New methods enhance privacy in sharing electricity usage data while maintaining its usefulness.
Sina Shaham, Gabriel Ghinita, Bhaskar Krishnamachari
― 7 min read
Cutting edge science explained simply
New methods enhance privacy in sharing electricity usage data while maintaining its usefulness.
Sina Shaham, Gabriel Ghinita, Bhaskar Krishnamachari
― 7 min read
Latest Articles
Yu Nong, Haoran Yang, Long Cheng
― 5 min read
Jayeeta Chaudhuri, Dhruv Thapar, Arjun Chaudhuri
― 5 min read
Vadim Arzamasov, Klemens Böhm
― 6 min read
Yasir Ali Farrukh, Syed Wali, Irfan Khan
― 7 min read
Bongsoo Yi, Rongjie Lai, Yao Li
― 4 min read
A new approach using partial TEEs boosts Tor network security and user privacy.
Rachel King, Quinn Burke, Yohan Beugin
― 7 min read
This article discusses improving smart contract defenses against attacks in decentralized finance.
Zhiyang Chen, Jan Gorzny, Martin Derka
― 6 min read
Learn how to manage risks in open-source projects effectively.
Janislley Oliveira de Sousa, Bruno Carvalho de Farias, Eddie Batista de Lima Filho
― 7 min read
Celtibero provides strong protection against attacks in federated learning systems.
Borja Molina-Coronado
― 4 min read
This article evaluates FAST and AEZ for disk encryption performance on FPGAs.
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas-Lopez
― 6 min read
A new method to foresee and prevent cyber threats targeting IoT devices.
Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji
― 5 min read
A new method uses anomaly detection for improved vulnerability identification in software.
Weizhou Wang, Eric Liu, Xiangyu Guo
― 6 min read
Exploring methods to boost Android malware detection against evolving evasion attacks.
Hamid Bostani, Zhengyu Zhao, Veelasha Moonsamy
― 6 min read
Ransomware attacks are on the rise, causing major financial losses worldwide.
Jack Cable, Ian W. Gray, Damon McCoy
― 6 min read
A new approach to secure embedded devices without downtime.
Mohsen Salehi, Karthik Pattabiraman
― 5 min read
A new method improves efficiency in secure machine learning using DCT with FHE.
Arjun Roy, Kaushik Roy
― 8 min read
An overview of ASLR effectiveness and weaknesses across Linux, Windows, and MacOS.
Lorenzo Binosi, Gregorio Barzasi, Michele Carminati
― 6 min read
ToxDet proposes a new method to identify harmful outputs in language models.
Yuhao Du, Zhuo Li, Pengyu Cheng
― 5 min read
A new tool helps users understand complex privacy policies easily.
Ashish Hooda, Rishabh Khandelwal, Prasad Chalasani
― 6 min read
A look into the effectiveness and limitations of CCMMs for organizations.
Lasini Liyanage, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello
― 5 min read
A novel approach to safeguard sensitive data through collaborative encryption methods.
Florian Le Mouël, Maxime Godon, Renaud Brien
― 7 min read
New techniques improve efficiency in addressing the Subset Sum challenge.
Antoine Joux, Karol Węgrzycki
― 4 min read
This article discusses the evaluation of LLMs in secure coding practices.
Anton Rydén, Erik Näslund, Elad Michael Schiller
― 6 min read
This research evaluates BGP security measures against various attacks.
Seth Barrett, Calvin Idom, German Zavala Villafuerte
― 5 min read
A new method improves DNN security without clean data.
Weilin Lin, Li Liu, Jianze Li
― 5 min read
Exploring the nuances of code-based digital signatures and their importance.
André Chailloux, Simona Etinski
― 5 min read
A look at federated analysis and privacy technologies for sensitive data.
Daniel Bachlechner, Ruben Hetfleisch, Stephan Krenn
― 5 min read
A review of nine adversary emulation tools to enhance cybersecurity testing.
Max Landauer, Klaus Mayer, Florian Skopik
― 8 min read
Explore federated learning's approach to privacy in machine learning.
Yan Sun, Li Shen, Dacheng Tao
― 5 min read
5G technology boosts industrial efficiency, but security challenges loom.
Sotiris Michaelides, Stefan Lenz, Thomas Vogt
― 6 min read
Examining vulnerabilities in EaaS and new watermarking defense strategies.
Anudeex Shetty, Qiongkai Xu, Jey Han Lau
― 6 min read
A new system detects spam by analyzing email designs, enhancing security measures.
Sachin Shukla, Omid Mirzaei
― 5 min read
PromptSmooth improves Med-VLMs' accuracy against adversarial attacks efficiently.
Noor Hussein, Fahad Shamshad, Muzammal Naseer
― 4 min read
Modifications to MOTION2NX improve efficiency and security in image inference tasks.
Haritha K, Ramya Burra, Srishti Mittal
― 6 min read
Analyzing how privacy standards influence data collection through web forms.
Hao Cui, Rahmadi Trimananda, Athina Markopoulou
― 5 min read
This article discusses ethical issues in computer vision, focusing on privacy and bias.
Ghalib Ahmed Tahir
― 7 min read
A study on improving tools for junior developers to address security issues.
Nafis Tanveer Islam, Mazal Bethany, Dylan Manuel
― 6 min read
This article explores deep learning approaches to detect intrusions in Software Defined Networks.
Osama Mustafa, Khizer Ali, Talha Naqash
― 6 min read
Exploring methods to protect information through cryptographic systems.
Ugo Dal Lago, Zeinab Galal, Giulia Giusti
― 6 min read
A new method improves detection of advanced persistent threats using machine learning.
Ali M. Bakhiet, Salah A. Aly
― 5 min read
Examining the effects of updates on safety, bias, and authenticity in image generation.
Yixin Wu, Yun Shen, Michael Backes
― 6 min read
Exploring advanced one-way functions to secure data against quantum threats.
Hua-Lei Yin
― 4 min read
Learn how quantum key distribution protects information from eavesdroppers.
Hua-Lei Yin
― 7 min read
Using simplicial complexes to improve network intrusion detection and security analysis.
Mandala von Westenholz, Martin Atzmueller, Tim Römer
― 5 min read
A new approach aims to enhance safety in public venues using advanced technology.
Artemis Stefanidou, Jorgen Cani, Thomas Papadopoulos
― 6 min read