Discover how NIDS-GPT transforms network intrusion detection with innovative techniques.
Jie Huang
― 7 min read
Cutting edge science explained simply
Discover how NIDS-GPT transforms network intrusion detection with innovative techniques.
Jie Huang
― 7 min read
Latest Articles
Luoyu Mei, Ruofeng Liu, Zhimeng Yin
― 5 min read
Maraz Mia, Darius Derakhshan, Mir Mehedi A. Pritom
― 6 min read
Zohaib Masood, Miguel Vargas Martin
― 6 min read
Matthew Hull, Chao Zhang, Zsolt Kira
― 6 min read
Hao WU, Hanwen Zhang
― 6 min read
Discover methods for secure data analysis without compromising personal information.
Tianpei Lu, Bingsheng Zhang, Lichun Li
― 6 min read
Exploring how to keep video sharing safe in crowdsensing systems.
Andrea Vaiuso
― 8 min read
AI systems face new risks from edge-only attacks that mislead predictions.
Giulio Rossolini, Tommaso Baldi, Alessandro Biondi
― 8 min read
A new way to connect blockchains and move assets easily.
Hardik Gajera, Akhil Reddy, Bhagath Reddy
― 6 min read
A tool that helps developers protect user data efficiently.
Sinan Pehlivanoglu, Malte Schwarzkopf
― 6 min read
Exploring how IoT and tinyML shape smart traffic management.
Javier Conde, Andrés Munoz-Arcentales, Álvaro Alonso
― 7 min read
A new method enhances data analysis while preserving privacy.
Julien Nicolas, César Sabater, Mohamed Maouche
― 7 min read
Learn how watermarking protects against fake data in the digital world.
Bochao Gu, Hengzhi He, Guang Cheng
― 6 min read
This paper examines how timing differences in file systems can expose sensitive information.
Cheng Gu, Yicheng Zhang, Nael Abu-Ghazaleh
― 5 min read
This article examines how to identify satire using language models.
Omar W. Abdalla, Aditya Joshi, Rahat Masood
― 6 min read
This article discusses the safety and security issues in multimodal AI systems.
Ruoxi Sun, Jiamin Chang, Hammond Pearce
― 6 min read
FPGAs offer flexibility but introduce significant security risks that need to be addressed.
Endres Puschner, Maik Ender, Steffen Becker
― 6 min read
Discover how recent incidents highlight vulnerabilities in Linux packages.
Duc-Ly Vu, Trevor Dunlap, Karla Obermeier-Velazquez
― 7 min read
Discover how new tools help secure programs from hidden threats like Spectre.
Fangzheng Lin, Zhongfa Wang, Hiroshi Sasaki
― 6 min read
Teaching machines to learn without revealing expert secrets is crucial for privacy.
Navodita Sharma, Vishnu Vinod, Abhradeep Thakurta
― 6 min read
Learn about browser fingerprinting and how it affects your online privacy.
Alexander Lawall
― 7 min read
Examining the complexities of remote voting technologies for military members.
Andrew W. Appel, Philip B. Stark
― 8 min read
A look into Bitcoin mining, rewards, and the challenges miners face.
Roozbeh Sarenche, Alireza Aghabagherloo, Svetla Nikova
― 5 min read
Learn how new watermarking techniques protect digital art and creative ideas.
Liangqi Lei, Keke Gai, Jing Yu
― 6 min read
A new approach enhances patch retrieval for software vulnerabilities.
Xueqing Liu, Yuchen Xiong, Qiushi Liu
― 7 min read
This article discusses privacy issues and solutions for interacting with language models.
Robin Carpentier, Benjamin Zi Hao Zhao, Hassan Jameel Asghar
― 5 min read
A method to protect AI-generated art without losing image quality.
Kareem Shehata, Aashish Kolluri, Prateek Saxena
― 4 min read
Confidential containers enhance data security and performance in cloud environments.
Chulmin Lee, Jaewon Hur, Sangho Lee
― 6 min read
A look at triple-entry accounting and its role in enhancing trust in finance.
Abraham Itzhak Weinberg, Alessio Faccia
― 7 min read
A new method enhances the safety of code generated by language models.
Xiangzhe Xu, Zian Su, Jinyao Guo
― 5 min read
A look at how researchers protect privacy in survey data while sharing insights.
Jeremy Seeman, Yajuan Si, Jerome P Reiter
― 6 min read
Methods to safeguard sensitive data while maintaining model performance.
Yuxiao Chen, Gamze Gürsoy, Qi Lei
― 5 min read
A look into how hidden tricks affect language models and their explanations.
Huaizhi Ge, Yiming Li, Qifan Wang
― 7 min read
Assessing vulnerabilities in federated learning's privacy through attribute inference attacks.
Francesco Diana, Othmane Marfoq, Chuan Xu
― 7 min read
StrTune efficiently identifies similar functions within binary code, enhancing software security.
Kaiyan He, Yikun Hu, Xuehui Li
― 7 min read
A new approach to predict and prevent data breaches using technical and social data.
Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour
― 5 min read
Explore the role of stochastic saddle point problems in recipe optimization and privacy.
Raef Bassily, Cristóbal Guzmán, Michael Menart
― 6 min read
Learn about a new method for safe and efficient file transfers.
Chaitanya Rahalkar, Anushka Virgaonkar
― 6 min read
Language models show impressive abilities but also significant vulnerabilities we need to address.
Sanjay Das, Swastik Bhattacharya, Souvik Kundu
― 5 min read
A new method to detect and fix data poisoning in machine learning models.
Wenjie Li, Jiawei Li, Christian Schroeder de Witt
― 6 min read
AI models can help find vulnerabilities in cryptographic systems for better security.
Cristian Curaba, Denis D'Ambrosi, Alessandro Minisini
― 7 min read
Learn how string distances can aid privacy in sensitive data analysis.
Jerry Yao-Chieh Hu, Erzhi Liu, Han Liu
― 6 min read
Learn about AI threats and how to protect sensitive data.
Sarbartha Banerjee, Prateek Sahu, Mulong Luo
― 5 min read
A new framework enhances vendor security using blockchain technology to minimize risks.
Deepti Gupta, Lavanya Elluri, Avi Jain
― 6 min read
A new model aims to protect farmers from rising cyberattacks in smart farming.
Lopamudra Praharaj, Deepti Gupta, Maanak Gupta
― 7 min read