A new approach to classify malware efficiently using fewer labeled samples.
― 8 min read
Cutting edge science explained simply
A new approach to classify malware efficiently using fewer labeled samples.
― 8 min read
A look at privacy concerns in centralized and decentralized learning systems.
― 5 min read
Examining the privacy challenges associated with Federated Learning and gradient inversion attacks.
― 7 min read
MEGA-PT improves penetration testing effectiveness and adaptability for better cybersecurity.
― 5 min read
This approach improves efficiency in training models from large graph data while protecting privacy.
― 5 min read
Research unveils faster mixing methods in random reversible circuits for improved cryptography.
― 4 min read
A study reveals the rise of cybercrime activity on Telegram channels.
― 4 min read
Combining blockchain and IPFS offers a secure and efficient solution for version control.
― 7 min read
RPKI strengthens Internet routing by verifying data authenticity.
― 7 min read
This work presents new methods for detecting malware using visualization and machine learning.
― 5 min read
A new method to safeguard individual rights from image misuse in animations.
― 5 min read
Examining firmware vulnerabilities and the tools to enhance security.
― 7 min read
Exploring the role of Semantic Communication and security in next-gen networks.
― 8 min read
This article examines browser fingerprinting's role in online advertising and its privacy concerns.
― 6 min read
A look at data privacy issues in Android Automotive OS.
― 5 min read
A new memory allocator improves security against Rowhammer attacks while maintaining performance.
― 6 min read
Addressing security risks in generative AI through red and blue teaming.
― 5 min read
A new approach to secure short message transmission using deep learning techniques.
― 6 min read
A simple method to detect hidden cameras using affordable devices.
― 5 min read
Assessing the effectiveness of LLMs for threat analysis.
― 10 min read
PrivaMatch ensures privacy while matching DNA in criminal investigations.
― 5 min read
New methods improve actuator security in Cyber-Physical Systems to prevent attacks.
― 5 min read
Research reveals risks in smartphone motion sensors, highlighting privacy concerns.
― 5 min read
Analyzing connections between CAPEC and ATT&CK for improved risk assessments.
― 7 min read
Explore the privacy concerns surrounding membership inference attacks in machine learning.
― 5 min read
This article investigates the threats posed by poisoning attacks on database systems.
― 7 min read
Examining the critical role of governance in DLT security and effectiveness.
― 6 min read
Assessing AI performance using survival analysis for reliability against challenges.
― 7 min read
A new method protects privacy while finding maximum values in distributed networks.
― 4 min read
Selective encryption enhances privacy while maintaining model performance in collaborative learning.
― 6 min read
Introducing a framework for secure training of machine learning models.
― 5 min read
AI tools in healthcare offer benefits but raise significant safety concerns.
― 6 min read
Techniques to protect sensitive data in machine learning.
― 5 min read
AI technology is changing the landscape of vishing scams, increasing risks for individuals.
― 5 min read
This article discusses enhancing unsupervised anomaly detection using classification methods.
― 6 min read
A look into privacy-preserving computation and its efficiency through memory-centric designs.
― 5 min read
A new method for counting cycles in graphs while ensuring user privacy.
― 6 min read
CryptoTrain combines cryptographic techniques to protect sensitive data during machine learning training.
― 5 min read
Learn about blockchain technology and its applications in various fields.
― 6 min read
Enhancing LLMs' ability to repair buffer overflow vulnerabilities with context-aware techniques.
― 5 min read