A new method for detecting vehicle misbehavior while protecting privacy.
― 6 min read
Cutting edge science explained simply
A new method for detecting vehicle misbehavior while protecting privacy.
― 6 min read
A study on improving video stream detection while maintaining user privacy.
― 7 min read
A method to analyze network telescope data for identifying coordinated computer activities.
― 7 min read
SPSG improves model stealing efficiency using superpixels and sample gradients.
― 6 min read
A new method improves detection of audio deepfakes using similar sample references.
― 6 min read
A new approach enhances intrusion detection in decentralized systems.
― 6 min read
A look into the risks and defenses in 3D printing.
― 4 min read
New research reveals gaps in detecting transient domains used for online abuse.
― 6 min read
A new method to improve adversarial training for deep neural networks.
― 5 min read
FV8 enhances detection of evasive techniques in JavaScript through dynamic analysis.
― 6 min read
A new method combines PUFs and protocols for secure IoT device communication.
― 6 min read
This paper discusses securing smart contracts through a type system focused on integrity.
― 5 min read
This paper presents EFRAP, a defense against quantization-conditioned backdoor attacks in deep learning models.
― 7 min read
A look into the reliability and vulnerabilities of PUFs in IoT devices.
― 6 min read
A new approach improves the security of neural networks against adversarial examples.
― 6 min read
A study reveals the WordGame attack, exploiting weaknesses in LLM safety measures.
― 5 min read
A major vulnerability in XMPU exposes sensitive data after process termination.
― 5 min read
Aiming for efficient energy management through smart grids and new technologies.
― 7 min read
This study examines the weaknesses of SER models against adversarial attacks across languages.
― 5 min read
A framework to enhance firmware update management for smart inverters.
― 9 min read
A method to secure neural networks against vulnerabilities in memory.
― 6 min read
Introducing a new way to assess privacy risks in machine learning models.
― 5 min read
Exploring automated systems for efficient investigation of cyber threats and breaches.
― 10 min read
Quantum authentication provides a secure method for data verification using quantum mechanics.
― 5 min read
This article discusses the importance and strategies of securing software supply chains.
― 6 min read
WPS can aid location services but threatens user privacy significantly.
― 4 min read
Improving machine learning robustness against adversarial examples is critical for secure applications.
― 7 min read
A study introduces RepNoise to protect large language models from harmful fine-tuning.
― 6 min read
Improving distributed learning through adaptive robust clipping techniques.
― 6 min read
A study on improving robustness against attacks in language models.
― 6 min read
A new framework enhances the efficiency of automated penetration testing using reinforcement learning.
― 8 min read
Exploring the role of AI in fixing software vulnerabilities.
― 6 min read
Examining the risks facing TEEs due to evolving attack methods.
― 5 min read
Examining the impact of nudges on password change behavior after data breaches.
― 10 min read
Exploring AI's impact on efficiency, privacy, and security in vital systems.
― 6 min read
Research on how harmful agents can corrupt good agents in decentralized RL.
― 7 min read
This article examines how attacks affect LLM safety and response generation.
― 5 min read
NCS enables effective adversarial example generation with lower computational costs.
― 6 min read
A universal audio clip can mute advanced ASR models like Whisper.
― 6 min read
A new method improves jailbreak attacks on advanced AI models using character role-play.
― 7 min read