A new method improves defenses against audio adversarial attacks in speech recognition systems.
― 6 min read
Cutting edge science explained simply
A new method improves defenses against audio adversarial attacks in speech recognition systems.
― 6 min read
A new tool addresses security challenges in cyber-physical energy systems.
― 5 min read
A look into federated learning's potential and risks for user privacy.
― 7 min read
Synthetic data helps protect patient privacy while enabling research.
― 5 min read
New methods improve analysis of attack trees for security enhancements.
― 5 min read
A new method ensures user privacy in retrieval systems through synthetic query generation.
― 6 min read
Examining the role of quantum cryptography in secure data deletion.
― 5 min read
A method for estimating averages while respecting individual privacy needs.
― 6 min read
Learn how zero-knowledge protocols enhance privacy and security in digital interactions.
― 7 min read
Research reveals new methods for hiding triggers in deep learning systems.
― 5 min read
Introducing low-pass attack techniques to bypass neural network defenses.
― 6 min read
A look at methods improving privacy in federated learning while ensuring model accuracy.
― 4 min read
A method that customizes LLMs while protecting users' sensitive data.
― 5 min read
A method to align safety and security in industrial control systems.
― 6 min read
Learn about the dangers in the NFT market, especially rug pulls.
― 5 min read
REMaQE helps analyze mathematical equations in binary code for better security.
― 7 min read
A new method for stealthy backdoor attacks on deep neural networks.
― 5 min read
Exploring new solutions for secure and efficient 6G communication technologies.
― 4 min read
A method to enhance blockchain safety by borrowing security from other chains.
― 6 min read
Examining the risks and effects of model hijacking in natural language processing.
― 8 min read
Addressing vulnerabilities in 5G systems with new testing methods.
― 6 min read
DNN-Defender offers real-time protection for deep learning models against RowHammer attacks.
― 6 min read
This article explores the risks and ethical concerns surrounding ChatGPT.
― 5 min read
Explore how traceable mixnets enhance privacy in data management while allowing specific queries.
― 5 min read
A new approach combines fuzz testing and NLP for better 5G vulnerability detection.
― 5 min read
A look into how DNS manipulation affects internet access and user awareness.
― 5 min read
ResidualPlanner provides fast, private insights from data using noisy marginals.
― 6 min read
A new method predicts taxi demand while ensuring data privacy.
― 7 min read
This study explores methods to improve deep learning model resilience against attacks.
― 5 min read
SplitAMC enhances data privacy and reduces latency in modulation classification.
― 5 min read
Trustchain offers a safer way to manage digital identities and credentials.
― 8 min read
Learn how CFGs and machine learning enhance malware detection methods.
― 4 min read
New method audits privacy in machine learning with a single algorithm run.
― 7 min read
A new tool improves eBPF program testing and identifies vulnerabilities.
― 6 min read
FLARE helps IoT devices manage concept drift while ensuring privacy and efficiency.
― 6 min read
Parametric insurance offers faster claims and increased transparency through technology.
― 6 min read
Explore how vertical federated learning boosts privacy in machine learning.
― 6 min read
A new framework improves insertion and detection of hardware Trojans using reinforcement learning.
― 7 min read
Research introduces advanced protocols using entangled qubits for secure distance verification.
― 6 min read
A new protocol merges SGX and SEV to improve security in computing environments.
― 5 min read