Introducing a model for accurate, private rank-based statistics computation.
― 6 min read
Cutting edge science explained simply
Introducing a model for accurate, private rank-based statistics computation.
― 6 min read
Latest Articles
Latest Articles
Improving user authentication while maintaining privacy in virtual environments.
― 6 min read
A new model for better cyber-insurance policies and pricing.
― 6 min read
A new approach enhances privacy and security in federated learning.
― 5 min read
A look at IIoT security risks and the IIoT-ARAS tool for assessment.
― 5 min read
A simulation framework aids researchers in testing secure aggregation protocols effectively.
― 7 min read
A study on the threats of prompt stealing in text-to-image generation.
― 6 min read
A gray box attack can manipulate neural networks during training, causing unpredictable behavior.
― 6 min read
Examining how shared gradients can leak sensitive speech data.
― 6 min read
A new method improves feature selection in federated learning while ensuring data privacy.
― 5 min read
Learn how eBPF enhances system call security in Linux.
― 5 min read
A new model aims to improve threat detection through advanced text analysis.
― 6 min read
Exploring serious security issues with voice assistants due to deepfake audio attacks.
― 5 min read
Explore the differences and challenges of cash and cryptocurrencies.
― 5 min read
Examining speed and security issues in blockchain technology and proposing solutions.
― 5 min read
A framework for conducting secure hypothesis tests while safeguarding individual data.
― 6 min read
Examining the role of digital identity systems in accessing essential services worldwide.
― 8 min read
Elliptic curves are essential for secure communications and efficient cryptographic systems.
― 6 min read
A method to enhance botnet attack detection in IoT using optimized algorithms.
― 5 min read
This article discusses the importance of trust in Federated Learning systems.
― 9 min read
This study shows how quantum computing can outperform classical methods with simpler assumptions.
― 5 min read
A new method for identifying counterfeit chips using electrical properties.
― 6 min read
Introducing a new framework to assess machine learning models against multiple attacks.
― 6 min read
A study on weak pseudo-freeness and its implications for cryptography.
― 6 min read
A look into the critical aspects of detecting deepfakes.
― 6 min read
A curriculum that introduces key cybersecurity concepts to young learners using Scratch.
― 5 min read
Introducing CryptoScratch, a hands-on tool for teaching cryptography in schools.
― 7 min read
This article discusses methods for maintaining privacy in continuously observed data structures.
― 6 min read
Federated Learning combines data security with collaborative model training.
― 4 min read
A look at RPL protocol vulnerabilities and a new defense approach.
― 6 min read
A look at FSL-PN's role in improving anomaly detection capabilities.
― 6 min read
A look at how TEEs protect sensitive data during computation.
― 7 min read
Learn how secret sharing uses superconcentrators for secure communications.
― 5 min read
Protecting data through advanced quantum encryption techniques.
― 5 min read
Research reveals how scientific plots can leak sensitive ML model information.
― 6 min read
This article examines how educators perceive online exam proctoring during remote learning.
― 5 min read
Balancing medical data analysis and patient privacy using synthetic data techniques.
― 6 min read
Assessing vulnerabilities of synthetic data to privacy attacks for safer research.
― 7 min read
Discussing methods to maintain individual privacy in machine learning models.
― 5 min read
Investigating machine learning's role in protecting IoT devices from cyber threats.
― 7 min read
Learn about encrypted control systems and their role in data protection.
― 5 min read