Kozsik, Oskar Mencer
― 4 min read
New AI tool enhances file type detection accuracy and efficiency.
Yanick Fratantonio, Luca Invernizzi, Loua Farah
― 6 min read
Explore methods to maintain accurate and reliable financial data.
Ignacio Brasca
― 5 min read
Introducing PAD-FT, a lightweight method to fight backdoor attacks without clean data.
Yukai Xu, Yujie Gu, Kouichi Sakurai
― 6 min read
Oblivious data structures protect sensitive information by hiding access patterns.
Thore Thießen, Jan Vahrenhold
― 5 min read
A new self-ensemble approach improves model resilience to adversarial changes.
Chang Dong, Zhengyang Li, Liangwei Zheng
― 6 min read
This study focuses on protecting quadrotors from cyber-attacks.
Samuel Belkadi
― 6 min read
A new method improves log analysis and anomaly detection without labeled data.
Caihong Wang, Du Xu, Zonghang Li
― 8 min read
How NFTs are reshaping the art world for creators and collectors.
Ruiqiang Li, Brian Yecies, Qin Wang
― 5 min read
A method using VAEs enhances anomaly detection in Intrusion Detection Systems.
Ioannis Pitsiorlas, George Arvanitakis, Marios Kountouris
― 6 min read
A new framework improves IoT device security using advanced methods.
Sudipto Baral, Sajal Saha, Anwar Haque
― 5 min read
A new method combines Federated Learning and Adversarial Training for insider threat detection.
R G Gayathri, Atul Sajjanhar, Md Palash Uddin
― 6 min read
A new AI-driven platform aims to enhance security in healthcare.
Patrizia Heinl, Andrius Patapovas, Michael Pilgermann
― 6 min read
This article discusses privacy-focused data methods using federated learning and deep transfer hashing.
Manuel Röder, Frank-Michael Schleif
― 5 min read
Companies face hidden privacy threats in federated learning due to data distribution shifts.
David Brunner, Alessio Montuoro
― 6 min read
Examining efficient attacks on Automatic Modulation Classification using the Golden Ratio.
Deepsayan Sadhukhan, Nitin Priyadarshini Shankar, Sheetal Kalyani
― 5 min read
Proxy contracts in Ethereum offer benefits but come with significant security concerns.
Cheng-Kang Chen, Wen-Yi Chu, Muoi Tran
― 7 min read
This article examines a fresh approach to secure public-key encryption.
Robert Hines
― 5 min read
Combining Federated Learning and quantum technology promises safer data handling in AI.
Siddhant Dutta, Pavana P Karanth, Pedro Maciel Xavier
― 6 min read
AI tools are changing how developers work and improving the software development process.
Shidong Pan, Litian Wang, Tianyi Zhang
― 6 min read
A new approach to classify malware efficiently using fewer labeled samples.
Eric Li, Yifan Zhang, Yu Huang
― 8 min read
A look at privacy concerns in centralized and decentralized learning systems.
Changlong Ji, Stephane Maag, Richard Heusdens
― 5 min read
Examining the privacy challenges associated with Federated Learning and gradient inversion attacks.
Qiongxiu Li, Lixia Luo, Agnese Gini
― 7 min read
MEGA-PT improves penetration testing effectiveness and adaptability for better cybersecurity.
Yunfei Ge, Quanyan Zhu
― 5 min read
This approach improves efficiency in training models from large graph data while protecting privacy.
Anran Li, Yuanyuan Chen, Chao Ren
― 5 min read
Research unveils faster mixing methods in random reversible circuits for improved cryptography.
William Gay, William He, Nicholas Kocurek
― 4 min read
A study reveals the rise of cybercrime activity on Telegram channels.
Sayak Saha Roy, Elham Pourabbas Vafa, Kobra Khanmohammadi
― 4 min read
Combining blockchain and IPFS offers a secure and efficient solution for version control.
Md. Rafid Haque, Sakibul Islam Munna, Sabbir Ahmed
― 7 min read
RPKI strengthens Internet routing by verifying data authenticity.
Haya Schulmann, Niklas Vogel, Michael Waidner
― 7 min read