Learn about AI threats and how to protect sensitive data.
― 5 min read
Cutting edge science explained simply
Learn about AI threats and how to protect sensitive data.
― 5 min read
A new framework enhances vendor security using blockchain technology to minimize risks.
― 6 min read
A new model aims to protect farmers from rising cyberattacks in smart farming.
― 7 min read
AI and new methods aim to improve malware detection and cybersecurity.
― 7 min read
New models improve detection of fake voices in speech technology.
― 5 min read
TPLogAD automates log anomaly detection, enhancing system efficiency and security.
― 6 min read
A closer look at claims of new image classification defense against adversarial examples.
― 9 min read
A study reveals how prompt injection can compromise language models.
― 10 min read
Using AI to improve stability and security in power grids.
― 7 min read
Learn about phishing tactics and how to protect yourself.
― 5 min read
A look at how AutoML improves network intrusion detection.
― 5 min read
Exploring how smart inverters and AI can protect against cyber attacks.
― 8 min read
Ensuring AI in energy is safe, fair, and reliable for everyone.
― 6 min read
Learn how machine learning helps detect malware on Android devices.
― 6 min read
Exploring the dangers of misuse in artificial intelligence through jailbreak prompts.
― 7 min read
An overview of software vulnerabilities and the models used to detect them.
― 7 min read
A new tool to evaluate language models in cybersecurity tasks.
― 6 min read
A look at challenges and new methods to combat adversarial attacks.
― 6 min read
Discover how to safeguard machines from backdoor attacks in self-supervised learning.
― 6 min read
Learn efficient ways to count arrangements with specific conditions.
― 7 min read
Explore AI evaluations, their benefits, limits, and the future of AI safety.
― 6 min read
A new approach to fast and secure network monitoring and intrusion detection.
― 6 min read
A new strategy for targeting multiple tasks in deep neural networks.
― 6 min read
A look at deepfakes, their risks, and ways to detect them.
― 5 min read
Learn about CodeGraphNet, a new method for identifying software vulnerabilities.
― 7 min read
Explore how backdoor attacks threaten hardware design using large language models.
― 7 min read
ABBG attack disrupts visual object trackers using transformer technology.
― 6 min read
Research highlights methods to detect backdoor attacks in fine-tuning language models.
― 9 min read
Examining how code complexity impacts security in smart contracts.
― 5 min read
Leaves can confuse image recognition systems in self-driving cars.
― 6 min read
Quantum computing enhances the detection of unusual patterns in various fields.
― 5 min read
Learn how to safeguard your information from shoulder surfing.
― 6 min read
Discover how RITA helps in building safe IoT applications.
― 5 min read
Learn how moving target defense secures our power systems from data attacks.
― 5 min read
We examined two scenarios for developing security tools against attacks.
― 6 min read
A new method aims to detect the origin of synthetic voices.
― 7 min read
Learn how to spot and fix security code smells in JavaScript.
― 6 min read
Examining the benefits and risks of Federated Parameter-Efficient Fine-Tuning.
― 7 min read
A new model improves understanding of complex data connections.
― 6 min read
A deep dive into how MATTER exploits thermal vulnerabilities in mobile chips.
― 7 min read