Learn how exclaves enhance privacy and integrity in federated learning models.
Jinnan Guo, Kapil Vaswani, Andrew Paverd
― 6 min read
New Science Research Articles Everyday
Learn how exclaves enhance privacy and integrity in federated learning models.
Jinnan Guo, Kapil Vaswani, Andrew Paverd
― 6 min read
Latest Articles
Sicheng Zhu, Brandon Amos, Yuandong Tian
― 6 min read
Novoneel Chakraborty, Anshoo Tandon, Kailash Reddy
― 6 min read
Thijmen van Gend, Donald Jay Bertulfo, Seda Gürses
― 5 min read
Chavhan Sujeet Yashavant, MitrajSinh Chavda, Saurabh Kumar
― 5 min read
Yi Hao Puah, Anh Tu Ngo, Nandish Chattopadhyay
― 7 min read
Learn how NIDS and advanced models boost cybersecurity efforts.
Nir Daniel, Florian Klaus Kaiser, Shay Giladi
― 6 min read
Manipulating AI behavior poses serious risks in advanced systems.
Fengshuo Bai, Runze Liu, Yali Du
― 6 min read
Discover how adversarial examples challenge cybersecurity and the defenses against them.
Li Li
― 5 min read
New method aims to improve safety in text-to-image models.
Portia Cooper, Harshita Narnoli, Mihai Surdeanu
― 5 min read
Discovering the dangers of backdoor attacks in diffusion models.
Yuning Han, Bingyin Zhao, Rui Chu
― 7 min read
Learn how personalized phishing attacks are becoming more dangerous.
Qinglin Qi, Yun Luo, Yijia Xu
― 5 min read
Learn how new methods protect identities in brain-computer interfaces.
L. Meng, X. Jiang, J. Huang
― 6 min read
Learn how ZKPs help protect your privacy in the digital world.
Shahzad Ahmad Butt, Benjamin Reynolds, Veeraraghavan Ramamurthy
― 6 min read
Learn how phishing attacks exploit trusted networks to steal information.
Elisa Luo, Liane Young, Grant Ho
― 8 min read
Discover how learning models strive to enhance privacy in the digital age.
Maryam Aliakbarpour, Konstantina Bairaktari, Adam Smith
― 8 min read
SLIM encryption offers a shield against quantum threats to digital security.
Hasan Ozgur Cildiroglu, Oguz Yayla
― 6 min read
Using large language models to detect software weaknesses.
Ira Ceka, Feitong Qiao, Anik Dey
― 8 min read
Radio Frequency Fingerprinting and edge computing tackle IoT security challenges efficiently.
Ahmed Mohamed Hussain, Nada Abughanam, Panos Papadimitratos
― 6 min read
Examining the role of AI in safeguarding vital computer systems.
Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi
― 5 min read
How IoT devices impact privacy and the need for transparency.
Isita Bagayatkar, Youngil Kim, Gene Tsudik
― 8 min read
Website Fingerprinting reveals user activity despite Tor's privacy features.
Jiajun Gong, Wei Cai, Siyuan Liang
― 7 min read
Learn how the Fully Homomorphic Integrity Model protects sensitive healthcare information.
B. Shuriya, S. Vimal Kumar, K. Bagyalakshmi
― 5 min read
Fake stars are misleading the software development community.
Hao He, Haoqin Yang, Philipp Burckhardt
― 6 min read
Discover how Magnifier transforms mobile device network tracking effortlessly.
Wenhao Li, Qiang Wang, Huaifeng Bao
― 5 min read
Discover how GraphFuzz transforms chip design validation and enhances security.
Raghul Saravanan, Sreenitha Kasarapu, Sai Manoj Pudukotai Dinakarrao
― 6 min read
Learn how to keep your messages private with new techniques against quantum threats.
Paul Staat, Meik Dörpinghaus, Azadeh Sheikholeslami
― 6 min read
A new method enables efficient trojan attacks on language models through broader concepts.
Keltin Grimes, Marco Christiani, David Shriver
― 5 min read
TETRIS enables secure data analysis while maintaining personal privacy.
Malika Izabachène, Jean-Philippe Bossuat
― 5 min read
New methods improve link prediction attack strategies and highlight security flaws.
Jiate Li, Meng Pang, Binghui Wang
― 7 min read
A look at synthetic data and its role in privacy.
Lucas Rosenblatt, Bill Howe, Julia Stoyanovich
― 5 min read
Learn how to safeguard your machine learning models with fingerprinting techniques.
Augustin Godinot, Erwan Le Merrer, Camilla Penzo
― 6 min read
Discover how differential privacy protects personal data during analysis.
Albert Cheu, Debanuj Nayak
― 7 min read
How experts reconstruct events in the digital world.
Céline Vanini, Chris Hargreaves, Frank Breitinger
― 8 min read
Learn how privacy-preserving cloud services keep your information safe.
Yihang Cheng, Lan Zhang, Junyang Wang
― 8 min read
Transplantation optimizes fuzzing for MCU firmware, improving speed and efficiency.
Florian Hofhammer, Qinying Wang, Atri Bhattacharyya
― 5 min read
Automated tools revolutionize security assessments across digital landscapes.
Charilaos Skandylas, Mikael Asplund
― 6 min read
A look at secure authentication methods for smart urban environments.
Khan Reaz, Gerhard Wunder
― 10 min read
A new model to enhance cloud data security against malicious users.
Kishu Gupta, Deepika Saxena, Rishabh Gupta
― 6 min read
MAIDS offers proactive security for cloud data against unauthorized access.
Kishu Gupta, Deepika Saxena, Rishabh Gupta
― 6 min read
Learn how to protect industrial systems from cyber attacks with new security methods.
Arthur Amorim, Trevor Kann, Max Taylor
― 8 min read
Learn how fingerprinting codes and algorithms protect your personal data.
Xin Lyu, Kunal Talwar
― 6 min read
Explore how differential privacy aids decision-making while protecting individual data.
Victor A. E. Farias, Felipe T. Brito, Cheryl Flynn
― 6 min read
Learn how flow exporters improve datasets for machine learning in intrusion detection.
Daniela Pinto, João Vitorino, Eva Maia
― 8 min read
Explore the evolving world of cybersecurity and its critical role in safety.
Shalini Saini, Anitha Chennamaneni, Babatunde Sawyerr
― 14 min read
VIAP offers a solution to fool AI recognition systems from various angles.
Christian Green, Mehmet Ergezer, Abdurrahman Zeybey
― 8 min read
Navigating the intersection of privacy and user-friendly data access.
Liudas Panavas, Joshua Snoke, Erika Tyagi
― 7 min read
Discover how 5G technology connects our world while ensuring safety.
Joshua Groen, Simone Di Valerio, Imtiaz Karim
― 4 min read
A novel framework enhances IoT security using AI and homomorphic encryption.
Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang
― 7 min read
Explore how context collapse affects your online privacy.
Ido Sivan-Sevilla, Parthav Poudel
― 6 min read
Learn how new specs clarify data rights management under GDPR.
Beatriz Esteves, Harshvardhan J. Pandit, Georg P. Krog
― 5 min read
Examining privacy concerns surrounding the use of language models.
Tianchen Zhang, Gururaj Saileshwar, David Lie
― 5 min read
Learn about pig butchering scams and how to protect against them.
Bhupendra Acharya, Thorsten Holz
― 5 min read
MIETT uses advanced techniques for efficient encrypted traffic classification.
Xu-Yang Chen, Lu Han, De-Chuan Zhan
― 6 min read
Discover a new method for comparing encrypted data efficiently and securely.
Federico Mazzone, Maarten Everts, Florian Hahn
― 7 min read
Learn how scammers operate and protect yourself from online fraud.
Bhupendra Acharya, Dominik Sautter, Muhammad Saad
― 8 min read
Explore the booming underground market for social media accounts and its risks.
Mario Beluri, Bhupendra Acharya, Soheil Khodayari
― 8 min read
Learn how Shapley values enhance understanding of AI choices and decisions.
Iain Burge, Michel Barbeau, Joaquin Garcia-Alfaro
― 6 min read
FRIDAY improves deepfake detection by focusing on manipulation signs.
Younhun Kim, Myung-Joon Kwon, Wonjun Lee
― 4 min read
AIArena democratizes AI development, fostering collaboration and fairness through blockchain technology.
Zhipeng Wang, Rui Sun, Elizabeth Lui
― 7 min read
Using deception to confuse cyber attackers and protect valuable data.
Jason Landsborough, Neil C. Rowe, Thuy D. Nguyen
― 6 min read
CensorLab offers tools to fight Internet censorship through simulation and testing.
Jade Sheffey, Amir Houmansadr
― 6 min read
A new approach aims to make AI systems more trustworthy and less deceptive.
Marc Carauleanu, Michael Vaiana, Judd Rosenblatt
― 5 min read
Exploring how obfuscation techniques are reshaping the malware landscape with LLMs.
Seyedreza Mohseni, Seyedali Mohammadi, Deepa Tilwani
― 7 min read
Discover how vaults enhance privacy on the Tor network.
Humza Ikram, Rumaisa Habib, Muaz Ali
― 7 min read
Watertox cleverly alters images to baffle AI systems while remaining clear to humans.
Zhenghao Gao, Shengjie Xu, Meixi Chen
― 9 min read
Study evaluates language models for detecting software vulnerabilities across various programming languages.
Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén
― 6 min read
Learn how DAI maintains a stable value in the cryptosphere.
Francesco De Sclavis, Giuseppe Galano, Aldo Glielmo
― 7 min read
Learn how PoisonCatcher protects IIoT data from harmful intrusions.
Lisha Shuai, Shaofeng Tan, Nan Zhang
― 6 min read
Learn how anonymous secret sharing secures information using mathematical techniques.
Roni Con
― 7 min read
Researchers uncover vulnerabilities in Multi-Modal Large Language Models through clever tactics.
Yangyang Guo, Ziwei Xu, Xilie Xu
― 6 min read
Exploring the need for watermarking in AI-created images to ensure authenticity.
Aryaman Shaan, Garvit Banga, Raghav Mantri
― 5 min read
Simplifying Differential Privacy for better understanding and usage.
Onyinye Dibia, Brad Stenger, Steven Baldasty
― 5 min read
Learn how machine learning techniques enhance web security against cyber threats.
Daniel Urda, Branly Martínez, Nuño Basurto
― 7 min read
CyberSentinel offers swift detection of threats in an ever-growing digital landscape.
Sankalp Mittal
― 5 min read
A new method ensures data privacy while fine-tuning AI models.
Philip Zmushko, Marat Mansurov, Ruslan Svirschevski
― 6 min read
Innovative solutions tackle the double spending issue in digital currency transactions.
Maxence Perion, Sara Tucci-Piergiovanni, Rida Bazzi
― 8 min read
Learn how improved techniques enhance software vulnerability detection.
Devesh Sawant, Manjesh K. Hanawal, Atul Kabra
― 9 min read
Learn how system fingerprinting keeps your data safe from cyber threats.
Prakhar Paliwal, Arjun Sable, Manjesh K. Hanawal
― 6 min read
Learn how private inference keeps your data safe while using smart technology.
Yuntian Chen, Zhanyong Tang, Tianpei Lu
― 7 min read
Learn how to balance data privacy and machine learning insights.
Zijian Zhou, Xinyi Xu, Daniela Rus
― 5 min read
PHICOIN aims to make mining accessible for everyone.
Guang Yang, Peter Trinh, Sannan Iqbal
― 5 min read
Examining security risks and challenges of large language models in technology.
Herve Debar, Sven Dietrich, Pavel Laskov
― 7 min read
Temporal Convolutional Networks excel in detecting network intrusions amid rising cyber threats.
Rukmini Nazre, Rujuta Budke, Omkar Oak
― 7 min read
Discover the ongoing struggle between VPN technology and internet censorship.
Amy Iris Parker
― 7 min read
Learn how Local Differential Privacy protects user data while allowing data collection.
Bo Jiang, Wanrong Zhang, Donghang Lu
― 6 min read