A new approach to adversarial training enhances AI system performance and security.
― 6 min read
Cutting edge science explained simply
A new approach to adversarial training enhances AI system performance and security.
― 6 min read
A new technique exposes vulnerabilities in advanced AI systems combining images and text.
― 5 min read
This study assesses how GPT-4 aids in reverse engineering tasks.
― 8 min read
M2CVD improves software vulnerability detection through collaborative model approaches.
― 7 min read
A new method helps organizations better prioritize software vulnerabilities.
― 6 min read
A novel approach enhances detection of software security vulnerabilities using advanced models.
― 7 min read
Introducing a method to evaluate model resilience against data poisoning attacks.
― 6 min read
Exploring vulnerabilities in Personalized Federated Learning and emerging backdoor attack methods.
― 6 min read
A new approach to finding security flaws in processors using the Shesha framework.
― 5 min read
This article discusses the risks of package hallucinations in code-generating models.
― 6 min read
Using language models to improve software bug detection and testing efficiency.
― 6 min read
New benchmark CTIBench evaluates LLM effectiveness in tackling cyber threats.
― 5 min read
A look at kernel safety methods to combat advanced attacks like Spectre.
― 6 min read
A new digital signature system improves speed and security in data center applications.
― 5 min read
Examining the Rowhammer flaw and its implications for data security.
― 7 min read
Investigating the security flaws in Memory Tagging Extension and speculative execution attacks.
― 6 min read
Examining the security risks and solutions for emerging AI assistant technologies.
― 6 min read
A look at vulnerabilities and solutions for deep learning systems.
― 6 min read
FSBI method improves detection of manipulated digital media.
― 5 min read
A new tool improves static analysis with simplified graphs and machine learning.
― 7 min read
Competition reveals vulnerabilities and defenses in language model security.
― 3 min read
A method to identify attacks on systems combining images and text.
― 6 min read
New method targets rhythm changes for stealthy speech attacks.
― 5 min read
New methods improve unlearning harmful data in machine learning systems.
― 5 min read
A look into robust learning models and their importance in data security.
― 7 min read
Examining security risks in mmWave networks utilizing simultaneous wireless information and power transfer.
― 6 min read
A study on improving model extraction techniques for deep learning security.
― 6 min read
A new approach combines knowledge and technology to improve software vulnerability detection.
― 7 min read
This paper introduces a framework to evaluate vulnerabilities in large language models.
― 3 min read
Centaurs combine human insight and AI to improve decision-making across various fields.
― 8 min read
A new method for encrypted control enhances security while performing necessary functions.
― 4 min read
A plan to bolster the electricity grid's resilience and reliability amid emerging digital risks.
― 6 min read
This article explores the impact of data poisoning on language model alignment.
― 6 min read
P3GNN enhances APT detection while protecting data privacy in SDN networks.
― 6 min read
Learn how backdoor attacks threaten machine learning systems and methods to defend against them.
― 6 min read
Tracemax offers improved packet tracing for better DDoS attack defense.
― 6 min read
A framework to improve APT detection while protecting privacy.
― 5 min read
Exploring the safety challenges posed by adversarial attacks on multimodal agents.
― 6 min read
Addressing the safety concerns of code produced by large language models.
― 7 min read
LLMs can aid in social engineering protection and also pose new risks.
― 6 min read