A look at how differential privacy safeguards individual data in a data-driven world.
Weijie J. Su
― 6 min read
Cutting edge science explained simply
A look at how differential privacy safeguards individual data in a data-driven world.
Weijie J. Su
― 6 min read
Exploring the need for effective enforcement of data usage policies.
Andrea Cimmino, Juan Cano-Benito, Raúl García-Castro
― 7 min read
New methods enhance security practices in interconnected industrial systems.
Thomas Rosenstatter, Christian Schäfer, Olaf Saßnick
― 6 min read
A new method improves detection of texts generated by language models.
Zhengan Huang, Gongxian Zeng, Xin Mu
― 6 min read
Examining the impact and lessons of the DarkSeoul cyberattack on South Korea.
Puya Pakshad, Abiha Hussain, Maks Dudek
― 7 min read
Investigating the quality and security concerns of AI-generated code.
Chun Jie Chong, Zhihao Yao, Iulian Neamtiu
― 7 min read
Discover how tensor networks enhance anomaly detection across various fields.
Alejandro Mata Ali, Aitor Moreno Fdez. de Leceta, Jorge López Rubio
― 4 min read
This article discusses safety issues in text-to-image models and proposes solutions.
Tong Liu, Zhixin Lai, Gengyuan Zhang
― 6 min read
This article presents solutions to protect user inputs in cloud-based language services.
In Gim, Caihua Li, Lin Zhong
― 6 min read
A look at privacy risks and secure methods for generative AI.
Manil Shrestha, Yashodha Ravichandran, Edward Kim
― 6 min read
Learn how to protect language models from manipulation and ensure secure responses.
Fangzhou Wu, Ethan Cecchetti, Chaowei Xiao
― 6 min read
A new method predicts memorization risks in Large Language Models to enhance privacy.
Jérémie Dentan, Davide Buscaldi, Aymen Shabou
― 4 min read
An overview of traditional and deep learning methods in network security.
Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj
― 5 min read
Research reveals weaknesses in online toxicity detection using ASCII art techniques.
Sergey Berezin, Reza Farahbakhsh, Noel Crespi
― 6 min read
New algorithms improve solving integer equations critical for cryptography.
Mayank Deora, Pinakpani Pal
― 5 min read
Automated tools are crucial for verifying hardware security in modern devices.
Yao Hsiao, Nikos Nikoleris, Artem Khyzha
― 4 min read
Examining how training data impacts language model outputs and safety measures.
Sachin Kumar
― 6 min read
New methods improve data usage auditing in Federated Learning systems.
Jiaxin Li, Marco Arazzi, Antonino Nocera
― 6 min read
A study comparing privacy threats in spiking and artificial neural networks.
Jiaxin Li, Gorka Abad, Stjepan Picek
― 5 min read
A new method safeguards decentralized learning from data poisoning attacks.
Chao Feng, Alberto Huertas Celdrán, Zien Zeng
― 6 min read
A framework using MLP and SVM identifies Android malware effectively.
Safayat Bin Hakim, Muhammad Adil, Kamal Acharya
― 7 min read
A new method to improve Federated Learning's resilience against data attacks.
Momin Ahmad Khan, Yasra Chandio, Fatima Muhammad Anwar
― 8 min read
Understanding the complexities of proving data usage in AI training.
Jie Zhang, Debeshee Das, Gautam Kamath
― 7 min read
A new approach enhances malware detection while resisting adversarial attacks.
Jingnan Zheng, Jiaohao Liu, An Zhang
― 8 min read
A look at federated learning's challenges and solutions in maintaining data privacy and model accuracy.
Youssef Allouah, Abdellah El Mrini, Rachid Guerraoui
― 6 min read
New method raises security concerns in EEG systems while highlighting potential protective uses.
Xuan-Hao Liu, Xinhao Song, Dexuan He
― 6 min read
Introducing a tailored storage solution for consortium blockchains like Hyperledger Fabric.
Narges Dadkhah, Xuyang Ma, Katinka Wolter
― 8 min read
New training method improves LLM safety and performance.
Lei Yu, Virginie Do, Karen Hambardzumyan
― 7 min read
A new system to verify the security of IoT devices effortlessly.
Steve Kerrison
― 5 min read
Examining privacy vulnerabilities in federated learning and their implications for data security.
Thomas Schneider, Ajith Suresh, Hossein Yalame
― 5 min read
Learn about DeFi and the challenges of Maximal Extractable Value.
Huned Materwala, Shraddha M. Naik, Aya Taha
― 6 min read
Explore how new encryption standards protect our data from quantum threats.
Ananya Tadepalli
― 8 min read
Client-Customized Adaptation improves federated learning efficiency and privacy.
Yeachan Kim, Junho Kim, Wing-Lam Mok
― 5 min read
Automated testing enhances security in healthcare systems, addressing evolving cyber threats.
Haozhe Lei, Yunfei Ge, Quanyan Zhu
― 7 min read
Learn about storage proofs and their role in Ethereum's ecosystem.
Marek Kirejczyk, Maciej Kalka, Leonid Logvinov
― 7 min read
A new method protects sensitive data in QUBO optimization.
Moyang Xie, Yuan Zhang, Sheng Zhong
― 5 min read
New methods for digital signatures aim to stay safe from quantum computing risks.
Quinten Norga, Suparna Kundu, Uttam Kumar Ojha
― 6 min read
A look at how federated learning enhances patient care while maintaining privacy.
Sushilkumar Yadav, Irem Bor-Yaliniz
― 5 min read
MASA offers a solution to enhance security in Federated Learning systems.
Jiahao Xu, Zikai Zhang, Rui Hu
― 4 min read
Not all NVMe SSDs are safe; some might threaten your data.
Rick Wertenbroek, Alberto Dassatti
― 4 min read