Exploring how digital fingerprints impact privacy and security online.
Blerim Rexha, Arbena Musa, Kamer Vishi
― 7 min read
Cutting edge science explained simply
Exploring how digital fingerprints impact privacy and security online.
Blerim Rexha, Arbena Musa, Kamer Vishi
― 7 min read
A look into how VR apps handle user privacy and policy compliance.
Yuxia Zhan, Yan Meng, Lu Zhou
― 5 min read
Improving botnet detection methods through machine learning and adversarial defense strategies.
Rahul Yumlembam, Biju Issac, Seibu Mary Jacob
― 5 min read
New dataset ORBITAAL provides a detailed look at Bitcoin transactions from 2009 to 2021.
Célestin Coquidé, Rémy Cazabet
― 9 min read
Learn how watermarking secures AI models and supports creators' rights.
Erjin Bao, Ching-Chun Chang, Hanrui Wang
― 4 min read
A new method enhances federated learning's security by combating Byzantine attacks effectively.
Jiahao Xu, Zikai Zhang, Rui Hu
― 6 min read
Examining new methods to enhance neural network efficiency and security.
Giorgio Piras, Maura Pintor, Ambra Demontis
― 8 min read
Combining security and reliability to improve autonomous vehicle image processing systems.
Michael Kühr, Mohammad Hamad, Pedram MohajerAnsari
― 7 min read
This article examines the issues with creating effective SBOMs in Python.
Serena Cofano, Giacomo Benedetti, Matteo Dell'Amico
― 5 min read
This article explores the impact of attacks on machine learning models and defensive strategies.
Ivan Sabolić, Ivan Grubišić, Siniša Šegvić
― 7 min read
Assessing security risks in the Open Radio Access Network design.
Sotiris Michaelides, David Rupprecht, Katharina Kohls
― 5 min read
Exploring Secure Aggregation's role in Federated Learning within healthcare settings.
Riccardo Taiello, Sergen Cansiz, Marc Vesin
― 5 min read
Addressing security risks in network-booting systems for academic environments.
Simon Moser
― 6 min read
A framework for multilevel verification to improve data security in decentralized systems.
Ayush Thada, Aanchal Kandpal, Dipanwita Sinha Mukharjee
― 5 min read
A study on phishing tactics in the Ethereum blockchain and ways to fight back.
Zhuo Chen, Yufeng Hu, Bowen He
― 6 min read
NoiseAttack alters multiple classes in backdoor attacks using subtle noise patterns.
Abdullah Arafat Miah, Kaan Icer, Resit Sendag
― 6 min read
New methods enhance digital signature security against future computing threats.
Huda Naeem Hleeb Al-Jabbari, Ali Rajaei, Abbas Maarefparvar
― 5 min read
Learn how hidden triggers can manipulate language models and pose serious risks.
Abdullah Arafat Miah, Yu Bi
― 6 min read
Introducing a framework to secure wireless networks against emerging threats.
Saleh Darzi, Attila Altay Yavuz
― 6 min read
Research reveals methods to protect against side-channel attacks on FPGAs.
Davide Galli, Adriano Guarisco, William Fornaciari
― 5 min read
A new framework improves simulations for emergency response efficiency.
Jardi Martinez Jordan, Michael Stiber
― 7 min read
A look at new approaches to enhance secure programming methods.
Vivian Ding, Coşku Acay, Andrew C. Myers
― 5 min read
Improving cybersecurity through enhanced anomaly detection using GNNs.
Ahmad Hafez
― 8 min read
Discovering secure methods for data sharing in advanced communication systems.
Truman Welling, Onur Günlü, Aylin Yener
― 6 min read
A method for monitoring software adherence to security protocol rules.
Kevin Morio, Robert Künnemann
― 6 min read
Enhancing efficiency in secure processing of machine learning tasks.
Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani
― 6 min read
IoT security needs urgent attention for safer device interactions.
Andrew Baldrian, Joseph Hallett
― 8 min read
LoRD improves efficiency in model extraction attacks on large language models.
Zi Liang, Qingqing Ye, Yanyun Wang
― 6 min read
Discover how Layer Two solutions improve Bitcoin's transaction speed and efficiency.
Minfeng Qi, Qin Wang, Zhipeng Wang
― 5 min read
New framework GenDFIR enhances the analysis of cyber event timelines.
Fatma Yasmine Loumachi, Mohamed Chahine Ghanem
― 7 min read
A new framework enhances chip resilience against security threats through diversity.
Ahmad T. Sheikh, Ali Shoker, Suhaib A. Fahmy
― 7 min read
A look into quantum sieving’s role in enhancing code-based cryptography.
Lynn Engelberts, Simona Etinski, Johanna Loyer
― 6 min read
Examining key issues in the safety and security of autonomous vehicles.
Noah T. Curran, Minkyoung Cho, Ryan Feng
― 5 min read
This paper addresses control-flow leakage threats and proposes a new hardware-software approach.
Hans Winderix, Marton Bognar, Lesly-Ann Daniel
― 5 min read
Examining how important data points attract more security risks in machine learning.
Rui Wen, Michael Backes, Yang Zhang
― 5 min read
A new IDS model provides efficient DDoS detection in Software Defined Networks.
Rasoul Jafari Gohari, Laya Aliahmadipour, Marjan Kuchaki Rafsanjani
― 6 min read
FTLGAN enhances facial recognition for low-resolution images, ensuring better identification.
Sebastian Pulgar, Domingo Mery
― 6 min read
New method creates virtual faces for online interactions while ensuring user privacy.
Miaomiao Wang, Guang Hua, Sheng Li
― 7 min read
Learn how security practices can improve software development and reduce risks.
Ricardo M. Czekster
― 6 min read
A look at differential privacy and its role in protecting individual data while ensuring utility.
Yu Zheng, Wenchao Zhang, Yonggang Zhang
― 6 min read