A system for using chatbots anonymously while protecting user identity.
― 6 min read
Cutting edge science explained simply
A system for using chatbots anonymously while protecting user identity.
― 6 min read
A new framework enhances testing efficiency and bug detection in cryptographic libraries.
― 7 min read
New methods tackle privacy risks in human movement data prediction.
― 6 min read
Exploring the digital shift and its impact on maritime cybersecurity.
― 4 min read
This article discusses the significance of hashing algorithms in blockchain technology.
― 5 min read
A fresh method to compare privacy mechanisms in machine learning.
― 6 min read
Research reveals automated methods to track web censorship effectively.
― 6 min read
Examining the vulnerability of neural networks to small input changes.
― 7 min read
New methods improve black-box attacks using unlabeled data for machine learning.
― 4 min read
Exploring vulnerabilities present in code generated by language models.
― 6 min read
A novel approach to enhance security in federated learning against backdoor attacks.
― 5 min read
CEIPA helps uncover vulnerabilities in large language models to enhance their safety.
― 6 min read
A look into collective remote attestation and its impact on IoT device security.
― 6 min read
A look at synthetic data generation for urban mobility and privacy challenges.
― 6 min read
A method that reduces gestures needed for biometric enrolment through synthetic data.
― 5 min read
MLLMs face new threats as safe prompts can be falsely refused.
― 4 min read
New methods are ensuring privacy in genomic data research.
― 6 min read
A powerful tool for in-depth smart contract transaction analysis emerges.
― 6 min read
Exploring new approaches to enhance DRAM security against Rowhammer threats.
― 5 min read
Ensuring buyer privacy is crucial as data markets grow.
― 8 min read
Examining the role and impact of kill switches for smart contracts.
― 8 min read
IdentityChain combines privacy and compliance for secure identity management.
― 7 min read
Preset-Voice Matching improves speech translation while ensuring privacy and reducing risks.
― 6 min read
CICAPT-IIoT aids in detecting advanced cyber threats in industrial IoT networks.
― 6 min read
This article discusses retraining methods using model predictions for improved accuracy.
― 9 min read
This article examines how data preparation affects machine learning in cybersecurity.
― 5 min read
A novel approach for proving ownership of language models.
― 5 min read
This article discusses safeguarding GNNs from data poisoning and backdoor attacks.
― 8 min read
Exploring privacy risks in synthetic data and introducing the Data Plagiarism Index.
― 7 min read
Analyzing effective clean-label backdoor attack techniques in machine learning.
― 6 min read
Memory encryption offers a new way to keep cloud data safe and efficient.
― 5 min read
Data augmentation boosts software vulnerability assessment accuracy amidst data imbalance.
― 7 min read
A framework to identify misleading videos using traffic patterns.
― 6 min read
Exposing how third-party tools can compromise user privacy.
― 5 min read
Examining the security aspects of WebAssembly and its vulnerabilities.
― 6 min read
Study reveals security risks from data poisoning in large language models.
― 3 min read
Examining the vulnerabilities and potential attacks on NeRF technology.
― 5 min read
A new framework enhances data security for AI applications.
― 6 min read
MaskedHLS offers a solution for building secure hardware protecting against power side-channel attacks.
― 5 min read
The TGIF dataset aids in detecting advanced image manipulation techniques.
― 5 min read