A framework for reliable crowdsourcing through truth inference and zero-knowledge proofs.
― 8 min read
Cutting edge science explained simply
A framework for reliable crowdsourcing through truth inference and zero-knowledge proofs.
― 8 min read
A new attack efficiently removes hidden images while maintaining quality.
― 6 min read
Research reveals flaws in methods meant to erase sensitive concepts from AI image generation.
― 6 min read
A new method focuses on binary code behaviors for better similarity detection.
― 4 min read
A new protocol enhances time-lock puzzles for secure future communications.
― 6 min read
A new framework improves safe learning among robotic agents by addressing experience sharing risks.
― 5 min read
A new approach to enhance the security of autonomous vehicles against cyber threats.
― 4 min read
Automated attacks on DNN accelerators can reveal model details with minimal effort.
― 7 min read
A new system enhances accessibility and security in staking with NFTs and smart contracts.
― 5 min read
A new method improves privacy and model training in federated learning.
― 5 min read
Learn about the risks of sound-based keyboard attacks and how to protect yourself.
― 7 min read
A secure method for analyzing sensitive data using advanced mathematical techniques.
― 6 min read
A new framework enhances intrusion detection in IoT by addressing data imbalance.
― 5 min read
Tracking discussions helps in early threat detection and defense strategies.
― 5 min read
Examining the potential and challenges of Federated Machine Learning in preserving privacy.
― 7 min read
A study on the vulnerabilities of LLM-integrated applications against SQL injection attacks.
― 7 min read
URET offers a flexible solution against adversarial attacks in various data types.
― 7 min read
Examining the privacy limitations of stealth addresses in blockchain transactions.
― 5 min read
Examining the challenges and solutions for connected and autonomous vehicle operations.
― 6 min read
ScalOTA improves OTA updates for vehicles using update stations for faster and secure downloads.
― 5 min read
Data poisoning in AI can lead to vulnerable code generation, posing security threats.
― 5 min read
New method reveals vulnerabilities in Vertical Federated Learning systems using Graph Neural Networks.
― 5 min read
Introducing a new system for safe and efficient cross-chain trading.
― 5 min read
A method for better image generation that safeguards privacy using public datasets.
― 6 min read
SoftFlow helps identify security issues in electronic device design, protecting sensitive data.
― 5 min read
PPIMCE enhances performance in secure data processing without compromising privacy.
― 7 min read
An overview of Android malware types and analysis methods to enhance security.
― 5 min read
Explore the risks and prevention methods for IoT device security.
― 6 min read
An overview of privacy concerns in information sharing through gossip protocols.
― 5 min read
MASC provides a new approach to test crypto-API misuse detectors effectively.
― 5 min read
A new method for secure data aggregation aims to boost efficiency and privacy.
― 5 min read
AutoML4ETC automates the creation of neural networks for classifying encrypted network traffic.
― 7 min read
A new tool improves cybersecurity for robots using AI and game theory.
― 6 min read
A new chiplet design boosts the efficiency of Fully Homomorphic Encryption.
― 5 min read
A novel approach to accurately assess binary code similarities.
― 5 min read
This article examines local attack risks against the FIDO2 authentication protocol.
― 5 min read
This article discusses memory safety challenges and a new solution: Data-Pointer Tagging.
― 6 min read
Examining how incentive structures affect validator behavior in decentralized networks.
― 5 min read
A new framework for safeguarding prompt creators' rights in AI tools.
― 5 min read
A new framework improves WebAssembly binary protection against reverse engineering.
― 6 min read