Examining the dangers of quantized language models and their potential misuse.
― 5 min read
Cutting edge science explained simply
Examining the dangers of quantized language models and their potential misuse.
― 5 min read
Fast-FedUL provides quick data removal methods for federated learning while ensuring privacy.
― 6 min read
This article examines security risks of backdoor attacks on machine learning in graph systems.
― 6 min read
A new approach enhances the effectiveness of attacks on safety-focused language models.
― 6 min read
This article assesses the effectiveness of visual similarity models against phishing attacks.
― 6 min read
A fresh approach to keeping sensitive graph data safe online.
― 8 min read
DiveR-CT improves automated red teaming for better safety assessments.
― 7 min read
A study on the effectiveness of libraries parsing X.509 certificates.
― 6 min read
Learn how quantum technology protects private communication.
― 8 min read
A review of network analysis methods to combat money laundering.
― 6 min read
A look into the security challenges and solutions for hardware in the cloud.
― 6 min read
New methods combat backdoor attacks on machine learning models for increased security.
― 5 min read
Examining the challenges and solutions in LLM watermarking to prevent misuse.
― 6 min read
A study on security flaws in smart contract address verification and a proposed detection method.
― 6 min read
A new benchmark for assessing LLMs in cybersecurity tasks.
― 7 min read
Discover key methods and applications of anomaly detection in changing data structures.
― 4 min read
Examining client contributions and vulnerabilities in federated learning systems.
― 6 min read
New cryptographic methods are vital for protecting data against quantum threats.
― 6 min read
Examining harmful extensions in the Chrome Web Store and how to detect them.
― 6 min read
This approach improves function comparison in software through call graphlets.
― 6 min read
LayerCAM-AE enhances detection of malicious updates in federated learning while preserving data privacy.
― 5 min read
Combining NIDS with Neurosymbolic AI improves threat detection and system understanding.
― 5 min read
Analyzing vulnerabilities in the SAE J1939 protocol for commercial vehicles.
― 6 min read
Two innovative techniques improve adversarial attacks on tabular data models.
― 7 min read
Examining the risks and misuse of large language models in cybercrime.
― 6 min read
Addressing security challenges in AI agents for safer interactions.
― 6 min read
New methods improve language model predictions under varying input conditions.
― 6 min read
ECHO improves network traffic classification through machine learning techniques.
― 6 min read
BISON offers a way to log in securely while protecting user identities.
― 6 min read
Introducing PrivacyRestore to protect user data while using large language models.
― 6 min read
Explore the privacy challenges posed by inference attacks in machine learning models.
― 7 min read
A new method for identifying vulnerabilities in Android applications' native code.
― 6 min read
FACOS offers a secure way to manage sensitive data using blockchain technology.
― 6 min read
Learn about face anti-spoofing systems and their importance in digital security.
― 5 min read
Learn about fuzzing techniques to enhance web application security.
― 8 min read
Exploring the challenges of GNN explainers under adversarial attacks in critical applications.
― 5 min read
A new design combines quantum key distribution with Tor for better online privacy.
― 6 min read
New attack method raises concerns about privacy in document understanding models.
― 6 min read
Uncovering the risks posed by backdoor attacks on intelligent systems.
― 5 min read
New methods like PromptFix help secure language models from hidden threats.
― 5 min read