Transplantation optimizes fuzzing for MCU firmware, improving speed and efficiency.
Florian Hofhammer, Qinying Wang, Atri Bhattacharyya
― 5 min read
Cutting edge science explained simply
Transplantation optimizes fuzzing for MCU firmware, improving speed and efficiency.
Florian Hofhammer, Qinying Wang, Atri Bhattacharyya
― 5 min read
Automated tools revolutionize security assessments across digital landscapes.
Charilaos Skandylas, Mikael Asplund
― 6 min read
A look at secure authentication methods for smart urban environments.
Khan Reaz, Gerhard Wunder
― 10 min read
MAIDS offers proactive security for cloud data against unauthorized access.
Kishu Gupta, Deepika Saxena, Rishabh Gupta
― 6 min read
Learn how to protect industrial systems from cyber attacks with new security methods.
Arthur Amorim, Trevor Kann, Max Taylor
― 8 min read
Learn how cyber graphs help combat attacks effectively.
Vesa Kuikka, Lauri Pykälä, Tuomas Takko
― 5 min read
New method improves detection of audio deepfakes using innovative learning techniques.
Yujie Chen, Jiangyan Yi, Cunhang Fan
― 6 min read
Learn how flow exporters improve datasets for machine learning in intrusion detection.
Daniela Pinto, João Vitorino, Eva Maia
― 8 min read
A new tool helps train AI models to resist clever attacks in 3D.
Tommy Nguyen, Mehmet Ergezer, Christian Green
― 7 min read
Explore the evolving world of cybersecurity and its critical role in safety.
Shalini Saini, Anitha Chennamaneni, Babatunde Sawyerr
― 14 min read
Researchers develop a method to protect LLMs from harmful manipulations.
Minkyoung Kim, Yunha Kim, Hyeram Seo
― 6 min read
Discover how 5G technology connects our world while ensuring safety.
Joshua Groen, Simone Di Valerio, Imtiaz Karim
― 4 min read
A novel framework enhances IoT security using AI and homomorphic encryption.
Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang
― 7 min read
Examining privacy concerns surrounding the use of language models.
Tianchen Zhang, Gururaj Saileshwar, David Lie
― 5 min read
Explore how agents interact and make decisions in complex environments.
Chunyan Mu, Nima Motamed, Natasha Alechina
― 6 min read
FRIDAY improves deepfake detection by focusing on manipulation signs.
Younhun Kim, Myung-Joon Kwon, Wonjun Lee
― 4 min read
Using deception to confuse cyber attackers and protect valuable data.
Jason Landsborough, Neil C. Rowe, Thuy D. Nguyen
― 6 min read
Chatbots face risks from clever prompts that lead to harmful answers.
Nilanjana Das, Edward Raff, Manas Gaur
― 4 min read
Exploring how obfuscation techniques are reshaping the malware landscape with LLMs.
Seyedreza Mohseni, Seyedali Mohammadi, Deepa Tilwani
― 7 min read
Discover how vaults enhance privacy on the Tor network.
Humza Ikram, Rumaisa Habib, Muaz Ali
― 7 min read
Discover the cybersecurity challenges faced by autonomous vehicles and their solutions.
Amal Yousseef, Shalaka Satam, Banafsheh Saber Latibari
― 7 min read
Learn how Deep-JSCC keeps your images safe while sharing.
Mehdi Letafati, Seyyed Amirhossein Ameli Kalkhoran, Ecenaz Erdemir
― 7 min read
Learn how PoisonCatcher protects IIoT data from harmful intrusions.
Lisha Shuai, Shaofeng Tan, Nan Zhang
― 6 min read
Learn how machine learning techniques enhance web security against cyber threats.
Daniel Urda, Branly Martínez, Nuño Basurto
― 7 min read
CyberSentinel offers swift detection of threats in an ever-growing digital landscape.
Sankalp Mittal
― 5 min read
Learn how 'Privacy as Code' transforms software development for better security.
Nicolás E. Díaz Ferreyra, Sirine Khelifi, Nalin Arachchilage
― 7 min read
Learn how improved techniques enhance software vulnerability detection.
Devesh Sawant, Manjesh K. Hanawal, Atul Kabra
― 9 min read
Learn how QKD protects secrets in communication against cyber threats.
Maciej Ogrodnik, Adam Widomski, Dagmar Bruß
― 6 min read
Learn how system fingerprinting keeps your data safe from cyber threats.
Prakhar Paliwal, Arjun Sable, Manjesh K. Hanawal
― 6 min read
Discover how RIS and Quantum Key Distribution protect our digital secrets.
Sushil Kumar, Soumya P. Dash, Debasish Ghose
― 7 min read
Examining security risks and challenges of large language models in technology.
Herve Debar, Sven Dietrich, Pavel Laskov
― 7 min read
Face anti-spoofing technology needs clearer explanations and user trust.
Haoyuan Zhang, Xiangyu Zhu, Li Gao
― 5 min read
Temporal Convolutional Networks excel in detecting network intrusions amid rising cyber threats.
Rukmini Nazre, Rujuta Budke, Omkar Oak
― 7 min read
Discover how automated red teaming enhances AI security through creative challenges.
Alex Beutel, Kai Xiao, Johannes Heidecke
― 6 min read
FedGIG tackles privacy risks in graph data training.
Tianzhe Xiao, Yichen Li, Yining Qi
― 5 min read
Learn how federated learning enhances data privacy during AI model training.
Kunal Bhatnagar, Sagana Chattanathan, Angela Dang
― 6 min read
A new method enhances fraud detection using data efficiently.
Sheng Xiang, Mingzhi Zhu, Dawei Cheng
― 6 min read
Discover how SimilarGPT enhances smart contract security by detecting vulnerabilities efficiently.
Jango Zhang
― 7 min read
Discover how adversarial training boosts malware detection and keeps systems safe.
Hamid Bostani, Jacopo Cortellazzi, Daniel Arp
― 8 min read
Backdoor attacks can undermine text classification models, injecting bias and skewing results.
A. Dilara Yavuz, M. Emre Gursoy
― 8 min read