ScalOTA improves OTA updates for vehicles using update stations for faster and secure downloads.
― 5 min read
Cutting edge science explained simply
ScalOTA improves OTA updates for vehicles using update stations for faster and secure downloads.
― 5 min read
Data poisoning in AI can lead to vulnerable code generation, posing security threats.
― 5 min read
New method reveals vulnerabilities in Vertical Federated Learning systems using Graph Neural Networks.
― 5 min read
Introducing a new system for safe and efficient cross-chain trading.
― 5 min read
A method for better image generation that safeguards privacy using public datasets.
― 6 min read
SoftFlow helps identify security issues in electronic device design, protecting sensitive data.
― 5 min read
PPIMCE enhances performance in secure data processing without compromising privacy.
― 7 min read
An overview of Android malware types and analysis methods to enhance security.
― 5 min read
Explore the risks and prevention methods for IoT device security.
― 6 min read
An overview of privacy concerns in information sharing through gossip protocols.
― 5 min read
MASC provides a new approach to test crypto-API misuse detectors effectively.
― 5 min read
A new method for secure data aggregation aims to boost efficiency and privacy.
― 5 min read
AutoML4ETC automates the creation of neural networks for classifying encrypted network traffic.
― 7 min read
A new tool improves cybersecurity for robots using AI and game theory.
― 6 min read
A new chiplet design boosts the efficiency of Fully Homomorphic Encryption.
― 5 min read
A novel approach to accurately assess binary code similarities.
― 5 min read
This article examines local attack risks against the FIDO2 authentication protocol.
― 5 min read
This article discusses memory safety challenges and a new solution: Data-Pointer Tagging.
― 6 min read
Examining how incentive structures affect validator behavior in decentralized networks.
― 5 min read
A new framework for safeguarding prompt creators' rights in AI tools.
― 5 min read
A new framework improves WebAssembly binary protection against reverse engineering.
― 6 min read
Examining the rise and risks of jailbreak prompts in language models.
― 6 min read
Examining the use of link decorations in online tracking.
― 6 min read
This work presents a method to improve code understanding in LLMs using symmetry.
― 7 min read
Learn how blockchain can verify product authenticity and combat counterfeits.
― 5 min read
ForensiBlock enhances digital evidence management and tracking with blockchain technology.
― 8 min read
A new approach to vehicle security addressing rising cyber threats.
― 6 min read
Learn how blind annotation enhances data privacy during entity matching.
― 6 min read
A new method for lowering expenses in machine learning language services.
― 5 min read
Ensuring safety in interconnected industrial control systems is crucial amidst rising cyber threats.
― 5 min read
A new approach to enhance data privacy while minimizing communication costs.
― 6 min read
Examining the threats posed by adversarial attacks on AI systems.
― 5 min read
Explore an innovative defense method to enhance federated learning security.
― 5 min read
Chrisimos changes mining by solving real-world problems instead of wasting energy.
― 5 min read
A new method improves backdoor detection in graph data using explanation techniques.
― 8 min read
New methods to secure federated learning against attacks while preserving user privacy.
― 6 min read
New methods to protect machine learning from backdoor attacks using feature strength.
― 5 min read
Addressing privacy risks while providing valuable insights from machine learning models.
― 5 min read
An overview of governance issues in DeFi and their implications.
― 6 min read
Efficient methods for Optimal Ate pairing improve cryptographic security on FPGA devices.
― 7 min read