Continuous measurement attacks challenge the security of quantum key distribution methods.
Théo Lejeune, François Damanet
― 5 min read
Cutting edge science explained simply
Continuous measurement attacks challenge the security of quantum key distribution methods.
Théo Lejeune, François Damanet
― 5 min read
Explore federated learning's approach to privacy in machine learning.
Yan Sun, Li Shen, Dacheng Tao
― 5 min read
5G technology boosts industrial efficiency, but security challenges loom.
Sotiris Michaelides, Stefan Lenz, Thomas Vogt
― 6 min read
Examining vulnerabilities in EaaS and new watermarking defense strategies.
Anudeex Shetty, Qiongkai Xu, Jey Han Lau
― 6 min read
Denial of Service attacks pose risks to autonomous vehicle safety and performance.
Tillmann Stübler, Andrea Amodei, Domenico Capriglione
― 5 min read
Examining how cyber threats affect smart inverters and power stability.
Romesh Prasad, Malik Hassanaly, Xiangyu Zhang
― 5 min read
This article discusses a new method to protect personal data while maintaining its usefulness.
Mohammad Amin Zarrabian, Parastoo Sadeghi
― 5 min read
Innovative methods are being developed to detect and combat DeepFakes effectively.
Mian Zou, Baosheng Yu, Yibing Zhan
― 5 min read
New metric improves understanding of AI text and human writing.
Tyler Malloy, Maria José Ferreira, Fei Fang
― 6 min read
Examining the vulnerabilities of navigational recommendation systems and how to enhance safety.
Ya-Ting Yang, Haozhe Lei, Quanyan Zhu
― 7 min read
A study on improving tools for junior developers to address security issues.
Nafis Tanveer Islam, Mazal Bethany, Dylan Manuel
― 6 min read
This article explores deep learning approaches to detect intrusions in Software Defined Networks.
Osama Mustafa, Khizer Ali, Talha Naqash
― 6 min read
Exploring methods to protect information through cryptographic systems.
Ugo Dal Lago, Zeinab Galal, Giulia Giusti
― 6 min read
A new method improves detection of advanced persistent threats using machine learning.
Ali M. Bakhiet, Salah A. Aly
― 5 min read
This study examines how noise can enhance speech recognition resilience against challenges.
Karla Pizzi, Matías Pizarro, Asja Fischer
― 5 min read
Using simplicial complexes to improve network intrusion detection and security analysis.
Mandala von Westenholz, Martin Atzmueller, Tim Römer
― 5 min read
Innovative techniques improve the detection of deepfake videos amidst evolving technology.
Zhiyuan Yan, Yandan Zhao, Shen Chen
― 4 min read
Exploring blendfake data's effectiveness in deepfake detection methods.
Jikang Cheng, Zhiyuan Yan, Ying Zhang
― 8 min read
This article discusses improving cybersecurity by integrating blockchain and machine learning into intrusion detection systems.
Synim Selimi, Blerim Rexha, Kamer Vishi
― 6 min read
BreachSeek uses AI to improve cybersecurity through automated penetration testing.
Ibrahim Alshehri, Adnan Alshehri, Abdulrahman Almalki
― 5 min read
Mean Field Games analyze interactions among many players to find optimal strategies.
Yohance A. P. Osborne, Iain Smears
― 4 min read
NoPhish extension utilizes machine learning to combat phishing threats online.
Leand Thaqi, Arbnor Halili, Kamer Vishi
― 6 min read
Exploring how digital fingerprints impact privacy and security online.
Blerim Rexha, Arbena Musa, Kamer Vishi
― 7 min read
Discover how Federated Learning keeps data private while enabling collaboration in IIoT.
Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Ali Alfatemi
― 5 min read
A study on how cyber threats affect power grid operations.
Leen Al Homoud, Katherine Davis, Shamina Hossain-McKenzie
― 5 min read
New methods improve how software vulnerabilities are detected using AI.
Van Nguyen, Surya Nepal, Tingmin Wu
― 7 min read
FIP enhances model training to prevent harmful data manipulation.
Nazmul Karim, Abdullah Al Arafat, Adnan Siraj Rakin
― 6 min read
Improving botnet detection methods through machine learning and adversarial defense strategies.
Rahul Yumlembam, Biju Issac, Seibu Mary Jacob
― 5 min read
A new method enhances federated learning's security by combating Byzantine attacks effectively.
Jiahao Xu, Zikai Zhang, Rui Hu
― 6 min read
This article discusses the impact of DoS attacks on vehicle platoons.
Hassan Mokari, Yufei Tang
― 6 min read
Combining security and reliability to improve autonomous vehicle image processing systems.
Michael Kühr, Mohammad Hamad, Pedram MohajerAnsari
― 7 min read
This article explores the impact of attacks on machine learning models and defensive strategies.
Ivan Sabolić, Ivan Grubišić, Siniša Šegvić
― 7 min read
This study compares different LLMs for finding faults and detecting vulnerabilities in software.
Ratnadira Widyasari, David Lo, Lizi Liao
― 5 min read
Addressing security risks in network-booting systems for academic environments.
Simon Moser
― 6 min read
A study on phishing tactics in the Ethereum blockchain and ways to fight back.
Zhuo Chen, Yufeng Hu, Bowen He
― 6 min read
NoiseAttack alters multiple classes in backdoor attacks using subtle noise patterns.
Abdullah Arafat Miah, Kaan Icer, Resit Sendag
― 6 min read
Learn how hidden triggers can manipulate language models and pose serious risks.
Abdullah Arafat Miah, Yu Bi
― 6 min read
Introducing a framework to secure wireless networks against emerging threats.
Saleh Darzi, Attila Altay Yavuz
― 6 min read
Research reveals methods to protect against side-channel attacks on FPGAs.
Davide Galli, Adriano Guarisco, William Fornaciari
― 5 min read
A new framework improves simulations for emergency response efficiency.
Jardi Martinez Jordan, Michael Stiber
― 7 min read