Explore how L2 regularization can enhance privacy in AI models.
Nikolaos Chandrinos, Iliana Loi, Panagiotis Zachos
― 8 min read
Cutting edge science explained simply
Explore how L2 regularization can enhance privacy in AI models.
Nikolaos Chandrinos, Iliana Loi, Panagiotis Zachos
― 8 min read
Examining how users handle suspicious emails while using VR headsets.
Filipo Sharevski, Jennifer Vander Loop, Sarah Ferguson
― 6 min read
Exploring how ASR models help identify speech deepfakes effectively.
Davide Salvi, Amit Kumar Singh Yadav, Kratika Bhagtani
― 7 min read
A new approach to safeguarding sensitive health data while enabling valuable insights.
Sascha Welten, Karl Kindermann, Ahmet Polat
― 5 min read
Learn how IP address analysis strengthens cybersecurity against rising digital threats.
Cebajel Tanan, Sameer G. Kulkarni, Tamal Das
― 8 min read
Learn how autonomous cyber agents fight against unpredictable digital threats.
Ankita Samaddar, Nicholas Potteiger, Xenofon Koutsoukos
― 7 min read
Learn how IDS uses machine learning to enhance IoT security.
Muhammad Zawad Mahmud, Samiha Islam, Shahran Rahman Alve
― 7 min read
Language models excel in CTF competitions, showcasing their hacking potential.
Rustem Turtayev, Artem Petrov, Dmitrii Volkov
― 7 min read
Discover how FIDO2 improves online authentication and addresses security issues.
Marco Casagrande, Daniele Antonioli
― 6 min read
Multimodal agents improve phishing detection by analyzing URLs and images together.
Fouad Trad, Ali Chehab
― 5 min read
Discover effective methods for detecting bots in the digital world.
Jan Kadel, August See, Ritwik Sinha
― 5 min read
A novel approach enhances malware detection with graph analysis and machine learning.
Hesamodin Mohammadian, Griffin Higgins, Samuel Ansong
― 8 min read
Learn how groups protect their secrets through key exchange methods.
Daniel Camazón Portela, Álvaro Otero Sánchez, Juan Antonio López Ramos
― 8 min read
Argos makes fully homomorphic encryption faster and more secure for real-world use.
Jules Drean, Fisher Jepsen, Edward Suh
― 6 min read
Discover how NODE-AdvGAN tricks AI with subtle images.
Xinheng Xie, Yue Wu, Cuiyu He
― 6 min read
Discover how SEQUENT revolutionizes anomaly detection in digital networks.
Clinton Cao, Agathe Blaise, Annibale Panichella
― 6 min read
Examining the effectiveness and vulnerabilities of semantic watermarks in digital content.
Andreas Müller, Denis Lukovnikov, Jonas Thietke
― 5 min read
Protecting information flow in systems against cyber threats.
Zishuo Li, Anh Tung Nguyen, André M. H. Teixeira
― 5 min read
A user-friendly tool for assessing software vulnerabilities quickly and accurately.
Shivansh Chopra, Hussain Ahmad, Diksha Goel
― 6 min read
Exploring vulnerabilities and defenses in modern transportation networks.
Ya-Ting Yang, Quanyan Zhu
― 6 min read
Research develops better voice detection for non-native speakers.
Aulia Adila, Candy Olivia Mawalim, Masashi Unoki
― 4 min read
Explore AI's potential for good and harm in our society.
Giulio Corsi, Kyle Kilian, Richard Mallah
― 10 min read
Explore how Digital Twins can optimize blockchain systems and tackle key challenges.
Georgios Diamantopoulos, Nikos Tziritas, Rami Bahsoon
― 8 min read
Explore the world of deepfakes and their impact on trust in media.
Muhammad Umar Farooq, Awais Khan, Ijaz Ul Haq
― 7 min read
Learn how hidden sensors boost security in cyber-physical systems.
Sumukha Udupa, Ahmed Hemida, Charles A. Kamhoua
― 6 min read
New research reveals how shared features can predict AI model vulnerabilities.
Ashley S. Dale, Mei Qiu, Foo Bin Che
― 7 min read
Learn how memory contention can lead to hidden vulnerabilities in modern devices.
Ismet Dagli, James Crea, Soner Seckiner
― 5 min read
Learn how SBOMs protect software from hidden vulnerabilities.
Can Ozkan, Xinhai Zou, Dave Singelee
― 7 min read
Discover how WLAM is transforming technology and our daily lives.
Zhaohui Yang, Wei Xu, Le Liang
― 7 min read
Exploring the risks of backdoor attacks in machine learning and their implications.
ZeinabSadat Taghavi, Hossein Mirzaei
― 7 min read
Learn how adversarially robust algorithms manage data streams effectively.
David P. Woodruff, Samson Zhou
― 5 min read
Discover how adversarial noise affects 3D models and challenges technology.
Abdurrahman Zeybey, Mehmet Ergezer, Tommy Nguyen
― 7 min read
Learn how PU and NU Learning enhance cybersecurity measures against hidden threats.
Robert Dilworth, Charan Gudla
― 6 min read
Learn how to make Large Language Models safer from harmful prompts.
Bryan Li, Sounak Bagchi, Zizhan Wang
― 7 min read
A new framework improves software security across multiple programming languages.
Boyu Zhang, Triet H. M. Le, M. Ali Babar
― 5 min read
A new algorithm improves the detection of unusual network activities.
Christie Djidjev
― 8 min read
Learn how to protect GNNs from adversarial attacks and enhance their reliability.
Kerui Wu, Ka-Ho Chow, Wenqi Wei
― 7 min read
Research reveals vulnerabilities in Code Language Models against backdoor attacks.
Naizhu Jin, Zhong Li, Yinggang Guo
― 7 min read
Hypernetwork Federated Learning offers new ways to protect data privacy in machine learning.
Pengxin Guo, Shuang Zeng, Wenhao Chen
― 6 min read
New strategies improve Address Space Layout Randomization against attacks.
Shixin Song, Joseph Zhang, Mengjia Yan
― 6 min read