A new method reveals backdoor attack threats in machine learning without sensitive data access.
― 6 min read
Cutting edge science explained simply
A new method reveals backdoor attack threats in machine learning without sensitive data access.
― 6 min read
A new method helps identify hidden vulnerabilities in biometric models.
― 5 min read
A new approach enhances detection of subtle cyber threats using advanced data methods.
― 5 min read
A new system to identify phishing emails with high accuracy and clear reasoning.
― 5 min read
Examining adversarial training for stronger machine learning models against attacks.
― 6 min read
Ruledger provides a secure solution for smart home system vulnerabilities.
― 5 min read
Examining how large language models can improve digital forensic investigations.
― 5 min read
AutoRobust uses reinforcement learning to strengthen malware detection systems against adversarial tactics.
― 6 min read
Learn how agents coordinate effectively in networks to achieve common goals.
― 6 min read
Enhancing biotechnology safety through machine learning security operations.
― 7 min read
BasedAI uses encryption to ensure privacy while enhancing language model performance.
― 6 min read
Exploring transfer learning applications to improve cybersecurity functions and address data challenges.
― 12 min read
A look into PUFs and their role in IoT security.
― 6 min read
This article explores attacks on LLMs and strategies for better protection.
― 5 min read
Examining privacy dangers in Federated Learning and large language models.
― 6 min read
Exploring the challenges and implications of misconfiguration in O-RAN systems for future networks.
― 7 min read
Exploring the intersection of encryption and technological advancements in cybersecurity.
― 5 min read
A new method to label unknown IoT devices using network activity analysis.
― 5 min read
This article examines how cyber risk affects company valuations and stock returns.
― 7 min read
Examining risks and defenses in Quantum Key Distribution networks for secure communications.
― 5 min read
A comprehensive approach to protect data privacy while maintaining model utility.
― 7 min read
This paper discusses hidden communication risks in software-defined networks.
― 5 min read
Exploring network isolation and new virtual switch designs for secure cloud environments.
― 5 min read
Industrial systems face risks; IIDSs aim to improve cybersecurity but face deployment challenges.
― 6 min read
This article examines the financial impact of cyber incidents on companies.
― 5 min read
A new method for verifying complex program properties to enhance security.
― 6 min read
TTPXHunter enhances threat intelligence by automating the extraction of TTPs from reports.
― 5 min read
A new benchmark aims to measure and mitigate AI-related dangers.
― 5 min read
Learn how label flipping attacks threaten URL safety and the new defense strategies.
― 8 min read
A look into the risks of data poisoning in federated learning systems.
― 7 min read
ImgTrojan manipulates VLMs using deceptive training data.
― 5 min read
A new model efficiently targets nodes in GNNs with minimal changes.
― 7 min read
An analysis of investment performance in cybersecurity ventures from 2010 to 2022.
― 4 min read
New methods enhance DNN robustness against adversarial attacks by considering example vulnerabilities.
― 6 min read
A new method improves the safety of RL agents from adversarial disruptions.
― 5 min read
Investigating techniques to enhance security in BusyBox used in IoT devices.
― 7 min read
A new automated method helps developers create security test cases for RESTful APIs.
― 5 min read
A look at the importance of cybersecurity in electric vehicle charging infrastructure.
― 6 min read
Exploring privacy-preserving techniques in machine learning and their significance.
― 5 min read
Quantum computing could transform many fields while posing significant risks to cybersecurity.
― 4 min read