A new method enhances the safety of code generated by language models.
Xiangzhe Xu, Zian Su, Jinyao Guo
― 5 min read
Cutting edge science explained simply
A new method enhances the safety of code generated by language models.
Xiangzhe Xu, Zian Su, Jinyao Guo
― 5 min read
A look at trust management in connected technology.
Yunfei Ge, Quanyan Zhu
― 7 min read
Spike Talk enhances power grid communication for better efficiency and resilience.
Yubo Song, Subham Sahoo
― 6 min read
Methods to safeguard sensitive data while maintaining model performance.
Yuxiao Chen, Gamze Gürsoy, Qi Lei
― 5 min read
A look into how hidden tricks affect language models and their explanations.
Huaizhi Ge, Yiming Li, Qifan Wang
― 7 min read
Assessing vulnerabilities in federated learning's privacy through attribute inference attacks.
Francesco Diana, Othmane Marfoq, Chuan Xu
― 7 min read
A new approach to predict and prevent data breaches using technical and social data.
Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour
― 5 min read
New method enhances deep learning security with random neural fingerprints.
Haim Fisher, Moni Shahar, Yehezkel S. Resheff
― 9 min read
Learn about a new method for safe and efficient file transfers.
Chaitanya Rahalkar, Anushka Virgaonkar
― 6 min read
Language models show impressive abilities but also significant vulnerabilities we need to address.
Sanjay Das, Swastik Bhattacharya, Souvik Kundu
― 5 min read
AI models can help find vulnerabilities in cryptographic systems for better security.
Cristian Curaba, Denis D'Ambrosi, Alessandro Minisini
― 7 min read
Learn how string distances can aid privacy in sensitive data analysis.
Jerry Yao-Chieh Hu, Erzhi Liu, Han Liu
― 6 min read
Learn about AI threats and how to protect sensitive data.
Sarbartha Banerjee, Prateek Sahu, Mulong Luo
― 5 min read
A new framework enhances vendor security using blockchain technology to minimize risks.
Deepti Gupta, Lavanya Elluri, Avi Jain
― 6 min read
A new model aims to protect farmers from rising cyberattacks in smart farming.
Lopamudra Praharaj, Deepti Gupta, Maanak Gupta
― 7 min read
AI and new methods aim to improve malware detection and cybersecurity.
Jinting Zhu, Julian Jang-Jaccard, Ian Welch
― 7 min read
New models improve detection of fake voices in speech technology.
Yang Xiao, Rohan Kumar Das
― 5 min read
TPLogAD automates log anomaly detection, enhancing system efficiency and security.
Jiawei Lu, Chengrong Wu
― 6 min read
A closer look at claims of new image classification defense against adversarial examples.
Jie Zhang, Kristina Nikolić, Nicholas Carlini
― 9 min read
A study reveals how prompt injection can compromise language models.
Jiashuo Liang, Guancheng Li, Yang Yu
― 10 min read
Using AI to improve stability and security in power grids.
Benjamin M. Peter, Mert Korkali
― 7 min read
Learn about phishing tactics and how to protect yourself.
Tosin Ige, Christopher Kiekintveld, Aritran Piplai
― 5 min read
A look at how AutoML improves network intrusion detection.
Nana Kankam Gyimah, Judith Mwakalonge, Gurcan Comert
― 5 min read
Exploring how smart inverters and AI can protect against cyber attacks.
Kejun Chen, Truc Nguyen, Malik Hassanaly
― 8 min read
Ensuring AI in energy is safe, fair, and reliable for everyone.
Sotiris Pelekis, Evangelos Karakolis, George Lampropoulos
― 6 min read
Learn how machine learning helps detect malware on Android devices.
Maithili Kulkarni, Mark Stamp
― 6 min read
Exploring the dangers of misuse in artificial intelligence through jailbreak prompts.
Jean Marie Tshimula, Xavier Ndona, D'Jeff K. Nkashama
― 7 min read
An overview of software vulnerabilities and the models used to detect them.
Shahriyar Zaman Ridoy, Md. Shazzad Hossain Shaon, Alfredo Cuzzocrea
― 7 min read
A new tool to evaluate language models in cybersecurity tasks.
Zhengmin Yu, Jiutian Zeng, Siyi Chen
― 6 min read
A look at challenges and new methods to combat adversarial attacks.
Yaniv Nemcovsky, Avi Mendelson, Chaim Baskin
― 6 min read
Discover how to safeguard machines from backdoor attacks in self-supervised learning.
Sizai Hou, Songze Li, Duanyi Yao
― 6 min read
Learn efficient ways to count arrangements with specific conditions.
Martin Mathew, Javier Noda
― 7 min read
Explore AI evaluations, their benefits, limits, and the future of AI safety.
Peter Barnett, Lisa Thiergart
― 6 min read
A new approach to fast and secure network monitoring and intrusion detection.
Yaying Chen, Siamak Layeghy, Liam Daly Manocchio
― 6 min read
A new strategy for targeting multiple tasks in deep neural networks.
Jiacheng Guo, Tianyun Zhang, Lei Li
― 6 min read
A look at deepfakes, their risks, and ways to detect them.
Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen
― 5 min read
Learn about CodeGraphNet, a new method for identifying software vulnerabilities.
Md. Fahim Sultan, Tasmin Karim, Md. Shazzad Hossain Shaon
― 7 min read
Explore how backdoor attacks threaten hardware design using large language models.
Lakshmi Likhitha Mankali, Jitendra Bhandari, Manaar Alam
― 7 min read
ABBG attack disrupts visual object trackers using transformer technology.
Fatemeh Nourilenjan Nokabadi, Jean-Francois Lalonde, Christian Gagné
― 6 min read
Research highlights methods to detect backdoor attacks in fine-tuning language models.
Zhen Sun, Tianshuo Cong, Yule Liu
― 9 min read