A framework using MLP and SVM identifies Android malware effectively.
Safayat Bin Hakim, Muhammad Adil, Kamal Acharya
― 7 min read
Cutting edge science explained simply
A framework using MLP and SVM identifies Android malware effectively.
Safayat Bin Hakim, Muhammad Adil, Kamal Acharya
― 7 min read
A new method to improve Federated Learning's resilience against data attacks.
Momin Ahmad Khan, Yasra Chandio, Fatima Muhammad Anwar
― 8 min read
Understanding the complexities of proving data usage in AI training.
Jie Zhang, Debeshee Das, Gautam Kamath
― 7 min read
A new approach enhances malware detection while resisting adversarial attacks.
Jingnan Zheng, Jiaohao Liu, An Zhang
― 8 min read
A look at federated learning's challenges and solutions in maintaining data privacy and model accuracy.
Youssef Allouah, Abdellah El Mrini, Rachid Guerraoui
― 6 min read
New method raises security concerns in EEG systems while highlighting potential protective uses.
Xuan-Hao Liu, Xinhao Song, Dexuan He
― 6 min read
Introducing a tailored storage solution for consortium blockchains like Hyperledger Fabric.
Narges Dadkhah, Xuyang Ma, Katinka Wolter
― 8 min read
New training method improves LLM safety and performance.
Lei Yu, Virginie Do, Karen Hambardzumyan
― 7 min read
A new system to verify the security of IoT devices effortlessly.
Steve Kerrison
― 5 min read
Examining privacy vulnerabilities in federated learning and their implications for data security.
Thomas Schneider, Ajith Suresh, Hossein Yalame
― 5 min read
Learn about DeFi and the challenges of Maximal Extractable Value.
Huned Materwala, Shraddha M. Naik, Aya Taha
― 6 min read
Explore how new encryption standards protect our data from quantum threats.
Ananya Tadepalli
― 8 min read
Client-Customized Adaptation improves federated learning efficiency and privacy.
Yeachan Kim, Junho Kim, Wing-Lam Mok
― 5 min read
Automated testing enhances security in healthcare systems, addressing evolving cyber threats.
Haozhe Lei, Yunfei Ge, Quanyan Zhu
― 7 min read
Learn about storage proofs and their role in Ethereum's ecosystem.
Marek Kirejczyk, Maciej Kalka, Leonid Logvinov
― 7 min read
A new method protects sensitive data in QUBO optimization.
Moyang Xie, Yuan Zhang, Sheng Zhong
― 5 min read
New methods for digital signatures aim to stay safe from quantum computing risks.
Quinten Norga, Suparna Kundu, Uttam Kumar Ojha
― 6 min read
A look at how federated learning enhances patient care while maintaining privacy.
Sushilkumar Yadav, Irem Bor-Yaliniz
― 5 min read
MASA offers a solution to enhance security in Federated Learning systems.
Jiahao Xu, Zikai Zhang, Rui Hu
― 4 min read
Not all NVMe SSDs are safe; some might threaten your data.
Rick Wertenbroek, Alberto Dassatti
― 4 min read
Discover how MAP Protocol is bridging blockchain gaps for seamless transactions.
Yinfeng Cao, Jiannong Cao, Dongbin Bai
― 5 min read
Explore how Bitcoin operates and the threats it faces.
Dinitha Wijewardhana, Sugandima Vidanagamachchi, Nalin Arachchilage
― 5 min read
Examining risks and solutions for memory safety in IoT devices.
Vadim Safronov, Ionut Bostan, Nicholas Allott
― 6 min read
WaKA reveals how data points impact models while assessing privacy risks.
Patrick Mesana, Clément Bénesse, Hadrien Lautraite
― 6 min read
Discover how RA-WEBs enhances web service security using Trusted Execution Environments.
Kosei Akama, Yoshimichi Nakatsuka, Korry Luke
― 6 min read
A new method to protect smart meters from FDI attacks while preserving privacy.
Md Raihan Uddin, Ratun Rahman, Dinh C. Nguyen
― 4 min read
SAGIN and new learning methods promise a connected future.
Vu Khanh Quy, Nguyen Minh Quy, Tran Thi Hoai
― 6 min read
Researchers present a cost-effective approach to privacy risks in large language models.
Rongting Zhang, Martin Bertran, Aaron Roth
― 6 min read
A look into DeFi risks and the need for better security tools.
Ka Wai Wu
― 5 min read
Examining how adversarial attacks impact text and image classification models.
Langalibalele Lunga, Suhas Sreehari
― 6 min read
AI is transforming how we address software vulnerabilities effectively.
Yuntong Zhang, Jiawei Wang, Dominic Berzin
― 6 min read
A fresh framework combines IDS and UEBA for better threat detection.
Zilin Huang, Xiangyan Tang, Hongyu Li
― 6 min read
Exploring quantum methods for secure and efficient data retrieval.
Guangsheng Ma, Hongbo Li
― 5 min read
New method enhances power management in multicore systems by refining energy use estimation.
Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy
― 5 min read
Federated Learning offers a new way to protect data while collaborating across devices.
Chunlu Chen, Ji Liu, Haowen Tan
― 7 min read
A new method identifies problematic devices in federated learning to improve speed and security.
Dipanwita Thakur, Antonella Guzzo, Giancarlo Fortino
― 9 min read
New methods protect brain data in BCI technology.
Xiaoqing Chen, Siyang Li, Yunlu Tu
― 7 min read
Discover how a new system improves data privacy and processing speed for LLMs.
Yifan Tan, Cheng Tan, Zeyu Mi
― 6 min read
Learn how businesses can use ML to detect and prevent DoS attacks.
Paul Badu Yakubu, Evans Owusu, Lesther Santana
― 7 min read
NinjaDoH secures your DNS queries for safe internet use.
Scott Seidenberger, Marc Beret, Raveen Wijewickrama
― 6 min read