Examining how bug bounty programs enhance security in open-source projects.
Jessy Ayala, Steven Ngo, Joshua Garcia
― 5 min read
Cutting edge science explained simply
Examining how bug bounty programs enhance security in open-source projects.
Jessy Ayala, Steven Ngo, Joshua Garcia
― 5 min read
Examining how OSS maintainers tackle security challenges effectively.
Jessy Ayala, Yu-Jye Tung, Joshua Garcia
― 5 min read
A study on using machine learning to identify harmful websites effectively.
Kinh Tran, Dusan Sovilj
― 8 min read
LLMs offer both solutions and risks in combating malware threats.
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Marwan Omar
― 5 min read
Pseudorandom codes ensure secure data transmission and protect against errors.
Surendra Ghentiyala, Venkatesan Guruswami
― 4 min read
A new measure to strengthen Network Intrusion Detection Systems against adversarial attacks.
Mohamed elShehaby, Ashraf Matrawy
― 6 min read
Examining the privacy risks of AI and ML in medical settings.
Yuanhaur Chang, Han Liu, Evin Jaff
― 6 min read
This article discusses the challenges and improvements in Android malware detection using machine learning.
Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi
― 6 min read
This article highlights Cyber Deception strategies for enhancing cybersecurity.
Pedro Beltrán López, Manuel Gil Pérez, Pantaleone Nespoli
― 6 min read
A new method enhances data privacy while maintaining performance in cloud computing.
Leqian Zheng, Zheng Zhang, Wentao Dong
― 6 min read
Examining the risks and defenses against fault attacks in LESS digital signatures.
Puja Mondal, Supriya Adhikary, Suparna Kundu
― 7 min read
This article outlines Reverso, a method to enhance QUIC protocol efficiency.
Florentin Rochet
― 7 min read
This research focuses on training ControlNet while safeguarding user data across devices.
Dixi Yao
― 9 min read
Exploring privacy concerns in fine-tuning diffusion models with personal data.
Dixi Yao
― 6 min read
New strategies for agent collaboration enhance trust and efficiency in AI responses.
Vladyslav Larin, Ivan Nikitin, Alexander Firsov
― 7 min read
Harnessing AI to improve honeypot effectiveness against cyber threats.
Hakan T. Otal, M. Abdullah Canbaz
― 6 min read
A new method enhances the identification of security events amidst Twitter noise.
Jian Cui, Hanna Kim, Eugene Jang
― 5 min read
This paper proposes a framework to enhance NFT fractionalization's security and accessibility.
Wejdene Haouari, Marios Fokaefs
― 9 min read
A new method enhances blockchain's reliability and efficiency in decentralized networks.
Yibin Xu, Jianhua Shao, Tijs Slaats
― 5 min read
A new approach to enhance network traffic analysis through graph-based models.
Louis Van Langendonck, Ismael Castell-Uroz, Pere Barlet-Ros
― 6 min read
Examining key security issues related to large language models in AI.
Benji Peng, Keyu Chen, Ming Li
― 5 min read
Examining security issues faced by mobile app developers on Stack Overflow.
Timothy Huo, Ana Catarina Araújo, Jake Imanaka
― 6 min read
Exploring the benefits of a model-driven approach for cybersecurity risk management.
Christophe Ponsard
― 6 min read
A new model improves function name recovery in binary code analysis.
Tristan Benoit, Yunru Wang, Moritz Dannehl
― 7 min read
A new tool aids organizations in addressing quantum computing security risks.
Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun
― 5 min read
Exploring vulnerabilities of cooperative multi-agent systems to backdoor attacks.
Yinbo Yu, Saihao Yan, Jiajia Liu
― 5 min read
A look at using RL to train agents for maritime cyber security.
Alec Wilson, William Holmes, Ryan Menzies
― 5 min read
Learn how PQC strengthens federated learning against quantum threats.
Pingzhi Li, Tianlong Chen, Junyu Liu
― 6 min read
A new quantum protocol improves privacy in data sharing using the shuffle model.
Hassan Jameel Asghar, Arghya Mukherjee, Gavin K. Brennen
― 7 min read
A new method to solve the discrete logarithm problem faster and more efficiently.
Wen Huang, Zhishuo Zhang, Weixin Zhao
― 5 min read
Exploring quantum computing's role in enhancing anomaly detection for cyber-physical systems.
Tyler Cultice, Md. Saif Hassan Onim, Annarita Giani
― 5 min read
Deep learning models face significant security challenges that need addressing for safe use.
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Mostafa Mohamad
― 5 min read
New mechanisms enhance security and efficiency in digital communications.
Suparna Kundu, Quinten Norga, Angshuman Karmakar
― 5 min read
Examining smart contract vulnerabilities and the role of language models in detection.
Md Tauseef Alam, Raju Halder, Abyayananda Maiti
― 5 min read
SoftHSM offers affordable protection against cyber threats for modern industries.
Joshua Tito Amael, Jazi Eko Istiyanto, Oskar Natan
― 7 min read
A study on using HSMs to protect data in industrial settings.
Joshua Tito Amael, Oskar Natan, Jazi Eko Istiyanto
― 5 min read
Federated Learning tackles data privacy challenges in sensitive fields.
Hao Jian Huang, Bekzod Iskandarov, Mizanur Rahman
― 8 min read
Organizations face tough choices during ransomware attacks. Learn how to navigate decisions effectively.
Pranjal Sharma
― 5 min read
A system for private histogram estimation that safeguards user privacy while providing accurate data insights.
Ali Shahin Shamsabadi, Peter Snyder, Ralph Giles
― 6 min read
A new technique reveals weaknesses in AI safety measures for language models.
Emet Bethany, Mazal Bethany, Juan Arturo Nolazco Flores
― 6 min read