A look into private prediction methods and the DaRRM algorithm.
Shuli Jiang, Qiuyi, Zhang
― 4 min read
Cutting edge science explained simply
A look into private prediction methods and the DaRRM algorithm.
Shuli Jiang, Qiuyi, Zhang
― 4 min read
A new strategy for targeting multiple tasks in deep neural networks.
Jiacheng Guo, Tianyun Zhang, Lei Li
― 6 min read
A look at deepfakes, their risks, and ways to detect them.
Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen
― 5 min read
Learn essential steps to prepare and present your research effectively.
Bhaktipriya Radharapu, Harish Krishna
― 5 min read
Using advanced techniques to improve Bitcoin transaction analysis and mixer identification.
Ming-Fong Sie, Yen-Jui Chang, Chien-Lung Lin
― 6 min read
Explore how backdoor attacks threaten hardware design using large language models.
Lakshmi Likhitha Mankali, Jitendra Bhandari, Manaar Alam
― 7 min read
Research highlights methods to detect backdoor attacks in fine-tuning language models.
Zhen Sun, Tianshuo Cong, Yule Liu
― 9 min read
Examining how code complexity impacts security in smart contracts.
Masoud Jamshidiyan Tehrani, Sattar Hashemi
― 5 min read
Learn about biometric systems and their role in identity verification.
Sam Grierson, William J Buchanan, Craig Thomson
― 6 min read
Discover how steganography keeps secrets safe within images using deep learning.
Waheed Rehman
― 6 min read
Leaves can confuse image recognition systems in self-driving cars.
Anthony Etim, Jakub Szefer
― 6 min read
Research reveals vulnerabilities in AI image generators from prompt manipulation.
Ted Kwartler, Nataliia Bagan, Ivan Banny
― 6 min read
Discover how RITA helps in building safe IoT applications.
Luis Eduardo Pessoa, Cristovao Freitas Iglesias, Claudio Miceli
― 5 min read
We examined two scenarios for developing security tools against attacks.
Samuele Pasini, Jinhan Kim, Tommaso Aiello
― 6 min read
Using large language models to improve fuzzing seed generation for software testing.
Wenxuan Shi, Yunhang Zhang, Xinyu Xing
― 5 min read
A new method aims to detect the origin of synthetic voices.
Matías Pizarro, Mike Laszkiewicz, Dorothea Kolossa
― 7 min read
Learn how to spot and fix security code smells in JavaScript.
Vikas Kambhampati, Nehaz Hussain Mohammed, Amin Milani Fard
― 6 min read
Examining the benefits and risks of Federated Parameter-Efficient Fine-Tuning.
Shenghui Li, Edith C. -H. Ngai, Fanghua Ye
― 7 min read
RevPRAG helps detect misinformation in language models and ensures accurate information flow.
Xue Tan, Hao Luan, Mingyu Luo
― 5 min read
Learn how Fault Tree Analysis and AI enhance car safety.
Sneha Sudhir Shetiya, Divya Garikapati, Veeraja Sohoni
― 6 min read
A deep dive into how MATTER exploits thermal vulnerabilities in mobile chips.
Mehdi Elahi, Mohamed R. Elshamy, Abdel-Hameed Badawy
― 7 min read
A systematic approach to identify and mitigate risks in industrial control systems.
Can Ozkan, Dave Singelee
― 5 min read
Learn how Quantum Key Distribution keeps your communications private and secure.
Davide Li Calsi, Sumit Chaudhary, JinHyeock Choi
― 6 min read
Innovative methods aim to enhance AI language models while ensuring safety and efficiency.
Yule Liu, Zhen Sun, Xinlei He
― 6 min read
An overview of deepfakes, their risks, and a new Hindi dataset.
Sukhandeep Kaur, Mubashir Buhari, Naman Khandelwal
― 6 min read
A look at the strengths and weaknesses of advanced code helpers.
Md Imran Hossen, Xiali Hei
― 4 min read
LLMs face challenges in detecting smart scams and need improvement.
Chen-Wei Chang, Shailik Sarkar, Shutonu Mitra
― 5 min read
Learn how the linear-transformation model protects data privacy during analysis.
Jakob Burkhardt, Hannah Keller, Claudio Orlandi
― 7 min read
Learn how attackers manipulate data and disrupt decision making processes.
William N. Caballero, Matthew LaRosa, Alexander Fisher
― 5 min read
Learn how Confidential Computing protects sensitive information in today's digital world.
Caihua Li, Seung-seob Lee, Lin Zhong
― 5 min read
TruncFormer speeds up private inference for large language models while keeping data safe.
Patrick Yubeaton, Jianqiao Cambridge Mo, Karthik Garimella
― 6 min read
SOUL transforms network security by using limited data to detect attacks.
Suresh Kumar Amalapuram, Shreya Kumar, Bheemarjuna Reddy Tamma
― 6 min read
Learn how data poisoning interferes with AI training processes.
Jianhui Li, Bokang Zhang, Junfeng Wu
― 7 min read
Learn how to improve Graph Neural Networks by correcting harmful data.
Varshita Kolipaka, Akshit Sinha, Debangan Mishra
― 7 min read
Learn how machines can forget unnecessary data for better privacy.
Jose Miguel Lara Rangel, Stefan Schoepf, Jack Foster
― 6 min read
Learn how PAR helps protect AI models from hidden threats.
Naman Deep Singh, Francesco Croce, Matthias Hein
― 6 min read
Inference Privacy safeguards personal data during digital interactions.
Fengwei Tian, Ravi Tandon
― 6 min read
Discover PXoM, the innovative defense against memory corruption attacks.
Chenke Luo, Jiang Ming, Mengfei Xie
― 6 min read
Learn how sandbagging affects AI assessments and ways to detect it.
Cameron Tice, Philipp Alexander Kreer, Nathan Helm-Burger
― 6 min read
New methods ensure data privacy protection while utilizing machine learning.
Sangyeon Yoon, Wonje Jeung, Albert No
― 6 min read