Learn how data poisoning interferes with AI training processes.
Jianhui Li, Bokang Zhang, Junfeng Wu
― 7 min read
New Science Research Articles Everyday
Learn how data poisoning interferes with AI training processes.
Jianhui Li, Bokang Zhang, Junfeng Wu
― 7 min read
Latest Articles
Varshita Kolipaka, Akshit Sinha, Debangan Mishra
― 7 min read
Jose Miguel Lara Rangel, Stefan Schoepf, Jack Foster
― 6 min read
Naman Deep Singh, Francesco Croce, Matthias Hein
― 6 min read
Fengwei Tian, Ravi Tandon
― 6 min read
Chenke Luo, Jiang Ming, Mengfei Xie
― 6 min read
Learn how sandbagging affects AI assessments and ways to detect it.
Cameron Tice, Philipp Alexander Kreer, Nathan Helm-Burger
― 6 min read
New methods ensure data privacy protection while utilizing machine learning.
Sangyeon Yoon, Wonje Jeung, Albert No
― 6 min read
Learn how to protect your images using advanced encryption techniques.
Yehia Lalili, Toufik Bouden, Morad Grimes
― 6 min read
Discover how federated learning protects your data while enhancing technology.
Wenhan Dong, Chao Lin, Xinlei He
― 6 min read
A simple guide to matching arrangements and their applications.
A. I. Bolotnikov, A. A. Irmatov
― 5 min read
New methods enhance detection of jailbreak attempts on language models.
Erick Galinkin, Martin Sablotny
― 6 min read
AI is reshaping how we defend against cyber threats.
Erick Galinkin, Emmanouil Pountrourakis, Spiros Mancoridis
― 7 min read
Explore how L2 regularization can enhance privacy in AI models.
Nikolaos Chandrinos, Iliana Loi, Panagiotis Zachos
― 8 min read
Using brain waves for secure identification could change digital security.
Naveenkumar G Venkataswamy, Masudul H Imtiaz
― 6 min read
Examining how users handle suspicious emails while using VR headsets.
Filipo Sharevski, Jennifer Vander Loop, Sarah Ferguson
― 6 min read
A new approach to safeguarding sensitive health data while enabling valuable insights.
Sascha Welten, Karl Kindermann, Ahmet Polat
― 5 min read
New methods aim to protect sensitive data while keeping it useful.
Gaurab Hore, Tucker McElroy, Anindya Roy
― 7 min read
New methods combine quantum computing and federated learning to enhance data privacy.
Siddhant Dutta, Nouhaila Innan, Sadok Ben Yahia
― 6 min read
Learn how IP address analysis strengthens cybersecurity against rising digital threats.
Cebajel Tanan, Sameer G. Kulkarni, Tamal Das
― 8 min read
Learn how autonomous cyber agents fight against unpredictable digital threats.
Ankita Samaddar, Nicholas Potteiger, Xenofon Koutsoukos
― 7 min read
Learn how IDS uses machine learning to enhance IoT security.
Muhammad Zawad Mahmud, Samiha Islam, Shahran Rahman Alve
― 7 min read
Language models excel in CTF competitions, showcasing their hacking potential.
Rustem Turtayev, Artem Petrov, Dmitrii Volkov
― 7 min read
Explore how Liquefaction changes ownership and control in cryptocurrency.
James Austgen, Andrés Fábrega, Mahimna Kelkar
― 5 min read
Discover how privacy methods enhance data analysis without compromising individual information.
Hillary Yang
― 6 min read
Innovative methods ensure privacy while generating realistic synthetic data.
Tejumade Afonja, Hui-Po Wang, Raouf Kerkouche
― 7 min read
Discover how FIDO2 improves online authentication and addresses security issues.
Marco Casagrande, Daniele Antonioli
― 6 min read
GRAND method helps uncover graph relationships while protecting privacy.
Sofiane Azogagh, Zelma Aubin Birba, Josée Desharnais
― 6 min read
Multimodal agents improve phishing detection by analyzing URLs and images together.
Fouad Trad, Ali Chehab
― 5 min read
A new approach speeds up computing using nearby devices and blockchain.
Muhammad Islam, Niroshinie Fernando, Seng W. Loke
― 6 min read
Discover the vulnerabilities of autonomous vehicles and the threats they face.
Masoud Jamshidiyan Tehrani, Jinhan Kim, Rosmael Zidane Lekeufack Foulefack
― 6 min read
A novel approach enhances malware detection with graph analysis and machine learning.
Hesamodin Mohammadian, Griffin Higgins, Samuel Ansong
― 8 min read
Learn how groups protect their secrets through key exchange methods.
Daniel Camazón Portela, Álvaro Otero Sánchez, Juan Antonio López Ramos
― 8 min read
Learn how to differentiate data distributions using simple concepts and efficient methods.
Cassandra Marcussen, Aaron L. Putterman, Salil Vadhan
― 6 min read
Argos makes fully homomorphic encryption faster and more secure for real-world use.
Jules Drean, Fisher Jepsen, Edward Suh
― 6 min read
Discover how SEQUENT revolutionizes anomaly detection in digital networks.
Clinton Cao, Agathe Blaise, Annibale Panichella
― 6 min read
PSA-Net aims to tackle voice spoofing for smarter device security.
Awais Khan, Ijaz Ul Haq, Khalid Mahmood Malik
― 6 min read
Examining the effectiveness and vulnerabilities of semantic watermarks in digital content.
Andreas Müller, Denis Lukovnikov, Jonas Thietke
― 5 min read
Discover the security challenges facing our daily wireless technology.
Ruixu Geng, Jianyang Wang, Yuqin Yuan
― 6 min read
A user-friendly tool for assessing software vulnerabilities quickly and accurately.
Shivansh Chopra, Hussain Ahmad, Diksha Goel
― 6 min read
Discover how privacy-preserving methods protect sensitive data in large language models.
Tatsuki Koga, Ruihan Wu, Kamalika Chaudhuri
― 7 min read
Discover how homomorphic signatures enhance data security while keeping private keys safe.
Heng Guo, Kun Tian, Fengxia Liu
― 7 min read
Discover how blockchain simplifies insurance with parametric solutions.
Pierre-Olivier Goffard, Stéphane Loisel
― 6 min read
Learn how aural alerts can protect against deceptive phone calls.
Filipo Sharevski, Jennifer Vander Loop, Bill Evans
― 6 min read
This article discusses the challenges of maintaining patient privacy and fairness in healthcare technology.
Ali Dadsetan, Dorsa Soleymani, Xijie Zeng
― 6 min read
Learn how Federated Unlearning improves data privacy while training AI models.
Jianan Chen, Qin Hu, Fangtian Zhong
― 6 min read