This benchmark evaluates privacy threats and defense mechanisms in NLP models.
Wei Huang, Yinggui Wang, Cen Chen
― 8 min read
Cutting edge science explained simply
This benchmark evaluates privacy threats and defense mechanisms in NLP models.
Wei Huang, Yinggui Wang, Cen Chen
― 8 min read
A look at how AI detects and analyzes online fraud.
Antonis Papasavva, Shane Johnson, Ed Lowther
― 8 min read
Selective encryption enhances privacy while maintaining model performance in collaborative learning.
Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov
― 6 min read
Introducing a framework for secure training of machine learning models.
Haleh Hayati, Carlos Murguia, Nathan van de Wouw
― 5 min read
AI technology is changing the landscape of vishing scams, increasing risks for individuals.
João Figueiredo, Afonso Carvalho, Daniel Castro
― 5 min read
A flexible testbed enhances research in Named Data Networking for better data access.
Amir Esmaeili, Maryam Fazli
― 6 min read
This article discusses enhancing unsupervised anomaly detection using classification methods.
Tian-Yi Zhou, Matthew Lau, Jizhou Chen
― 6 min read
A look into privacy-preserving computation and its efficiency through memory-centric designs.
Mpoki Mwaisela
― 5 min read
A lightweight approach improves detection of silent vulnerability fixes in open-source software.
Xu Yang, Shaowei Wang, Jiayuan Zhou
― 6 min read
Enhancing LLMs' ability to repair buffer overflow vulnerabilities with context-aware techniques.
Arshiya Khan, Guannan Liu, Xing Gao
― 5 min read
SOSK helps users track and extract keywords from software security reports.
Phong Minh Vu, Tung Thanh Nguyen
― 6 min read
Introducing Wavelet-CLIP for improved detection of deepfake images.
Lalith Bharadwaj Baru, Shilhora Akshay Patel, Rohit Boddeda
― 5 min read
Research reveals vulnerabilities in AV lane detection through negative shadows.
Pedram MohajerAnsari, Alkim Domeke, Jan de Voor
― 7 min read
Innovative methods improve detection of malware through deep packet inspection.
Kyle Stein, Arash Mahyari, Guillermo Francia
― 5 min read
New design improves reliability and security for IoT devices using PUF technology.
Gaoxiang Li, Yu Zhuang
― 5 min read
As technology advances, software security faces new challenges and opportunities.
Marcel Böhme, Eric Bodden, Tevfik Bultan
― 8 min read
New methods enhance security practices in interconnected industrial systems.
Thomas Rosenstatter, Christian Schäfer, Olaf Saßnick
― 6 min read
Examining the impact and lessons of the DarkSeoul cyberattack on South Korea.
Puya Pakshad, Abiha Hussain, Maks Dudek
― 7 min read
Investigating the quality and security concerns of AI-generated code.
Chun Jie Chong, Zhihao Yao, Iulian Neamtiu
― 7 min read
Discover how tensor networks enhance anomaly detection across various fields.
Alejandro Mata Ali, Aitor Moreno Fdez. de Leceta, Jorge López Rubio
― 4 min read
Learn how to protect language models from manipulation and ensure secure responses.
Fangzhou Wu, Ethan Cecchetti, Chaowei Xiao
― 6 min read
A comprehensive dataset for network traffic analysis and anomaly detection.
Josef Koumar, Karel Hynek, Tomáš Čejka
― 8 min read
An overview of traditional and deep learning methods in network security.
Sabrine Ennaji, Fabio De Gaspari, Dorjan Hitaj
― 5 min read
Research reveals weaknesses in online toxicity detection using ASCII art techniques.
Sergey Berezin, Reza Farahbakhsh, Noel Crespi
― 6 min read
Team semantics enhances verification of complex properties in software systems.
Andreas Krebs, Arne Meier, Jonni Virtema
― 8 min read
Automated tools are crucial for verifying hardware security in modern devices.
Yao Hsiao, Nikos Nikoleris, Artem Khyzha
― 4 min read
New methods improve data usage auditing in Federated Learning systems.
Jiaxin Li, Marco Arazzi, Antonino Nocera
― 6 min read
A study comparing privacy threats in spiking and artificial neural networks.
Jiaxin Li, Gorka Abad, Stjepan Picek
― 5 min read
A new method safeguards decentralized learning from data poisoning attacks.
Chao Feng, Alberto Huertas Celdrán, Zien Zeng
― 6 min read
A framework using MLP and SVM identifies Android malware effectively.
Safayat Bin Hakim, Muhammad Adil, Kamal Acharya
― 7 min read
TrojVLM exposes vulnerabilities in Vision Language Models to backdoor attacks.
Weimin Lyu, Lu Pang, Tengfei Ma
― 7 min read
A new method to improve Federated Learning's resilience against data attacks.
Momin Ahmad Khan, Yasra Chandio, Fatima Muhammad Anwar
― 8 min read
A new approach enhances malware detection while resisting adversarial attacks.
Jingnan Zheng, Jiaohao Liu, An Zhang
― 8 min read
New method raises security concerns in EEG systems while highlighting potential protective uses.
Xuan-Hao Liu, Xinhao Song, Dexuan He
― 6 min read
Examining privacy vulnerabilities in federated learning and their implications for data security.
Thomas Schneider, Ajith Suresh, Hossein Yalame
― 5 min read
This paper discusses a new approach to cybersecurity using Probabilistic Obstruction Temporal Logic.
Jean Leneutre, Vadim Malvone, James Ortiz
― 6 min read
Explore how new encryption standards protect our data from quantum threats.
Ananya Tadepalli
― 8 min read
Mammogram analysis faces risks from cyber-attacks, demanding stronger AI defenses.
Zhengbo Zhou, Degan Hao, Dooman Arefan
― 7 min read
Automated testing enhances security in healthcare systems, addressing evolving cyber threats.
Haozhe Lei, Yunfei Ge, Quanyan Zhu
― 7 min read
A look into membership inference attacks and their relevance in data privacy.
Haritz Puerto, Martin Gubri, Sangdoo Yun
― 6 min read