A new framework improves time series forecasting while ensuring data privacy.
Wei Yuan, Guanhua Ye, Xiangyu Zhao
― 9 min read
Cutting edge science explained simply
A new framework improves time series forecasting while ensuring data privacy.
Wei Yuan, Guanhua Ye, Xiangyu Zhao
― 9 min read
A new framework enhances secure computation for Transformers, ensuring privacy and efficiency.
Zhengyi Li, Kang Yang, Jin Tan
― 7 min read
ICER framework tests safety measures in text-to-image models effectively.
Zhi-Yi Chin, Kuan-Chen Mu, Mario Fritz
― 7 min read
Learn about phishing tactics and how to protect yourself.
Tosin Ige, Christopher Kiekintveld, Aritran Piplai
― 5 min read
This guide discusses keeping data safe while training AI effectively.
Qi Li, Cheng-Long Wang, Yinzhi Cao
― 7 min read
Learn how machine learning helps detect malware on Android devices.
Maithili Kulkarni, Mark Stamp
― 6 min read
Discover how blockchain and LLMs can work together for security and efficiency.
Jianghao Gong, Peiqi Yan, Yue Zhang
― 6 min read
Exploring the dangers of misuse in artificial intelligence through jailbreak prompts.
Jean Marie Tshimula, Xavier Ndona, D'Jeff K. Nkashama
― 7 min read
Privacy auditing is vital for safeguarding personal data in today's information age.
Shiming Wang, Liyao Xiang, Bowei Cheng
― 5 min read
Explore Dmitry's choices and the underground cybercriminal landscape.
Luca Allodi, Roy Ricaldi, Jai Wientjes
― 6 min read
A new tool to evaluate language models in cybersecurity tasks.
Zhengmin Yu, Jiutian Zeng, Siyi Chen
― 6 min read
Discover how to safeguard machines from backdoor attacks in self-supervised learning.
Sizai Hou, Songze Li, Duanyi Yao
― 6 min read
Learn efficient ways to count arrangements with specific conditions.
Martin Mathew, Javier Noda
― 7 min read
A look into private prediction methods and the DaRRM algorithm.
Shuli Jiang, Qiuyi, Zhang
― 4 min read
A new strategy for targeting multiple tasks in deep neural networks.
Jiacheng Guo, Tianyun Zhang, Lei Li
― 6 min read
A look at deepfakes, their risks, and ways to detect them.
Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen
― 5 min read
Learn essential steps to prepare and present your research effectively.
Bhaktipriya Radharapu, Harish Krishna
― 5 min read
Using advanced techniques to improve Bitcoin transaction analysis and mixer identification.
Ming-Fong Sie, Yen-Jui Chang, Chien-Lung Lin
― 6 min read
Explore how backdoor attacks threaten hardware design using large language models.
Lakshmi Likhitha Mankali, Jitendra Bhandari, Manaar Alam
― 7 min read
Research highlights methods to detect backdoor attacks in fine-tuning language models.
Zhen Sun, Tianshuo Cong, Yule Liu
― 9 min read
Examining how code complexity impacts security in smart contracts.
Masoud Jamshidiyan Tehrani, Sattar Hashemi
― 5 min read
Learn about biometric systems and their role in identity verification.
Sam Grierson, William J Buchanan, Craig Thomson
― 6 min read
Discover how steganography keeps secrets safe within images using deep learning.
Waheed Rehman
― 6 min read
Leaves can confuse image recognition systems in self-driving cars.
Anthony Etim, Jakub Szefer
― 6 min read
Research reveals vulnerabilities in AI image generators from prompt manipulation.
Ted Kwartler, Nataliia Bagan, Ivan Banny
― 6 min read
Discover how RITA helps in building safe IoT applications.
Luis Eduardo Pessoa, Cristovao Freitas Iglesias, Claudio Miceli
― 5 min read
We examined two scenarios for developing security tools against attacks.
Samuele Pasini, Jinhan Kim, Tommaso Aiello
― 6 min read
Using large language models to improve fuzzing seed generation for software testing.
Wenxuan Shi, Yunhang Zhang, Xinyu Xing
― 5 min read
A new method aims to detect the origin of synthetic voices.
Matías Pizarro, Mike Laszkiewicz, Dorothea Kolossa
― 7 min read
Learn how to spot and fix security code smells in JavaScript.
Vikas Kambhampati, Nehaz Hussain Mohammed, Amin Milani Fard
― 6 min read
Examining the benefits and risks of Federated Parameter-Efficient Fine-Tuning.
Shenghui Li, Edith C. -H. Ngai, Fanghua Ye
― 7 min read
RevPRAG helps detect misinformation in language models and ensures accurate information flow.
Xue Tan, Hao Luan, Mingyu Luo
― 5 min read
Learn how Fault Tree Analysis and AI enhance car safety.
Sneha Sudhir Shetiya, Divya Garikapati, Veeraja Sohoni
― 6 min read
A deep dive into how MATTER exploits thermal vulnerabilities in mobile chips.
Mehdi Elahi, Mohamed R. Elshamy, Abdel-Hameed Badawy
― 7 min read
A systematic approach to identify and mitigate risks in industrial control systems.
Can Ozkan, Dave Singelee
― 5 min read
Learn how Quantum Key Distribution keeps your communications private and secure.
Davide Li Calsi, Sumit Chaudhary, JinHyeock Choi
― 6 min read
Innovative methods aim to enhance AI language models while ensuring safety and efficiency.
Yule Liu, Zhen Sun, Xinlei He
― 6 min read
An overview of deepfakes, their risks, and a new Hindi dataset.
Sukhandeep Kaur, Mubashir Buhari, Naman Khandelwal
― 6 min read
A look at the strengths and weaknesses of advanced code helpers.
Md Imran Hossen, Xiali Hei
― 4 min read
LLMs face challenges in detecting smart scams and need improvement.
Chen-Wei Chang, Shailik Sarkar, Shutonu Mitra
― 5 min read