A new framework enhances intrusion detection in IoT by addressing data imbalance.
― 5 min read
Cutting edge science explained simply
A new framework enhances intrusion detection in IoT by addressing data imbalance.
― 5 min read
Tracking discussions helps in early threat detection and defense strategies.
― 5 min read
A study on the vulnerabilities of LLM-integrated applications against SQL injection attacks.
― 7 min read
URET offers a flexible solution against adversarial attacks in various data types.
― 7 min read
ScalOTA improves OTA updates for vehicles using update stations for faster and secure downloads.
― 5 min read
Data poisoning in AI can lead to vulnerable code generation, posing security threats.
― 5 min read
A new method enhances federated learning security against data poisoning attacks.
― 5 min read
New method reveals vulnerabilities in Vertical Federated Learning systems using Graph Neural Networks.
― 5 min read
This study explores machine learning methods to improve power system security.
― 5 min read
SoftFlow helps identify security issues in electronic device design, protecting sensitive data.
― 5 min read
An overview of Android malware types and analysis methods to enhance security.
― 5 min read
Explore the risks and prevention methods for IoT device security.
― 6 min read
MASC provides a new approach to test crypto-API misuse detectors effectively.
― 5 min read
A new tool improves cybersecurity for robots using AI and game theory.
― 6 min read
A novel approach to accurately assess binary code similarities.
― 5 min read
This article examines local attack risks against the FIDO2 authentication protocol.
― 5 min read
Examining risks of cyber attacks on modern vehicle steering systems.
― 5 min read
Introducing CGBA, a new method for efficient adversarial image manipulation in black-box scenarios.
― 6 min read
A new framework improves WebAssembly binary protection against reverse engineering.
― 6 min read
This article explores overlapping community detection methods to tackle network manipulation.
― 4 min read
Examining the rise and risks of jailbreak prompts in language models.
― 6 min read
This work presents a method to improve code understanding in LLMs using symmetry.
― 7 min read
A new layer enhances DNNs' resistance to subtle input changes.
― 6 min read
A new method enhances detection of backdoor threats in models using images and text.
― 7 min read
A new approach to vehicle security addressing rising cyber threats.
― 6 min read
Ensuring safety in interconnected industrial control systems is crucial amidst rising cyber threats.
― 5 min read
Examining the threats posed by adversarial attacks on AI systems.
― 5 min read
Explore an innovative defense method to enhance federated learning security.
― 5 min read
New methods to secure federated learning against attacks while preserving user privacy.
― 6 min read
New methods to protect machine learning from backdoor attacks using feature strength.
― 5 min read
DroidDissector helps researchers identify Android malware effectively using static and dynamic analysis.
― 5 min read
WinkFuzz enhances kernel fuzzing by analyzing system call dependencies for better security testing.
― 6 min read
This document presents efficient methods to ensure message integrity in industrial control systems.
― 5 min read
Learn how edge computing can maintain reliable data processing.
― 5 min read
Exploring how data-driven intelligence enhances cybersecurity strategies and automation.
― 8 min read
Research shows machine learning significantly improves SQL injection detection rates.
― 5 min read
A new approach to detect malware in PDF files with fewer features.
― 6 min read
GIFD offers a fresh approach to keep data safe during machine learning.
― 6 min read
Incident-specific cyber insurance adapts to growing cyber threats for businesses.
― 7 min read
Focusing on training data selection can strengthen node classification systems.
― 7 min read