New AI tool enhances file type detection accuracy and efficiency.
Yanick Fratantonio, Luca Invernizzi, Loua Farah
― 6 min read
Cutting edge science explained simply
New AI tool enhances file type detection accuracy and efficiency.
Yanick Fratantonio, Luca Invernizzi, Loua Farah
― 6 min read
Latest Articles
Ignacio Brasca
― 5 min read
Yukai Xu, Yujie Gu, Kouichi Sakurai
― 6 min read
Thore Thießen, Jan Vahrenhold
― 5 min read
Chang Dong, Zhengyang Li, Liangwei Zheng
― 6 min read
Samuel Belkadi
― 6 min read
A new method improves log analysis and anomaly detection without labeled data.
Caihong Wang, Du Xu, Zonghang Li
― 8 min read
How NFTs are reshaping the art world for creators and collectors.
Ruiqiang Li, Brian Yecies, Qin Wang
― 5 min read
A method using VAEs enhances anomaly detection in Intrusion Detection Systems.
Ioannis Pitsiorlas, George Arvanitakis, Marios Kountouris
― 6 min read
A new framework improves IoT device security using advanced methods.
Sudipto Baral, Sajal Saha, Anwar Haque
― 5 min read
A new method combines Federated Learning and Adversarial Training for insider threat detection.
R G Gayathri, Atul Sajjanhar, Md Palash Uddin
― 6 min read
A new AI-driven platform aims to enhance security in healthcare.
Patrizia Heinl, Andrius Patapovas, Michael Pilgermann
― 6 min read
This article discusses privacy-focused data methods using federated learning and deep transfer hashing.
Manuel Röder, Frank-Michael Schleif
― 5 min read
Companies face hidden privacy threats in federated learning due to data distribution shifts.
David Brunner, Alessio Montuoro
― 6 min read
Examining efficient attacks on Automatic Modulation Classification using the Golden Ratio.
Deepsayan Sadhukhan, Nitin Priyadarshini Shankar, Sheetal Kalyani
― 5 min read
Proxy contracts in Ethereum offer benefits but come with significant security concerns.
Cheng-Kang Chen, Wen-Yi Chu, Muoi Tran
― 7 min read
This article examines a fresh approach to secure public-key encryption.
Robert Hines
― 5 min read
Combining Federated Learning and quantum technology promises safer data handling in AI.
Siddhant Dutta, Pavana P Karanth, Pedro Maciel Xavier
― 6 min read
AI tools are changing how developers work and improving the software development process.
Shidong Pan, Litian Wang, Tianyi Zhang
― 6 min read
A new approach to classify malware efficiently using fewer labeled samples.
Eric Li, Yifan Zhang, Yu Huang
― 8 min read
A look at privacy concerns in centralized and decentralized learning systems.
Changlong Ji, Stephane Maag, Richard Heusdens
― 5 min read
Examining the privacy challenges associated with Federated Learning and gradient inversion attacks.
Qiongxiu Li, Lixia Luo, Agnese Gini
― 7 min read
MEGA-PT improves penetration testing effectiveness and adaptability for better cybersecurity.
Yunfei Ge, Quanyan Zhu
― 5 min read
This approach improves efficiency in training models from large graph data while protecting privacy.
Anran Li, Yuanyuan Chen, Chao Ren
― 5 min read
Research unveils faster mixing methods in random reversible circuits for improved cryptography.
William Gay, William He, Nicholas Kocurek
― 4 min read
A study reveals the rise of cybercrime activity on Telegram channels.
Sayak Saha Roy, Elham Pourabbas Vafa, Kobra Khanmohammadi
― 4 min read
Combining blockchain and IPFS offers a secure and efficient solution for version control.
Md. Rafid Haque, Sakibul Islam Munna, Sabbir Ahmed
― 7 min read
RPKI strengthens Internet routing by verifying data authenticity.
Haya Schulmann, Niklas Vogel, Michael Waidner
― 7 min read
This work presents new methods for detecting malware using visualization and machine learning.
Fang Wang, Hussam Al Hamadi, Ernesto Damiani
― 5 min read
A new method to safeguard individual rights from image misuse in animations.
Jiachen Zhou, Mingsi Wang, Tianlin Li
― 5 min read
Examining firmware vulnerabilities and the tools to enhance security.
Mahsa Farahani, Ghazal Shenavar, Ali Hosseinghorban
― 7 min read
Exploring the role of Semantic Communication and security in next-gen networks.
Jiayi He, Xiaofeng Luo, Jiawen Kang
― 8 min read
This article examines browser fingerprinting's role in online advertising and its privacy concerns.
Zengrui Liu, Jimmy Dani, Shujiang Wu
― 6 min read
A look at data privacy issues in Android Automotive OS.
Bulut Gözübüyük, Brian Tang, Kang G. Shin
― 5 min read
A new memory allocator improves security against Rowhammer attacks while maintaining performance.
Anish Saxena, Walter Wang, Alexandros Daglis
― 6 min read
Addressing security risks in generative AI through red and blue teaming.
Ambrish Rawat, Stefan Schoepf, Giulio Zizzo
― 5 min read
A new approach to secure short message transmission using deep learning techniques.
Daniel Seifert, Onur Günlü, Rafael F. Schaefer
― 6 min read
A simple method to detect hidden cameras using affordable devices.
Xiang Zhang, Jie Zhang, Zehua Ma
― 5 min read
Assessing the effectiveness of LLMs for threat analysis.
Sanchana Srikanth, Mohammad Hasanuzzaman, Farah Tasnur Meem
― 10 min read
PrivaMatch ensures privacy while matching DNA in criminal investigations.
Sankha Das
― 5 min read
New methods improve actuator security in Cyber-Physical Systems to prevent attacks.
Chuadhry Mujeeb Ahmed, Matthew Calder, Sean Gunawan
― 5 min read
Research reveals risks in smartphone motion sensors, highlighting privacy concerns.
Ahmed Najeeb, Abdul Rafay, Naveed Anwar Bhatti
― 5 min read
Analyzing connections between CAPEC and ATT&CK for improved risk assessments.
Braden K Webb, Sumit Purohit, Rounak Meyur
― 7 min read
Explore the privacy concerns surrounding membership inference attacks in machine learning.
Hongyan Chang, Ali Shahin Shamsabadi, Kleomenis Katevas
― 5 min read
This article investigates the threats posed by poisoning attacks on database systems.
Jintao Zhang, Chao Zhang, Guoliang Li
― 7 min read
Examining the critical role of governance in DLT security and effectiveness.
Aida Manzano Kharman, William Sanders
― 6 min read