New research reveals how shared features can predict AI model vulnerabilities.
Ashley S. Dale, Mei Qiu, Foo Bin Che
― 7 min read
Cutting edge science explained simply
New research reveals how shared features can predict AI model vulnerabilities.
Ashley S. Dale, Mei Qiu, Foo Bin Che
― 7 min read
Learn how memory contention can lead to hidden vulnerabilities in modern devices.
Ismet Dagli, James Crea, Soner Seckiner
― 5 min read
Learn how SBOMs protect software from hidden vulnerabilities.
Can Ozkan, Xinhai Zou, Dave Singelee
― 7 min read
Discover a powerful cloud storage system designed for safety and efficiency.
Prakash Aryan, Sujala Deepak Shetty
― 8 min read
Exploring the risks of backdoor attacks in machine learning and their implications.
ZeinabSadat Taghavi, Hossein Mirzaei
― 7 min read
Discover methods for maintaining privacy while ensuring fairness in data science.
Chunyang Liao, Deanna Needell, Alexander Xue
― 7 min read
Evaluating hidden outputs to protect sensitive data in AI systems.
Tao Huang, Qingyu Huang, Jiayang Meng
― 6 min read
Learn how PU and NU Learning enhance cybersecurity measures against hidden threats.
Robert Dilworth, Charan Gudla
― 6 min read
Learn how to make Large Language Models safer from harmful prompts.
Bryan Li, Sounak Bagchi, Zizhan Wang
― 7 min read
A new framework improves software security across multiple programming languages.
Boyu Zhang, Triet H. M. Le, M. Ali Babar
― 5 min read
A new algorithm improves the detection of unusual network activities.
Christie Djidjev
― 8 min read
Learn how to protect GNNs from adversarial attacks and enhance their reliability.
Kerui Wu, Ka-Ho Chow, Wenqi Wei
― 7 min read
Discover the challenges of combining SIFT and Fully Homomorphic Encryption.
Ishwar B Balappanawar, Bhargav Srinivas Kommireddy
― 7 min read
Discover how blockchain data analysis enhances security and decision-making in the digital realm.
Kentaroh Toyoda, Xiao Wang, Mingzhe Li
― 6 min read
Hypernetwork Federated Learning offers new ways to protect data privacy in machine learning.
Pengxin Guo, Shuang Zeng, Wenhao Chen
― 6 min read
New strategies improve Address Space Layout Randomization against attacks.
Shixin Song, Joseph Zhang, Mengjia Yan
― 6 min read
A fresh approach to securing peer-to-peer networks using blockchain technology.
Saurav Ghosh, Reshmi Mitra, Indranil Roy
― 7 min read
A novel approach to protect integrated circuits from theft using NFTs.
Shashank Balla, Yiming Zhao, Farinaz Koushanfar
― 6 min read
Facade offers an advanced approach to tackling insider threats in organizations.
Alex Kantchelian, Casper Neo, Ryan Stevens
― 7 min read
Discover how robustness enhances data analysis in algorithmic statistics.
Gautam Kamath
― 6 min read
New method enables backdoor attacks without clean data or model changes.
Bochuan Cao, Jinyuan Jia, Chuxuan Hu
― 7 min read
FuzzDistill makes fuzz testing smarter and more efficient using machine learning.
Saket Upadhyay
― 6 min read
New framework improves security patch detection for users and software.
Xin-Cheng Wen, Zirui Lin, Cuiyun Gao
― 6 min read
Mayfly keeps your data private while offering valuable insights.
Christopher Bian, Albert Cheu, Stanislav Chiknavaryan
― 6 min read
MOFHEI transforms machine learning for better privacy and efficiency.
Parsa Ghazvinian, Robert Podschwadt, Prajwal Panzade
― 6 min read
Discover how AI agents send hidden messages through playful actions.
Ching-Chun Chang, Isao Echizen
― 8 min read
Researchers provide essential security properties for hardware designs to enhance verification.
Jayden Rogers, Niyaz Shakeel, Divya Mankani
― 7 min read
A proactive method using Vision Language Models aims to detect hidden backdoor attacks.
Kyle Stein, Andrew Arash Mahyari, Guillermo Francia
― 7 min read
Discover how quantum technology is reshaping blockchain security and efficiency.
Jianming Lin, Hui Li, Hongjian Xing
― 5 min read
How language models can help identify and combat online scams.
Isha Chadalavada, Tianhui Huang, Jessica Staddon
― 6 min read
Researchers use deep learning and images to improve malware detection.
Atharva Khadilkar, Mark Stamp
― 5 min read
Discover how Pioplat accelerates blockchain communication for faster transactions.
Ke Wang, Qiao Wang, Yue Li
― 7 min read
A look into how Doubly-UAP tricks AI models with images and text.
Hee-Seon Kim, Minbeom Kim, Changick Kim
― 6 min read
How smart contracts and blockchain enhance patient data management.
Md Al Amin, Hemanth Tummala, Rushabh Shah
― 7 min read
A new method protects sensitive information while enabling useful data analysis.
Rayne Holland, Seyit Camtepe, Chandra Thapa
― 6 min read
QKD offers secure communication by using quantum mechanics principles to protect digital secrets.
Gian-Luca Haiden
― 5 min read
New tech uses blue light to identify individuals and check health.
Olaoluwayimika Olugbenle, Logan Drake, Naveenkumar G. Venkataswamy
― 6 min read
Discover how B3FA attacks compromise deep neural networks with minimal knowledge.
Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh
― 7 min read
New techniques aim to enhance homomorphic encryption performance with in-memory processing.
Mpoki Mwaisela, Joel Hari, Peterson Yuhala
― 8 min read
Uncovering tricks that threaten smart language models and how to counter them.
Zhiyu Xue, Guangliang Liu, Bocheng Chen
― 6 min read