Exploring differential privacy methods in reinforcement learning to protect sensitive data.
― 7 min read
Cutting edge science explained simply
Exploring differential privacy methods in reinforcement learning to protect sensitive data.
― 7 min read
A new system to identify phishing emails with high accuracy and clear reasoning.
― 5 min read
New methods secure data in AI while ensuring effective computations.
― 5 min read
Discussing privacy and fairness in machine learning through differential privacy and worst-group risk.
― 6 min read
An overview of dApps, their structure, vulnerabilities, and future prospects.
― 5 min read
New algorithms enhance privacy and accuracy in sparse data scenarios.
― 6 min read
Ruledger provides a secure solution for smart home system vulnerabilities.
― 5 min read
Examining how large language models can improve digital forensic investigations.
― 5 min read
Examining the effectiveness and vulnerabilities of watermarking in AI-generated content.
― 5 min read
AutoRobust uses reinforcement learning to strengthen malware detection systems against adversarial tactics.
― 6 min read
New methods ensure safety for buyers and sellers in online markets.
― 5 min read
Enhancing biotechnology safety through machine learning security operations.
― 7 min read
BasedAI uses encryption to ensure privacy while enhancing language model performance.
― 6 min read
Exploring transfer learning applications to improve cybersecurity functions and address data challenges.
― 12 min read
A look into PUFs and their role in IoT security.
― 6 min read
This article examines cross-chain bridges' vulnerabilities and suggests security improvements.
― 6 min read
A look at how data analysis can maintain individual privacy.
― 6 min read
This article explores attacks on LLMs and strategies for better protection.
― 5 min read
Examining privacy dangers in Federated Learning and large language models.
― 6 min read
An overview of upgradeable smart contracts and their security challenges.
― 6 min read
Exploring the intersection of encryption and technological advancements in cybersecurity.
― 5 min read
A new method to label unknown IoT devices using network activity analysis.
― 5 min read
A new method for verifying IoT data using IOTA and TPM technologies.
― 8 min read
A comprehensive approach to protect data privacy while maintaining model utility.
― 7 min read
This paper discusses hidden communication risks in software-defined networks.
― 5 min read
Exploring network isolation and new virtual switch designs for secure cloud environments.
― 5 min read
Industrial systems face risks; IIDSs aim to improve cybersecurity but face deployment challenges.
― 6 min read
Exploring methods for secure information sharing in group discussions.
― 6 min read
This article discusses privacy solutions for Max Cover and Set Cover problems.
― 5 min read
TTPXHunter enhances threat intelligence by automating the extraction of TTPs from reports.
― 5 min read
Learn how label flipping attacks threaten URL safety and the new defense strategies.
― 8 min read
A look into the risks of data poisoning in federated learning systems.
― 7 min read
New methods enhance DNN robustness against adversarial attacks by considering example vulnerabilities.
― 6 min read
This paper reveals how OpenVPN can still be detected by ISPs.
― 6 min read
Investigating techniques to enhance security in BusyBox used in IoT devices.
― 7 min read
A new automated method helps developers create security test cases for RESTful APIs.
― 5 min read
Exploring privacy-preserving techniques in machine learning and their significance.
― 5 min read
PhenoAuth offers a new approach to secure IoT device authentication.
― 6 min read
A novel approach enhances data recovery while addressing privacy concerns in federated learning.
― 5 min read
WaterMax improves watermarking in AI-generated text, ensuring quality and traceability.
― 6 min read