SaTor aims to reduce latency in the Tor network using satellite technology.
― 4 min read
Cutting edge science explained simply
SaTor aims to reduce latency in the Tor network using satellite technology.
― 4 min read
SecureSpectra offers a new way to safeguard audio identity against deepfake threats.
― 5 min read
This work enhances privacy in graph diffusion while maintaining data utility.
― 7 min read
INDICT enhances code safety and helpfulness using dual critique analysis.
― 6 min read
Learn how differential privacy protects individual data while allowing useful analysis.
― 5 min read
Identifying flaws in smart contracts to enhance security and reduce risk.
― 6 min read
This article examines improvements in blockchain Layer 2 solutions for scalability and security.
― 7 min read
A new approach using sidechains to enhance AMM performance and reduce costs.
― 6 min read
A new method tackles hidden threats in large language models.
― 6 min read
Lomas enables secure access to public data for research without compromising privacy.
― 9 min read
Introducing watermarking to protect counterfactual explanations in machine learning.
― 6 min read
AUTOPRIV simplifies data privacy for users without technical skills.
― 5 min read
Learn about cryptography's role in securing information and protecting privacy.
― 5 min read
This article discusses improving satellite communication through blockchain technology.
― 5 min read
Techniques to enhance performance in training models with differential privacy.
― 6 min read
QFHE allows computations on encrypted data for enhanced privacy and security.
― 5 min read
This article presents a method to protect personal data in machine learning systems.
― 8 min read
New methods reveal serious privacy threats from location data sharing.
― 6 min read
New systems improve insulin delivery and safety for type 1 diabetes management.
― 6 min read
Addressing the challenges of E2EE and account recovery methods.
― 6 min read
Introducing FC-EM to protect 3D point cloud data from unauthorized access.
― 6 min read
Examining the challenges and implications of unlearning in AI models.
― 5 min read
ASCENT improves hardware security against power side-channel attacks during design.
― 6 min read
New framework effectively identifies power overloading attacks in smart grid systems.
― 6 min read
Examining how routing techniques influence censorship experiences worldwide.
― 5 min read
This article discusses DRAM read disturbance and innovative management techniques.
― 7 min read
SubLock improves IC security against attacks while keeping costs low.
― 7 min read
Local Differential Privacy enables secure data sharing while protecting individual user information.
― 6 min read
A study evaluating the effectiveness of LLMs in spotting Android app vulnerabilities.
― 7 min read
A system to prevent attacks on Java applications by using a class allowlist.
― 5 min read
Examining the security of SHA-256 and recent collision finding techniques.
― 6 min read
New hybrid methods improve efficiency in integer factorization for cryptography.
― 6 min read
This paper presents a new DNN-based IDS in programmable networks.
― 8 min read
PUFs provide unique identities for secure communication in connected devices.
― 6 min read
A look at the role of pseudo-entanglement in advancing quantum cryptography.
― 4 min read
A novel approach combines voice analysis with privacy protection for dementia detection.
― 6 min read
A novel approach to ensure privacy while maintaining text utility in NLP models.
― 7 min read
As vehicles become smarter, protecting them from cyber threats is essential.
― 4 min read
A new system enhances data processing while ensuring user privacy and efficient resource use.
― 6 min read
A new method enhances efficiency in low-entropy couplings for large distributions.
― 5 min read