New method creates virtual faces for online interactions while ensuring user privacy.
Miaomiao Wang, Guang Hua, Sheng Li
― 7 min read
Cutting edge science explained simply
New method creates virtual faces for online interactions while ensuring user privacy.
Miaomiao Wang, Guang Hua, Sheng Li
― 7 min read
Learn how security practices can improve software development and reduce risks.
Ricardo M. Czekster
― 6 min read
A look at differential privacy and its role in protecting individual data while ensuring utility.
Yu Zheng, Wenchao Zhang, Yonggang Zhang
― 6 min read
Exploring the significance of lightweight cryptography and MDS matrices for secure communication.
Yu Tian, Xiutao Feng, Guangrong Li
― 4 min read
A practical approach to enhance ML models against adversarial inputs in network management.
Minhao Jin, Maria Apostolaki
― 5 min read
A study on security issues faced by Kubernetes users over four years.
J. Alexander Curtis, Nasir U. Eisty
― 5 min read
New methods help detect cyberattacks in complex power systems.
Abhijeet Sahu, Truc Nguyen, Kejun Chen
― 7 min read
A new approach to safeguarding system logs from unauthorized access and tampering.
Chuqi Zhang, Jun Zeng, Yiming Zhang
― 5 min read
A study reveals inconsistencies in how Android apps report data collection.
Mugdha Khedkar, Ambuj Kumar Mondal, Eric Bodden
― 5 min read
Study reveals vulnerabilities in AI models due to backdoor attacks.
Gorka Abad, Stjepan Picek, Lorenzo Cavallaro
― 5 min read
A new system improves how organizations create access control policies.
Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello
― 5 min read
Exploring innovative identity verification through unique noise produced by our bodies.
Sarah A. Flanery, Christiana Chamon
― 6 min read
Examining the effects of leaks on smartphone companies and trustworthiness of sources.
Neha Kumaru, Garvit Gupta, Shreyas Mongia
― 7 min read
LiTelFuzz improves testing for multi-robot swarms, identifying flaws effectively.
Zhiwei Zhang, Ruoyu Zhou, Haocheng Han
― 4 min read
New methods improve secure computations in neural networks while preserving privacy.
Sajjad Akherati, Xinmiao Zhang
― 5 min read
This article introduces an innovative approach for detecting templates in security event logs.
Risto Vaarandi, Hayretdin Bahsi
― 7 min read
Methods to improve blockchain security using noise addition techniques.
Tran Viet Khoa, Mohammad Abu Alsheikh, Yibeltal Alem
― 5 min read
Examining the impact of neural compression on image integrity and accuracy.
Nora Hofer, Rainer Böhme
― 6 min read
A new method enhances model performance while ensuring privacy in deep learning.
Xinwei Zhang, Zhiqi Bu, Mingyi Hong
― 7 min read
Ensuring quality random numbers is vital for security in digital communications.
Cesare Caratozzolo, Valeria Rossi, Kamil Witek
― 5 min read
AdaPPA enhances jailbreak attacks on language models by combining safe and harmful responses.
Lijia Lv, Weigang Zhang, Xuehai Tang
― 5 min read
Advancements in AI make fake audio common, prompting the need for detection.
Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen
― 6 min read
A look into secure communication systems combining sensing technologies.
Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch
― 5 min read
Hope inspires us to overcome challenges and pursue our dreams.
Mugdha Khedkar, Michael Schlichtig, Eric Bodden
― 5 min read
Investigating ChatGPT's effectiveness in identifying cryptography misuses in Java applications.
Ehsan Firouzi, Mohammad Ghafari, Mike Ebrahimi
― 6 min read
Learned Bloom Filters enhance data security while minimizing false positives.
Allison Bishop, Hayder Tirmazi
― 6 min read
A reliable method for identity verification using unique vein patterns.
Mustapha Hemis, Hamza Kheddar, Sami Bourouis
― 5 min read
Explore how NFTs and blockchain enhance drone data management.
Khaoula Hidawi
― 5 min read
Exploring Hybrid Homomorphic Encryption for secure data processing in ML.
Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong
― 7 min read
Examining how SBOM accuracy impacts software vulnerability detection.
Giacomo Benedetti, Serena Cofano, Alessandro Brighente
― 6 min read
A tool helps users confirm if their data was used in deep learning models.
Zitao Chen, Karthik Pattabiraman
― 5 min read
A system that helps users control data from IoT devices.
Jad Al Aaraj, Olivia Figueira, Tu Le
― 6 min read
This article discusses advancements in protecting smart contracts against vulnerabilities and financial loss.
Chaofan Shou, Yuanyu Ke, Yupeng Yang
― 6 min read
Exploring how Automatic Content Recognition affects user privacy in smart TVs.
Gianluca Anselmi, Yash Vekaria, Alexander D'Souza
― 7 min read
A new method for detecting DDoS attacks using large language models.
Zhenyu Yin, Shang Liu, Guangyuan Xu
― 5 min read
This study highlights the role of workload in recognizing phishing emails.
Sijie Zhuo, Robert Biddle, Jared Daniel Recomendable
― 8 min read
Examining how bug bounty programs enhance security in open-source projects.
Jessy Ayala, Steven Ngo, Joshua Garcia
― 5 min read
Examining how OSS maintainers tackle security challenges effectively.
Jessy Ayala, Yu-Jye Tung, Joshua Garcia
― 5 min read
A study on using machine learning to identify harmful websites effectively.
Kinh Tran, Dusan Sovilj
― 8 min read
LLMs offer both solutions and risks in combating malware threats.
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Marwan Omar
― 5 min read