Website Fingerprinting reveals user activity despite Tor's privacy features.
Jiajun Gong, Wei Cai, Siyuan Liang
― 7 min read
Cutting edge science explained simply
Website Fingerprinting reveals user activity despite Tor's privacy features.
Jiajun Gong, Wei Cai, Siyuan Liang
― 7 min read
Learn how the Fully Homomorphic Integrity Model protects sensitive healthcare information.
B. Shuriya, S. Vimal Kumar, K. Bagyalakshmi
― 5 min read
Fake stars are misleading the software development community.
Hao He, Haoqin Yang, Philipp Burckhardt
― 6 min read
Discover how Magnifier transforms mobile device network tracking effortlessly.
Wenhao Li, Qiang Wang, Huaifeng Bao
― 5 min read
Discover how GraphFuzz transforms chip design validation and enhances security.
Raghul Saravanan, Sreenitha Kasarapu, Sai Manoj Pudukotai Dinakarrao
― 6 min read
Learn how to keep your messages private with new techniques against quantum threats.
Paul Staat, Meik Dörpinghaus, Azadeh Sheikholeslami
― 6 min read
A new method enables efficient trojan attacks on language models through broader concepts.
Keltin Grimes, Marco Christiani, David Shriver
― 5 min read
TETRIS enables secure data analysis while maintaining personal privacy.
Malika Izabachène, Jean-Philippe Bossuat
― 5 min read
New methods improve link prediction attack strategies and highlight security flaws.
Jiate Li, Meng Pang, Binghui Wang
― 7 min read
A look at synthetic data and its role in privacy.
Lucas Rosenblatt, Bill Howe, Julia Stoyanovich
― 5 min read
Learn how to safeguard your machine learning models with fingerprinting techniques.
Augustin Godinot, Erwan Le Merrer, Camilla Penzo
― 6 min read
Discover how differential privacy protects personal data during analysis.
Albert Cheu, Debanuj Nayak
― 7 min read
How experts reconstruct events in the digital world.
Céline Vanini, Chris Hargreaves, Frank Breitinger
― 8 min read
Learn how privacy-preserving cloud services keep your information safe.
Yihang Cheng, Lan Zhang, Junyang Wang
― 8 min read
Transplantation optimizes fuzzing for MCU firmware, improving speed and efficiency.
Florian Hofhammer, Qinying Wang, Atri Bhattacharyya
― 5 min read
Automated tools revolutionize security assessments across digital landscapes.
Charilaos Skandylas, Mikael Asplund
― 6 min read
A look at secure authentication methods for smart urban environments.
Khan Reaz, Gerhard Wunder
― 10 min read
A new model to enhance cloud data security against malicious users.
Kishu Gupta, Deepika Saxena, Rishabh Gupta
― 6 min read
MAIDS offers proactive security for cloud data against unauthorized access.
Kishu Gupta, Deepika Saxena, Rishabh Gupta
― 6 min read
Learn how to protect industrial systems from cyber attacks with new security methods.
Arthur Amorim, Trevor Kann, Max Taylor
― 8 min read
Learn how fingerprinting codes and algorithms protect your personal data.
Xin Lyu, Kunal Talwar
― 6 min read
Explore how differential privacy aids decision-making while protecting individual data.
Victor A. E. Farias, Felipe T. Brito, Cheryl Flynn
― 6 min read
Learn how flow exporters improve datasets for machine learning in intrusion detection.
Daniela Pinto, João Vitorino, Eva Maia
― 8 min read
Explore the evolving world of cybersecurity and its critical role in safety.
Shalini Saini, Anitha Chennamaneni, Babatunde Sawyerr
― 14 min read
VIAP offers a solution to fool AI recognition systems from various angles.
Christian Green, Mehmet Ergezer, Abdurrahman Zeybey
― 8 min read
Navigating the intersection of privacy and user-friendly data access.
Liudas Panavas, Joshua Snoke, Erika Tyagi
― 7 min read
Discover how 5G technology connects our world while ensuring safety.
Joshua Groen, Simone Di Valerio, Imtiaz Karim
― 4 min read
A novel framework enhances IoT security using AI and homomorphic encryption.
Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang
― 7 min read
Explore how context collapse affects your online privacy.
Ido Sivan-Sevilla, Parthav Poudel
― 6 min read
Learn how new specs clarify data rights management under GDPR.
Beatriz Esteves, Harshvardhan J. Pandit, Georg P. Krog
― 5 min read
Examining privacy concerns surrounding the use of language models.
Tianchen Zhang, Gururaj Saileshwar, David Lie
― 5 min read
Learn about pig butchering scams and how to protect against them.
Bhupendra Acharya, Thorsten Holz
― 5 min read
MIETT uses advanced techniques for efficient encrypted traffic classification.
Xu-Yang Chen, Lu Han, De-Chuan Zhan
― 6 min read
Discover a new method for comparing encrypted data efficiently and securely.
Federico Mazzone, Maarten Everts, Florian Hahn
― 7 min read
Learn how scammers operate and protect yourself from online fraud.
Bhupendra Acharya, Dominik Sautter, Muhammad Saad
― 8 min read
Explore the booming underground market for social media accounts and its risks.
Mario Beluri, Bhupendra Acharya, Soheil Khodayari
― 8 min read
Learn how Shapley values enhance understanding of AI choices and decisions.
Iain Burge, Michel Barbeau, Joaquin Garcia-Alfaro
― 6 min read
FRIDAY improves deepfake detection by focusing on manipulation signs.
Younhun Kim, Myung-Joon Kwon, Wonjun Lee
― 4 min read
AIArena democratizes AI development, fostering collaboration and fairness through blockchain technology.
Zhipeng Wang, Rui Sun, Elizabeth Lui
― 7 min read
Using deception to confuse cyber attackers and protect valuable data.
Jason Landsborough, Neil C. Rowe, Thuy D. Nguyen
― 6 min read