New tech uses blue light to identify individuals and check health.
Olaoluwayimika Olugbenle, Logan Drake, Naveenkumar G. Venkataswamy
― 6 min read
Cutting edge science explained simply
New tech uses blue light to identify individuals and check health.
Olaoluwayimika Olugbenle, Logan Drake, Naveenkumar G. Venkataswamy
― 6 min read
Discover how B3FA attacks compromise deep neural networks with minimal knowledge.
Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh
― 7 min read
New techniques aim to enhance homomorphic encryption performance with in-memory processing.
Mpoki Mwaisela, Joel Hari, Peterson Yuhala
― 8 min read
Uncovering tricks that threaten smart language models and how to counter them.
Zhiyu Xue, Guangliang Liu, Bocheng Chen
― 6 min read
Exploring the impact and challenges of internet voting systems.
Stanisław Barański, Ben Biedermann, Joshua Ellul
― 7 min read
A new approach improves security in federated learning by focusing on client-side defenses.
Borja Molina-Coronado
― 6 min read
Discover how texture bias impacts AI decisions and object recognition.
Blaine Hoak, Ryan Sheatsley, Patrick McDaniel
― 6 min read
Learn how exclaves enhance privacy and integrity in federated learning models.
Jinnan Guo, Kapil Vaswani, Andrew Paverd
― 6 min read
AdvPrefix improves how we interact with language models, making them more effective.
Sicheng Zhu, Brandon Amos, Yuandong Tian
― 6 min read
Discover how SPIDEr protects personal information while enabling data use.
Novoneel Chakraborty, Anshoo Tandon, Kailash Reddy
― 6 min read
How Amazon's Sidewalk blurs privacy and power dynamics in the digital age.
Thijmen van Gend, Donald Jay Bertulfo, Seda Gürses
― 5 min read
A new dataset improves smart contract security by identifying vulnerabilities.
Chavhan Sujeet Yashavant, MitrajSinh Chavda, Saurabh Kumar
― 5 min read
Learn how BlockDoor secures neural networks against backdoor attacks.
Yi Hao Puah, Anh Tu Ngo, Nandish Chattopadhyay
― 7 min read
Learn how NIDS and advanced models boost cybersecurity efforts.
Nir Daniel, Florian Klaus Kaiser, Shay Giladi
― 6 min read
Manipulating AI behavior poses serious risks in advanced systems.
Fengshuo Bai, Runze Liu, Yali Du
― 6 min read
Discover how adversarial examples challenge cybersecurity and the defenses against them.
Li Li
― 5 min read
New method aims to improve safety in text-to-image models.
Portia Cooper, Harshita Narnoli, Mihai Surdeanu
― 5 min read
Discovering the dangers of backdoor attacks in diffusion models.
Yuning Han, Bingyin Zhao, Rui Chu
― 7 min read
Learn how personalized phishing attacks are becoming more dangerous.
Qinglin Qi, Yun Luo, Yijia Xu
― 5 min read
Learn how new methods protect identities in brain-computer interfaces.
L. Meng, X. Jiang, J. Huang
― 6 min read
Learn how ZKPs help protect your privacy in the digital world.
Shahzad Ahmad Butt, Benjamin Reynolds, Veeraraghavan Ramamurthy
― 6 min read
Learn how phishing attacks exploit trusted networks to steal information.
Elisa Luo, Liane Young, Grant Ho
― 8 min read
Discover how learning models strive to enhance privacy in the digital age.
Maryam Aliakbarpour, Konstantina Bairaktari, Adam Smith
― 8 min read
SLIM encryption offers a shield against quantum threats to digital security.
Hasan Ozgur Cildiroglu, Oguz Yayla
― 6 min read
Using large language models to detect software weaknesses.
Ira Ceka, Feitong Qiao, Anik Dey
― 8 min read
Radio Frequency Fingerprinting and edge computing tackle IoT security challenges efficiently.
Ahmed Mohamed Hussain, Nada Abughanam, Panos Papadimitratos
― 6 min read
Examining the role of AI in safeguarding vital computer systems.
Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi
― 5 min read
How IoT devices impact privacy and the need for transparency.
Isita Bagayatkar, Youngil Kim, Gene Tsudik
― 8 min read
Website Fingerprinting reveals user activity despite Tor's privacy features.
Jiajun Gong, Wei Cai, Siyuan Liang
― 7 min read
Learn how the Fully Homomorphic Integrity Model protects sensitive healthcare information.
B. Shuriya, S. Vimal Kumar, K. Bagyalakshmi
― 5 min read
Fake stars are misleading the software development community.
Hao He, Haoqin Yang, Philipp Burckhardt
― 6 min read
Discover how Magnifier transforms mobile device network tracking effortlessly.
Wenhao Li, Qiang Wang, Huaifeng Bao
― 5 min read
Discover how GraphFuzz transforms chip design validation and enhances security.
Raghul Saravanan, Sreenitha Kasarapu, Sai Manoj Pudukotai Dinakarrao
― 6 min read
Learn how to keep your messages private with new techniques against quantum threats.
Paul Staat, Meik Dörpinghaus, Azadeh Sheikholeslami
― 6 min read
A new method enables efficient trojan attacks on language models through broader concepts.
Keltin Grimes, Marco Christiani, David Shriver
― 5 min read
TETRIS enables secure data analysis while maintaining personal privacy.
Malika Izabachène, Jean-Philippe Bossuat
― 5 min read
New methods improve link prediction attack strategies and highlight security flaws.
Jiate Li, Meng Pang, Binghui Wang
― 7 min read
A look at synthetic data and its role in privacy.
Lucas Rosenblatt, Bill Howe, Julia Stoyanovich
― 5 min read
Learn how to safeguard your machine learning models with fingerprinting techniques.
Augustin Godinot, Erwan Le Merrer, Camilla Penzo
― 6 min read
Discover how differential privacy protects personal data during analysis.
Albert Cheu, Debanuj Nayak
― 7 min read