A novel framework enhances IoT security using AI and homomorphic encryption.
Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang
― 7 min read
Cutting edge science explained simply
A novel framework enhances IoT security using AI and homomorphic encryption.
Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang
― 7 min read
Examining privacy concerns surrounding the use of language models.
Tianchen Zhang, Gururaj Saileshwar, David Lie
― 5 min read
Explore how agents interact and make decisions in complex environments.
Chunyan Mu, Nima Motamed, Natasha Alechina
― 6 min read
FRIDAY improves deepfake detection by focusing on manipulation signs.
Younhun Kim, Myung-Joon Kwon, Wonjun Lee
― 4 min read
Using deception to confuse cyber attackers and protect valuable data.
Jason Landsborough, Neil C. Rowe, Thuy D. Nguyen
― 6 min read
Chatbots face risks from clever prompts that lead to harmful answers.
Nilanjana Das, Edward Raff, Manas Gaur
― 4 min read
Exploring how obfuscation techniques are reshaping the malware landscape with LLMs.
Seyedreza Mohseni, Seyedali Mohammadi, Deepa Tilwani
― 7 min read
Discover how vaults enhance privacy on the Tor network.
Humza Ikram, Rumaisa Habib, Muaz Ali
― 7 min read
Discover the cybersecurity challenges faced by autonomous vehicles and their solutions.
Amal Yousseef, Shalaka Satam, Banafsheh Saber Latibari
― 7 min read
Learn how Deep-JSCC keeps your images safe while sharing.
Mehdi Letafati, Seyyed Amirhossein Ameli Kalkhoran, Ecenaz Erdemir
― 7 min read
Learn how PoisonCatcher protects IIoT data from harmful intrusions.
Lisha Shuai, Shaofeng Tan, Nan Zhang
― 6 min read
Learn how machine learning techniques enhance web security against cyber threats.
Daniel Urda, Branly Martínez, Nuño Basurto
― 7 min read
CyberSentinel offers swift detection of threats in an ever-growing digital landscape.
Sankalp Mittal
― 5 min read
Learn how 'Privacy as Code' transforms software development for better security.
Nicolás E. Díaz Ferreyra, Sirine Khelifi, Nalin Arachchilage
― 7 min read
Learn how improved techniques enhance software vulnerability detection.
Devesh Sawant, Manjesh K. Hanawal, Atul Kabra
― 9 min read
Learn how QKD protects secrets in communication against cyber threats.
Maciej Ogrodnik, Adam Widomski, Dagmar Bruß
― 6 min read
Learn how system fingerprinting keeps your data safe from cyber threats.
Prakhar Paliwal, Arjun Sable, Manjesh K. Hanawal
― 6 min read
Discover how RIS and Quantum Key Distribution protect our digital secrets.
Sushil Kumar, Soumya P. Dash, Debasish Ghose
― 7 min read
Examining security risks and challenges of large language models in technology.
Herve Debar, Sven Dietrich, Pavel Laskov
― 7 min read
Face anti-spoofing technology needs clearer explanations and user trust.
Haoyuan Zhang, Xiangyu Zhu, Li Gao
― 5 min read
Temporal Convolutional Networks excel in detecting network intrusions amid rising cyber threats.
Rukmini Nazre, Rujuta Budke, Omkar Oak
― 7 min read
Discover how automated red teaming enhances AI security through creative challenges.
Alex Beutel, Kai Xiao, Johannes Heidecke
― 6 min read
FedGIG tackles privacy risks in graph data training.
Tianzhe Xiao, Yichen Li, Yining Qi
― 5 min read
Learn how federated learning enhances data privacy during AI model training.
Kunal Bhatnagar, Sagana Chattanathan, Angela Dang
― 6 min read
A new method enhances fraud detection using data efficiently.
Sheng Xiang, Mingzhi Zhu, Dawei Cheng
― 6 min read
Discover how SimilarGPT enhances smart contract security by detecting vulnerabilities efficiently.
Jango Zhang
― 7 min read
Discover how adversarial training boosts malware detection and keeps systems safe.
Hamid Bostani, Jacopo Cortellazzi, Daniel Arp
― 8 min read
Backdoor attacks can undermine text classification models, injecting bias and skewing results.
A. Dilara Yavuz, M. Emre Gursoy
― 8 min read
Combining HMMs and CNNs to improve malware detection strategies.
Ritik Mehta, Olha Jureckova, Mark Stamp
― 7 min read
A look at how protective methods shield data from misuse in image generation.
Sen Peng, Jijia Yang, Mingyue Wang
― 8 min read
New tech using Quantum Machine Learning shows promise in fighting credit card fraud.
Mansour El Alami, Nouhaila Innan, Muhammad Shafique
― 6 min read
Learn how cryptographic libraries protect your online data and their vulnerabilities.
Rodothea Myrsini Tsoupidi, Elena Troubitsyna, Panos Papadimitratos
― 6 min read
Using AI language models to tackle software supply chain vulnerabilities.
Vasileios Alevizos, George A Papakostas, Akebu Simasiku
― 12 min read
Learn how timely IoCs help organizations defend against cyber threats.
Angel Kodituwakku, Clark Xu, Daniel Rogers
― 7 min read
An in-depth look at the essentials of packet processing and verification.
Shengyi Wang, Mengying Pan, Andrew W. Appel
― 7 min read
A new method enhances AI's defense against tricky adversarial attacks.
Longwei Wang, Navid Nayyem, Abdullah Rakin
― 8 min read
New tools and datasets are improving the fight against altered images.
Jingchun Lian, Lingyu Liu, Yaxiong Wang
― 7 min read
Adversarial training improves AI's defense against deceptive attacks using the SDI measure.
Olukorede Fakorede, Modeste Atsague, Jin Tian
― 6 min read
Adversarial attacks challenge the safety of large language models, risking trust and accuracy.
Atmane Ayoub Mansour Bahar, Ahmad Samer Wazan
― 5 min read
A new framework combines federated learning and blockchain to enhance privacy and security.
Ervin Moore, Ahmed Imteaj, Md Zarif Hossain
― 7 min read