Learn about cryptography's role in securing information and protecting privacy.
― 5 min read
Cutting edge science explained simply
Learn about cryptography's role in securing information and protecting privacy.
― 5 min read
This article discusses improving satellite communication through blockchain technology.
― 5 min read
Techniques to enhance performance in training models with differential privacy.
― 6 min read
QFHE allows computations on encrypted data for enhanced privacy and security.
― 5 min read
This article presents a method to protect personal data in machine learning systems.
― 8 min read
New methods reveal serious privacy threats from location data sharing.
― 6 min read
New systems improve insulin delivery and safety for type 1 diabetes management.
― 6 min read
Addressing the challenges of E2EE and account recovery methods.
― 6 min read
Introducing FC-EM to protect 3D point cloud data from unauthorized access.
― 6 min read
Examining the challenges and implications of unlearning in AI models.
― 5 min read
ASCENT improves hardware security against power side-channel attacks during design.
― 6 min read
New framework effectively identifies power overloading attacks in smart grid systems.
― 6 min read
Examining how routing techniques influence censorship experiences worldwide.
― 5 min read
This article discusses DRAM read disturbance and innovative management techniques.
― 7 min read
SubLock improves IC security against attacks while keeping costs low.
― 7 min read
Local Differential Privacy enables secure data sharing while protecting individual user information.
― 6 min read
A study evaluating the effectiveness of LLMs in spotting Android app vulnerabilities.
― 7 min read
A system to prevent attacks on Java applications by using a class allowlist.
― 5 min read
Examining the security of SHA-256 and recent collision finding techniques.
― 6 min read
New hybrid methods improve efficiency in integer factorization for cryptography.
― 6 min read
This paper presents a new DNN-based IDS in programmable networks.
― 8 min read
PUFs provide unique identities for secure communication in connected devices.
― 6 min read
A look at the role of pseudo-entanglement in advancing quantum cryptography.
― 4 min read
A novel approach combines voice analysis with privacy protection for dementia detection.
― 6 min read
A novel approach to ensure privacy while maintaining text utility in NLP models.
― 7 min read
As vehicles become smarter, protecting them from cyber threats is essential.
― 4 min read
A new system enhances data processing while ensuring user privacy and efficient resource use.
― 6 min read
A new method enhances efficiency in low-entropy couplings for large distributions.
― 5 min read
This article discusses the importance of secure software updates for CubeSats.
― 8 min read
Code poisoning enhances risks of membership inference attacks on sensitive data.
― 6 min read
Examining vulnerabilities from clean-label backdoor attacks and how generalization bounds can help.
― 6 min read
Research shows how easily safety features can be removed from Llama 3 models.
― 5 min read
Researchers examine methods to secure sensitive information in text classification models.
― 6 min read
QUEEN offers real-time protection against model extraction attacks in deep learning.
― 5 min read
Exploring the benefits of an offline digital euro for secure transactions.
― 7 min read
A framework for secure sharing of health information while protecting patient privacy.
― 12 min read
STRIDE predicts lost variable names and types in decompiled software efficiently.
― 6 min read
A look into how language models can leak sensitive data.
― 3 min read
This article examines risks linked to LLMs and proposes ways to enhance safety.
― 4 min read
Exploring backdoor attacks and graph reduction methods in GNNs.
― 5 min read