New methods aim to secure machine learning models against backdoor threats.
― 4 min read
Cutting edge science explained simply
New methods aim to secure machine learning models against backdoor threats.
― 4 min read
Examining the role of red teaming in testing AI systems for risks.
― 6 min read
A study revealing security flaws in popular mobile payment applications.
― 6 min read
Leveraging social media to enhance vehicle cybersecurity and mitigate emerging threats.
― 5 min read
A study on teaching cybersecurity in computer programming courses.
― 5 min read
Exploring the benefits of Federated Learning for anomaly detection in IoT networks.
― 7 min read
Study reveals how 5G data patterns can expose user activity.
― 6 min read
New models help developers, but backdoor attacks pose serious security risks.
― 8 min read
A look at federated learning’s privacy and integrity challenges and solutions.
― 5 min read
A new method merges LLMs with traditional disassembly techniques for effective analysis.
― 5 min read
Tackling data contamination for better cybersecurity and anomaly detection systems.
― 5 min read
Combining neural networks with cryptography enhances secure communication methods.
― 5 min read
Introducing HO-FMN for better evaluation of machine learning model robustness against adversarial attacks.
― 6 min read
Research highlights model robustness and defenses in decentralized federated learning.
― 6 min read
New methods tackle privacy risks in human movement data prediction.
― 6 min read
Exploring the digital shift and its impact on maritime cybersecurity.
― 4 min read
A fresh method to compare privacy mechanisms in machine learning.
― 6 min read
New methods improve black-box attacks using unlabeled data for machine learning.
― 4 min read
Exploring vulnerabilities present in code generated by language models.
― 6 min read
A novel approach to enhance security in federated learning against backdoor attacks.
― 5 min read
Discover the role of quantum authentication in enhancing digital security.
― 6 min read
Innovative method enhances IoT security using artificial noise and rate-splitting techniques.
― 5 min read
Using mixed reality to enhance drone testing against data attacks.
― 5 min read
A look into collective remote attestation and its impact on IoT device security.
― 6 min read
New protocols enhance security and efficiency in quantum digital signatures.
― 5 min read
A new method enhances the security of deep learning models against hidden threats.
― 6 min read
Exploring new approaches to enhance DRAM security against Rowhammer threats.
― 5 min read
This article discusses methods to keep agents' decision-making processes private.
― 6 min read
A new approach to detect anomalies in IoT devices using collaborative learning.
― 6 min read
CICAPT-IIoT aids in detecting advanced cyber threats in industrial IoT networks.
― 6 min read
Debloating software enhances speed and security by removing unnecessary code.
― 5 min read
This article discusses improving VLMs' resistance to adversarial attacks through design choices.
― 5 min read
This article examines how data preparation affects machine learning in cybersecurity.
― 5 min read
This article discusses safeguarding GNNs from data poisoning and backdoor attacks.
― 8 min read
Analyzing effective clean-label backdoor attack techniques in machine learning.
― 6 min read
Memory encryption offers a new way to keep cloud data safe and efficient.
― 5 min read
Data augmentation boosts software vulnerability assessment accuracy amidst data imbalance.
― 7 min read
A method to improve communication and efficiency in power grids.
― 5 min read
Study reveals security risks from data poisoning in large language models.
― 3 min read
A new method improves verification of processor security against speculative execution vulnerabilities.
― 6 min read