A look into secure communication systems combining sensing technologies.
Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch
― 5 min read
Cutting edge science explained simply
A look into secure communication systems combining sensing technologies.
Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch
― 5 min read
Latest Articles
Mugdha Khedkar, Michael Schlichtig, Eric Bodden
― 5 min read
Ehsan Firouzi, Mohammad Ghafari, Mike Ebrahimi
― 6 min read
Allison Bishop, Hayder Tirmazi
― 6 min read
Mustapha Hemis, Hamza Kheddar, Sami Bourouis
― 5 min read
Khaoula Hidawi
― 5 min read
Exploring Hybrid Homomorphic Encryption for secure data processing in ML.
Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong
― 7 min read
Examining how SBOM accuracy impacts software vulnerability detection.
Giacomo Benedetti, Serena Cofano, Alessandro Brighente
― 6 min read
A tool helps users confirm if their data was used in deep learning models.
Zitao Chen, Karthik Pattabiraman
― 5 min read
A system that helps users control data from IoT devices.
Jad Al Aaraj, Olivia Figueira, Tu Le
― 6 min read
This article discusses advancements in protecting smart contracts against vulnerabilities and financial loss.
Chaofan Shou, Yuanyu Ke, Yupeng Yang
― 6 min read
Exploring how Automatic Content Recognition affects user privacy in smart TVs.
Gianluca Anselmi, Yash Vekaria, Alexander D'Souza
― 7 min read
A new method for detecting DDoS attacks using large language models.
Zhenyu Yin, Shang Liu, Guangyuan Xu
― 5 min read
This study highlights the role of workload in recognizing phishing emails.
Sijie Zhuo, Robert Biddle, Jared Daniel Recomendable
― 8 min read
Examining how bug bounty programs enhance security in open-source projects.
Jessy Ayala, Steven Ngo, Joshua Garcia
― 5 min read
Examining how OSS maintainers tackle security challenges effectively.
Jessy Ayala, Yu-Jye Tung, Joshua Garcia
― 5 min read
A study on using machine learning to identify harmful websites effectively.
Kinh Tran, Dusan Sovilj
― 8 min read
LLMs offer both solutions and risks in combating malware threats.
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Marwan Omar
― 5 min read
Pseudorandom codes ensure secure data transmission and protect against errors.
Surendra Ghentiyala, Venkatesan Guruswami
― 4 min read
A new measure to strengthen Network Intrusion Detection Systems against adversarial attacks.
Mohamed elShehaby, Ashraf Matrawy
― 6 min read
Examining the privacy risks of AI and ML in medical settings.
Yuanhaur Chang, Han Liu, Evin Jaff
― 6 min read
This article discusses the challenges and improvements in Android malware detection using machine learning.
Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi
― 6 min read
This article highlights Cyber Deception strategies for enhancing cybersecurity.
Pedro Beltrán López, Manuel Gil Pérez, Pantaleone Nespoli
― 6 min read
A new method enhances data privacy while maintaining performance in cloud computing.
Leqian Zheng, Zheng Zhang, Wentao Dong
― 6 min read
Examining the risks and defenses against fault attacks in LESS digital signatures.
Puja Mondal, Supriya Adhikary, Suparna Kundu
― 7 min read
This article outlines Reverso, a method to enhance QUIC protocol efficiency.
Florentin Rochet
― 7 min read
This research focuses on training ControlNet while safeguarding user data across devices.
Dixi Yao
― 9 min read
Exploring privacy concerns in fine-tuning diffusion models with personal data.
Dixi Yao
― 6 min read
New strategies for agent collaboration enhance trust and efficiency in AI responses.
Vladyslav Larin, Ivan Nikitin, Alexander Firsov
― 7 min read
Harnessing AI to improve honeypot effectiveness against cyber threats.
Hakan T. Otal, M. Abdullah Canbaz
― 6 min read
A new method enhances the identification of security events amidst Twitter noise.
Jian Cui, Hanna Kim, Eugene Jang
― 5 min read
This paper proposes a framework to enhance NFT fractionalization's security and accessibility.
Wejdene Haouari, Marios Fokaefs
― 9 min read
A new method enhances blockchain's reliability and efficiency in decentralized networks.
Yibin Xu, Jianhua Shao, Tijs Slaats
― 5 min read
A new approach to enhance network traffic analysis through graph-based models.
Louis Van Langendonck, Ismael Castell-Uroz, Pere Barlet-Ros
― 6 min read
Examining key security issues related to large language models in AI.
Benji Peng, Keyu Chen, Ming Li
― 5 min read
Examining security issues faced by mobile app developers on Stack Overflow.
Timothy Huo, Ana Catarina Araújo, Jake Imanaka
― 6 min read
Exploring the benefits of a model-driven approach for cybersecurity risk management.
Christophe Ponsard
― 6 min read
A new model improves function name recovery in binary code analysis.
Tristan Benoit, Yunru Wang, Moritz Dannehl
― 7 min read
A new tool aids organizations in addressing quantum computing security risks.
Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun
― 5 min read
Exploring vulnerabilities of cooperative multi-agent systems to backdoor attacks.
Yinbo Yu, Saihao Yan, Jiajia Liu
― 5 min read
A look at using RL to train agents for maritime cyber security.
Alec Wilson, William Holmes, Ryan Menzies
― 5 min read
Learn how PQC strengthens federated learning against quantum threats.
Pingzhi Li, Tianlong Chen, Junyu Liu
― 6 min read
A new quantum protocol improves privacy in data sharing using the shuffle model.
Hassan Jameel Asghar, Arghya Mukherjee, Gavin K. Brennen
― 7 min read
A new method to solve the discrete logarithm problem faster and more efficiently.
Wen Huang, Zhishuo Zhang, Weixin Zhao
― 5 min read
Exploring quantum computing's role in enhancing anomaly detection for cyber-physical systems.
Tyler Cultice, Md. Saif Hassan Onim, Annarita Giani
― 5 min read
Deep learning models face significant security challenges that need addressing for safe use.
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Mostafa Mohamad
― 5 min read