Analyzing threats and defenses in federated learning against malicious attacks.
― 5 min read
Cutting edge science explained simply
Analyzing threats and defenses in federated learning against malicious attacks.
― 5 min read
Exploring the vulnerabilities of ML models and potential defenses against MIAs.
― 6 min read
Learn about adversarial attacks and their impact on machine learning models.
― 6 min read
A look at scalable classifiers and conformal prediction for reliable machine learning outcomes.
― 5 min read
A tool to identify vulnerabilities in AI-generated Python code is now available.
― 7 min read
A look at improving IoT security using existing sensor data for authentication.
― 6 min read
A new method using deep learning tackles cascading failures in complex networks.
― 7 min read
PASA offers a new method for detecting adversarial samples in deep learning models.
― 8 min read
A new system analyzes jailbreak prompts to improve model safety.
― 9 min read
FastLogAD improves log anomaly detection speed and accuracy through innovative methods.
― 7 min read
PrintListener exposes vulnerabilities in fingerprint authentication through sound analysis.
― 6 min read
New methods improve anomaly detection in Network Intrusion Detection Systems.
― 6 min read
Improving software security by detecting vulnerabilities before exploitation.
― 6 min read
A method to protect data privacy in decentralized learning systems using virtual nodes.
― 6 min read
Study reveals data poisoning risks in healthcare language models.
― 6 min read
A web-based platform enhances tabletop exercises for better learning in computing.
― 7 min read
A new approach to malware behavior search enhances cybersecurity analysis.
― 9 min read
Measuring robustness and safety in cyber-physical systems under sensor threats.
― 5 min read
An overview of residential proxies, their uses, and associated threats.
― 6 min read
Examining privacy issues and solutions in smart grid systems.
― 4 min read
S3PHER empowers patients by enabling secure health data sharing with providers.
― 6 min read
A new defense mechanism reduces label inference attack risks in collaborative machine learning.
― 6 min read
Integrating bug bounty programs improves cybersecurity training through practical experience.
― 5 min read
A new method enhances security in federated learning through intermediate outputs analysis.
― 6 min read
Evaluating risks of language models to ensure user safety and system integrity.
― 5 min read
Using AI to simplify PowerShell code creation for cybersecurity.
― 6 min read
Concerns rise over the safety of Text-to-Image models and their misuse.
― 5 min read
CUMAD detects hacked IoT devices while minimizing false alerts.
― 7 min read
This article explores how invariants can improve smart contract security against attacks.
― 6 min read
A look at new methods for securing Quantum Neural Networks against theft.
― 7 min read
A study on connections between certified IT products and their security implications.
― 8 min read
Introducing UGEs, a new way to keep data safe and usable.
― 6 min read
A new method enhances software testing by focusing on real interactions and environments.
― 8 min read
A novel system for assessing software vulnerabilities at multiple levels.
― 5 min read
Examining the risks of model poisoning attacks in federated learning systems.
― 6 min read
Learn how Physically Unclonable Functions improve security in Public Key Infrastructure.
― 6 min read
Enhancing security of quantum key distribution with advanced postselection techniques.
― 6 min read
This article explores methods to protect privacy while analyzing data effectively.
― 6 min read
A secure protocol for protecting user data in machine learning.
― 5 min read
The rise of synthetic videos raises issues of detection and misinformation.
― 7 min read