This paper examines energy-efficient approaches for AI in cybersecurity.
Pedro Pereira, Paulo Mendes, João Vitorino
― 7 min read
Cutting edge science explained simply
This paper examines energy-efficient approaches for AI in cybersecurity.
Pedro Pereira, Paulo Mendes, João Vitorino
― 7 min read
A look at how software vulnerabilities are identified, fixed, and shared.
Yi Wen Heng, Zeyang Ma, Haoxiang Zhang
― 5 min read
A deep look into the security risks of VS Code extensions.
Shehan Edirimannage, Charitha Elvitigala, Asitha Kottahachchi Kankanamge Don
― 7 min read
Engineers develop smart solutions to protect power grids from cyber threats.
Mansi Girdhar, Kuchan Park, Wencong Su
― 6 min read
Autoencoders enhance the detection of unusual user behavior in Okta logs.
Jericho Cain, Hayden Beadles, Karthik Venkatesan
― 7 min read
Learn how typing patterns can boost your online account safety.
Matheus Simão, Fabiano Prado, Omar Abdul Wahab
― 6 min read
Explore the rise of TinyML and the security issues it faces.
Jacob Huckelberry, Yuke Zhang, Allison Sansone
― 5 min read
CLEM helps threat hunters detect unusual activities in cyber networks.
Alaric Hartsock, Luiz Manella Pereira, Glenn Fink
― 7 min read
ProP offers an effective way to catch backdoor attacks on machine learning models.
Tao Ren, Qiongxiu Li
― 6 min read
AIMC chips show promise in defending AI from clever attacks.
Corey Lammie, Julian Büchel, Athanasios Vasilopoulos
― 5 min read
A look at safety cases to manage AI risks effectively.
Arthur Goemans, Marie Davidsen Buhl, Jonas Schuett
― 5 min read
Learn how Quantum Key Distribution keeps digital messages safe.
Arman Sykot, Mohammad Hasibur Rahman, Rifat Tasnim Anannya
― 7 min read
Learn how people are bypassing safety limits on advanced language models.
Piyush Jha, Arnav Arora, Vijay Ganesh
― 6 min read
A look into the strengths and weaknesses of CyberSecEval in code security.
Suhas Hariharan, Zainab Ali Majid, Jaime Raldua Veuthey
― 6 min read
Learn how cryptographic agility keeps our data secure in an evolving landscape.
Christian Näther, Daniel Herzinger, Jan-Philipp Steghöfer
― 7 min read
Examining strategies to improve deep learning's reliability against adversarial threats.
Rui Luo, Jie Bao, Zhixin Zhou
― 6 min read
O-RAN offers better coverage but faces security challenges that need addressing.
Mojdeh Karbalaee Motalleb, Chafika Benzaid, Tarik Taleb
― 6 min read
This article discusses protecting our personal data from language models.
Abhinav Java, Simra Shahid, Chirag Agarwal
― 5 min read
Trap-MID offers a clever way to protect data from hackers.
Zhen-Ting Liu, Shang-Tse Chen
― 7 min read
Examining the vulnerabilities and defenses of new AI models.
Yangyang Guo, Fangkai Jiao, Liqiang Nie
― 7 min read
Learn how VR technology can threaten your privacy.
Luoyu Mei, Ruofeng Liu, Zhimeng Yin
― 5 min read
This study assesses the reliability of features for phishing URL detection across datasets.
Maraz Mia, Darius Derakhshan, Mir Mehedi A. Pritom
― 6 min read
Learn how adversarial attacks manipulate deep learning through differentiable rendering techniques.
Matthew Hull, Chao Zhang, Zsolt Kira
― 6 min read
Discover methods for secure data analysis without compromising personal information.
Tianpei Lu, Bingsheng Zhang, Lichun Li
― 6 min read
Exploring the strengths of human versus automated code generation.
Md Abdul Awal, Mrigank Rochan, Chanchal K. Roy
― 6 min read
AI systems face new risks from edge-only attacks that mislead predictions.
Giulio Rossolini, Tommaso Baldi, Alessandro Biondi
― 8 min read
Learn how smart inverters impact power systems and raise cybersecurity concerns.
Pooja Aslami, Kejun Chen, Timothy M. Hansen
― 6 min read
A plugin safeguards federated learning models from harmful updates without compromising patient privacy.
Youngjoon Lee, Jinu Gong, Joonhyuk Kang
― 6 min read
This paper examines how timing differences in file systems can expose sensitive information.
Cheng Gu, Yicheng Zhang, Nael Abu-Ghazaleh
― 5 min read
Learn how adaptive methods improve control systems against cyber threats.
Weinan Gao, Zhong-Ping Jiang, Tianyou Chai
― 5 min read
This article discusses the safety and security issues in multimodal AI systems.
Ruoxi Sun, Jiamin Chang, Hammond Pearce
― 6 min read
FPGAs offer flexibility but introduce significant security risks that need to be addressed.
Endres Puschner, Maik Ender, Steffen Becker
― 6 min read
Discover how recent incidents highlight vulnerabilities in Linux packages.
Duc-Ly Vu, Trevor Dunlap, Karla Obermeier-Velazquez
― 7 min read
A new method helps protect language models from harmful backdoor attacks.
Nay Myat Min, Long H. Pham, Yige Li
― 6 min read
Examining the complexities of remote voting technologies for military members.
Andrew W. Appel, Philip B. Stark
― 8 min read
A new approach enhances patch retrieval for software vulnerabilities.
Xueqing Liu, Yuchen Xiong, Qiushi Liu
― 7 min read
A method to recognize fake faces while retaining knowledge of previous forgeries.
Jikang Cheng, Zhiyuan Yan, Ying Zhang
― 7 min read
Research explores language models’ ability to analyze social media interactions and tackle bullying.
Anique Tahir, Lu Cheng, Manuel Sandoval
― 7 min read
A new method enhances the safety of code generated by language models.
Xiangzhe Xu, Zian Su, Jinyao Guo
― 5 min read
A look at trust management in connected technology.
Yunfei Ge, Quanyan Zhu
― 7 min read