Examining the privacy challenges associated with Federated Learning and gradient inversion attacks.
Qiongxiu Li, Lixia Luo, Agnese Gini
― 7 min read
Cutting edge science explained simply
Examining the privacy challenges associated with Federated Learning and gradient inversion attacks.
Qiongxiu Li, Lixia Luo, Agnese Gini
― 7 min read
MEGA-PT improves penetration testing effectiveness and adaptability for better cybersecurity.
Yunfei Ge, Quanyan Zhu
― 5 min read
A study reveals the rise of cybercrime activity on Telegram channels.
Sayak Saha Roy, Elham Pourabbas Vafa, Kobra Khanmohammadi
― 4 min read
RPKI strengthens Internet routing by verifying data authenticity.
Haya Schulmann, Niklas Vogel, Michael Waidner
― 7 min read
This work presents new methods for detecting malware using visualization and machine learning.
Fang Wang, Hussam Al Hamadi, Ernesto Damiani
― 5 min read
Examining firmware vulnerabilities and the tools to enhance security.
Mahsa Farahani, Ghazal Shenavar, Ali Hosseinghorban
― 7 min read
Exploring the role of Semantic Communication and security in next-gen networks.
Jiayi He, Xiaofeng Luo, Jiawen Kang
― 8 min read
This article examines browser fingerprinting's role in online advertising and its privacy concerns.
Zengrui Liu, Jimmy Dani, Shujiang Wu
― 6 min read
A new memory allocator improves security against Rowhammer attacks while maintaining performance.
Anish Saxena, Walter Wang, Alexandros Daglis
― 6 min read
Addressing security risks in generative AI through red and blue teaming.
Ambrish Rawat, Stefan Schoepf, Giulio Zizzo
― 5 min read
Assessing the effectiveness of LLMs for threat analysis.
Sanchana Srikanth, Mohammad Hasanuzzaman, Farah Tasnur Meem
― 10 min read
Enhancing detection methods for harmful packages in software repositories.
Wenbo Guo, Chengwei Liu, Limin Wang
― 6 min read
New methods improve actuator security in Cyber-Physical Systems to prevent attacks.
Chuadhry Mujeeb Ahmed, Matthew Calder, Sean Gunawan
― 5 min read
Exploring the balance between adversarial threats and proactive measures in machine learning.
Vishal Asnani, Xi Yin, Xiaoming Liu
― 6 min read
Research reveals risks in smartphone motion sensors, highlighting privacy concerns.
Ahmed Najeeb, Abdul Rafay, Naveed Anwar Bhatti
― 5 min read
Analyzing connections between CAPEC and ATT&CK for improved risk assessments.
Braden K Webb, Sumit Purohit, Rounak Meyur
― 7 min read
Explore the privacy concerns surrounding membership inference attacks in machine learning.
Hongyan Chang, Ali Shahin Shamsabadi, Kleomenis Katevas
― 5 min read
A new approach enhances fraud detection using quantum computing and SVM models.
Ettore Canonici, Filippo Caruso
― 6 min read
A study on the importance of evaluation metrics in anomaly detection.
Minjae Ok, Simon Klüttermann, Emmanuel Müller
― 5 min read
This benchmark evaluates privacy threats and defense mechanisms in NLP models.
Wei Huang, Yinggui Wang, Cen Chen
― 8 min read
A look at how AI detects and analyzes online fraud.
Antonis Papasavva, Shane Johnson, Ed Lowther
― 8 min read
Selective encryption enhances privacy while maintaining model performance in collaborative learning.
Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov
― 6 min read
Introducing a framework for secure training of machine learning models.
Haleh Hayati, Carlos Murguia, Nathan van de Wouw
― 5 min read
AI technology is changing the landscape of vishing scams, increasing risks for individuals.
João Figueiredo, Afonso Carvalho, Daniel Castro
― 5 min read
A flexible testbed enhances research in Named Data Networking for better data access.
Amir Esmaeili, Maryam Fazli
― 6 min read
This article discusses enhancing unsupervised anomaly detection using classification methods.
Tian-Yi Zhou, Matthew Lau, Jizhou Chen
― 6 min read
A look into privacy-preserving computation and its efficiency through memory-centric designs.
Mpoki Mwaisela
― 5 min read
A lightweight approach improves detection of silent vulnerability fixes in open-source software.
Xu Yang, Shaowei Wang, Jiayuan Zhou
― 6 min read
Enhancing LLMs' ability to repair buffer overflow vulnerabilities with context-aware techniques.
Arshiya Khan, Guannan Liu, Xing Gao
― 5 min read
SOSK helps users track and extract keywords from software security reports.
Phong Minh Vu, Tung Thanh Nguyen
― 6 min read
Introducing Wavelet-CLIP for improved detection of deepfake images.
Lalith Bharadwaj Baru, Shilhora Akshay Patel, Rohit Boddeda
― 5 min read
Research reveals vulnerabilities in AV lane detection through negative shadows.
Pedram MohajerAnsari, Alkim Domeke, Jan de Voor
― 7 min read
Innovative methods improve detection of malware through deep packet inspection.
Kyle Stein, Arash Mahyari, Guillermo Francia
― 5 min read
New design improves reliability and security for IoT devices using PUF technology.
Gaoxiang Li, Yu Zhuang
― 5 min read
As technology advances, software security faces new challenges and opportunities.
Marcel Böhme, Eric Bodden, Tevfik Bultan
― 8 min read
New methods enhance security practices in interconnected industrial systems.
Thomas Rosenstatter, Christian Schäfer, Olaf Saßnick
― 6 min read
Examining the impact and lessons of the DarkSeoul cyberattack on South Korea.
Puya Pakshad, Abiha Hussain, Maks Dudek
― 7 min read
Investigating the quality and security concerns of AI-generated code.
Chun Jie Chong, Zhihao Yao, Iulian Neamtiu
― 7 min read
Discover how tensor networks enhance anomaly detection across various fields.
Alejandro Mata Ali, Aitor Moreno Fdez. de Leceta, Jorge López Rubio
― 4 min read
Learn how to protect language models from manipulation and ensure secure responses.
Fangzhou Wu, Ethan Cecchetti, Chaowei Xiao
― 6 min read