This article investigates the threats posed by poisoning attacks on database systems.
Jintao Zhang, Chao Zhang, Guoliang Li
― 7 min read
Cutting edge science explained simply
This article investigates the threats posed by poisoning attacks on database systems.
Jintao Zhang, Chao Zhang, Guoliang Li
― 7 min read
Examining the critical role of governance in DLT security and effectiveness.
Aida Manzano Kharman, William Sanders
― 6 min read
Assessing AI performance using survival analysis for reliability against challenges.
Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy Löfstedt
― 7 min read
A new method protects privacy while finding maximum values in distributed networks.
Wenrui Yu, Richard Heusdens, Jun Pang
― 4 min read
Selective encryption enhances privacy while maintaining model performance in collaborative learning.
Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov
― 6 min read
Introducing a framework for secure training of machine learning models.
Haleh Hayati, Carlos Murguia, Nathan van de Wouw
― 5 min read
AI tools in healthcare offer benefits but raise significant safety concerns.
Ananya Gangavarapu
― 6 min read
Techniques to protect sensitive data in machine learning.
Francisco Aguilera-Martínez, Fernando Berzal
― 5 min read
AI technology is changing the landscape of vishing scams, increasing risks for individuals.
João Figueiredo, Afonso Carvalho, Daniel Castro
― 5 min read
This article discusses enhancing unsupervised anomaly detection using classification methods.
Tian-Yi Zhou, Matthew Lau, Jizhou Chen
― 6 min read
A look into privacy-preserving computation and its efficiency through memory-centric designs.
Mpoki Mwaisela
― 5 min read
A new method for counting cycles in graphs while ensuring user privacy.
Quentin Hillebrand, Vorapong Suppakitpaisarn, Tetsuo Shibuya
― 6 min read
CryptoTrain combines cryptographic techniques to protect sensitive data during machine learning training.
Jiaqi Xue, Yancheng Zhang, Yanshan Wang
― 5 min read
Learn about blockchain technology and its applications in various fields.
Badr Bellaj, Aafaf Ouaddah, Noel Crespi
― 6 min read
Enhancing LLMs' ability to repair buffer overflow vulnerabilities with context-aware techniques.
Arshiya Khan, Guannan Liu, Xing Gao
― 5 min read
Decentralized Social Networks empower users with data control and privacy.
Quang Cao, Katerina Vgena, Aikaterini-Georgia Mavroeidi
― 6 min read
SOSK helps users track and extract keywords from software security reports.
Phong Minh Vu, Tung Thanh Nguyen
― 6 min read
Research reveals vulnerabilities in AV lane detection through negative shadows.
Pedram MohajerAnsari, Alkim Domeke, Jan de Voor
― 7 min read
Innovative methods improve detection of malware through deep packet inspection.
Kyle Stein, Arash Mahyari, Guillermo Francia
― 5 min read
New design improves reliability and security for IoT devices using PUF technology.
Gaoxiang Li, Yu Zhuang
― 5 min read
As technology advances, software security faces new challenges and opportunities.
Marcel Böhme, Eric Bodden, Tevfik Bultan
― 8 min read
MoJE enhances guardrails for LLMs, tackling jailbreak attacks effectively.
Giandomenico Cornacchia, Giulio Zizzo, Kieran Fraser
― 7 min read
TLSNotary ensures data authenticity while maintaining client privacy in online communications.
Maciej Kalka, Marek Kirejczyk
― 7 min read
Improving methods to verify authenticity of products through Copy Detection Patterns.
Joakim Tutt, Slava Voloshynovskiy
― 6 min read
A look at how differential privacy safeguards individual data in a data-driven world.
Weijie J. Su
― 6 min read
Exploring the need for effective enforcement of data usage policies.
Andrea Cimmino, Juan Cano-Benito, Raúl García-Castro
― 7 min read
New methods enhance security practices in interconnected industrial systems.
Thomas Rosenstatter, Christian Schäfer, Olaf Saßnick
― 6 min read
A new method improves detection of texts generated by language models.
Zhengan Huang, Gongxian Zeng, Xin Mu
― 6 min read
Examining the impact and lessons of the DarkSeoul cyberattack on South Korea.
Puya Pakshad, Abiha Hussain, Maks Dudek
― 7 min read
Investigating the quality and security concerns of AI-generated code.
Chun Jie Chong, Zhihao Yao, Iulian Neamtiu
― 7 min read
Discover how tensor networks enhance anomaly detection across various fields.
Alejandro Mata Ali, Aitor Moreno Fdez. de Leceta, Jorge López Rubio
― 4 min read
This article discusses safety issues in text-to-image models and proposes solutions.
Tong Liu, Zhixin Lai, Gengyuan Zhang
― 6 min read
This article presents solutions to protect user inputs in cloud-based language services.
In Gim, Caihua Li, Lin Zhong
― 6 min read
A look at privacy risks and secure methods for generative AI.
Manil Shrestha, Yashodha Ravichandran, Edward Kim
― 6 min read
Learn how to protect language models from manipulation and ensure secure responses.
Fangzhou Wu, Ethan Cecchetti, Chaowei Xiao
― 6 min read
A new method predicts memorization risks in Large Language Models to enhance privacy.
Jérémie Dentan, Davide Buscaldi, Aymen Shabou
― 4 min read
An overview of traditional and deep learning methods in network security.
Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj
― 5 min read
Research reveals weaknesses in online toxicity detection using ASCII art techniques.
Sergey Berezin, Reza Farahbakhsh, Noel Crespi
― 6 min read
New algorithms improve solving integer equations critical for cryptography.
Mayank Deora, Pinakpani Pal
― 5 min read
Automated tools are crucial for verifying hardware security in modern devices.
Yao Hsiao, Nikos Nikoleris, Artem Khyzha
― 4 min read