A new framework enhances Twitter bot detection by combining language models and graph techniques.
― 4 min read
Cutting edge science explained simply
A new framework enhances Twitter bot detection by combining language models and graph techniques.
― 4 min read
NATI[P]G simulates cyber threats to enhance grid resilience.
― 5 min read
Using Rowhammer to create stable device fingerprints for enhanced security.
― 5 min read
A new defense method tackles adversarial attacks on object detection in remote sensing images.
― 5 min read
A new technique improves detection of backdoor attacks in federated learning models.
― 6 min read
Research develops encrypted control for safer PAM applications.
― 5 min read
Logs2Graphs enhances detection accuracy using graph-based methods for event logs.
― 9 min read
This article discusses a new approach to handle adversarial examples in text.
― 7 min read
A deep dive into the security challenges of Ethereum's smart contract verification.
― 5 min read
DUBA is an advanced method for stealthy backdoor attacks on AI models.
― 5 min read
IoTDevID provides a method for accurate identification of diverse IoT devices.
― 7 min read
Examining the risks of data poisoning in SplitFed Learning applications.
― 7 min read
This paper discusses model extraction attacks and defenses in inference serving systems.
― 8 min read
A new method for better fault detection in Industrial Internet of Things systems.
― 5 min read
Understanding Hardware Trojans and their impact on electronic device security.
― 5 min read
Addressing risks in hardware design through resilience and collaboration.
― 6 min read
Introducing a new defense mechanism against membership inference attacks in machine learning models.
― 6 min read
Effective intrusion detection is vital for securing IoT networks against cyber threats.
― 5 min read
Malafide introduces sophisticated spoofing techniques, complicating countermeasures in speech recognition.
― 5 min read
Examine the risks and defenses against power side-channel attacks on cloud FPGAs.
― 5 min read
A new method improves fuzzing by focusing on input relationships and adapting strategies.
― 6 min read
Manufacturers must prioritize cybersecurity to prevent serious risks in connected vehicles.
― 5 min read
A new scheme improves security for stream ciphers against Fast Correlation Attacks.
― 5 min read
A new protocol aims to prevent sandwich attacks in decentralized finance.
― 5 min read
New algorithm improves vehicle safety and detects cyberattacks effectively.
― 5 min read
Exploring vulnerabilities in AI models due to deceptive imagery.
― 6 min read
A look at hybrid models improving malware classification accuracy.
― 5 min read
Exploring the potential of keystroke dynamics for safe online identification.
― 6 min read
Combining audio, video, and text enhances detection of hate speech.
― 5 min read
How system admins use online communities for patch management decisions.
― 7 min read
Assessing the effectiveness of tools in finding bugs within popular ML libraries.
― 7 min read
A new approach to identifying fake videos by combining audio, visual, and motion data.
― 6 min read
Examining weaknesses in DSA and ECDSA for improved security insights.
― 5 min read
A look at LNet-SKD's role in improving network security.
― 5 min read
Exploring the challenges and defenses in quantum adversarial machine learning.
― 9 min read
Explore how data preparation impacts AI models in malware detection.
― 6 min read
Quantum technology offers new methods to improve DGA botnet detection in cybersecurity.
― 7 min read
This article reviews methods for detecting anomalies in vehicle CAN communication.
― 7 min read
Research on creating effective strategies for systems operating under uncertainty.
― 5 min read
A method to secure NoC layouts against unauthorized access is proposed.
― 6 min read