Examining the relationship between data protection laws and machine learning practices.
― 6 min read
Cutting edge science explained simply
Examining the relationship between data protection laws and machine learning practices.
― 6 min read
A new audio-based method estimates crowd sizes without invading personal privacy.
― 5 min read
This article discusses the SpongeNet Attack and its impact on energy consumption in deep learning models.
― 7 min read
Learn how P3LS enables safe data sharing in manufacturing.
― 6 min read
An in-depth look at bribing attacks threatening blockchain systems.
― 5 min read
Architectural backdoors pose serious security risks in neural networks, often remaining undetected.
― 3 min read
A method for conducting Bayesian tests while safeguarding individual privacy.
― 6 min read
A new method for managing database access with clarity and efficiency.
― 6 min read
New strategies allow Trojan attacks to bypass detection methods effectively.
― 6 min read
A new solution detects online trackers while keeping websites functional.
― 6 min read
Learn how to protect user data in Android apps effectively.
― 9 min read
Examining privacy risks and solutions for eye tracking in virtual reality.
― 5 min read
A new approach improves privacy for sharing multi-attribute data efficiently.
― 5 min read
A detailed look at CyberMetric's evaluation of AI and human experts in cybersecurity.
― 8 min read
A look at how random walk algorithms improve privacy in decentralized learning.
― 6 min read
Discover the role of lattices in securing information against quantum threats.
― 5 min read
This article reviews a decentralized model for remote attestation that enhances security.
― 6 min read
Quantum computing enhances secure multiparty computation by improving privacy and efficiency.
― 5 min read
NeuroBench standardizes brainwave authentication studies for improved security techniques.
― 4 min read
This article covers methods to estimate bus speeds while protecting privacy.
― 5 min read
Exploring how companies approach secure software development in an evolving digital landscape.
― 7 min read
NU-HUNCC combines innovative techniques for secure messaging against evolving threats.
― 4 min read
A fresh approach to identify spear-phishing attacks using advanced language models.
― 7 min read
A community-led initiative to identify harmful prompts in T2I models.
― 6 min read
Understanding unlearnable example attacks through game theory for better data protection.
― 6 min read
This study highlights the significance of high nonlinearity in Boolean functions for cryptography.
― 5 min read
This study reviews vulnerabilities in AI models used for genomic applications.
― 7 min read
Deepfakes pose risks to personal freedoms and national security.
― 6 min read
SafeCoder improves the safety of code generated by language models.
― 6 min read
Custom LLMs raise safety concerns, particularly with instruction backdoor attacks.
― 5 min read
A new tool helps detect Reentrancy vulnerabilities in smart contracts more effectively.
― 5 min read
Seagull improves routing verification while ensuring privacy for network configurations.
― 8 min read
Researchers test copyright traps to detect AI training on copyrighted content.
― 6 min read
Examining risks and impacts of modded apps on users and developers.
― 6 min read
A new framework targets cloud security risks with improved access control management.
― 6 min read
Examining the adaptability of machine learning models in intrusion detection systems.
― 7 min read
Combining Federated Learning with privacy techniques protects sensitive data while training models.
― 5 min read
New methods in federated learning protect against attacks while maintaining data privacy.
― 7 min read
Learn about the risks of EM-SCA and its impact on digital security.
― 6 min read
TSTEM enhances cyber threat intelligence through automated data collection and analysis.
― 5 min read