FernUniversität works on open LLM infrastructure to support education.
― 4 min read
Cutting edge science explained simply
FernUniversität works on open LLM infrastructure to support education.
― 4 min read
A new algorithm enhances data exchange among vehicles while ensuring privacy.
― 7 min read
Examining the security of SHA-256 and recent collision finding techniques.
― 6 min read
New hybrid methods improve efficiency in integer factorization for cryptography.
― 6 min read
A novel approach to ensure privacy while maintaining text utility in NLP models.
― 7 min read
Quantum communication offers secure data transmission using quantum mechanics principles.
― 5 min read
A framework for formal verification of oblivious algorithms to protect sensitive data.
― 5 min read
A method for compressing images while ensuring their security during transmission.
― 4 min read
A new system enhances data processing while ensuring user privacy and efficient resource use.
― 6 min read
Researchers examine methods to secure sensitive information in text classification models.
― 6 min read
Exploring backdoor attacks and graph reduction methods in GNNs.
― 5 min read
A look into how quantum mechanics enhances secure information sharing.
― 5 min read
This article discusses a new method for protecting confidential data in message-passing applications.
― 8 min read
An overview of privacy risks and strategies for responsible AI use.
― 5 min read
Examining membership inference attacks on time-series forecasting models in healthcare.
― 6 min read
A look into secure communication methods for UAVs amidst rising threats.
― 6 min read
Exploring how blockchain can enhance trust and efficiency in clinical trials.
― 6 min read
This study examines watermarking methods for machine-generated text and their effectiveness against removal attacks.
― 8 min read
Using UAVs for secure communication during emergencies.
― 6 min read
A framework for using language models directly on smartphones for secure, personalized services.
― 6 min read
Examining vulnerabilities in clinical language models and their impact on patient safety.
― 7 min read
Learn how to secure CSV data with digital signatures.
― 5 min read
Exploring the importance of security and user feedback in e-payment apps.
― 5 min read
Examining the vulnerabilities of lightweight models against adversarial attacks.
― 5 min read
New insights into robust classifiers enhance their ability to resist attacks.
― 7 min read
A new framework enhances security and efficiency in distributed machine learning.
― 10 min read
BoostCom speeds up comparison tasks in FHE, improving efficiency for encrypted data.
― 5 min read
This new method improves communication safety through adjustable antennas in wireless networks.
― 5 min read
A look at federated learning combining differential privacy and blockchain for data security.
― 6 min read
A new framework controls in-context learning to prevent misuse in AI models.
― 8 min read
This study reveals how non-adversarial attacks impact knowledge graph embedding algorithms.
― 7 min read
A practical design to secure LLM applications based on user roles.
― 5 min read
A unified TEE design improves CPU and NPU collaboration for secure computing.
― 6 min read
Introducing HO-FMN for better evaluation of machine learning model robustness against adversarial attacks.
― 6 min read
Exploring the benefits and developments in quantum communication systems using entanglement.
― 5 min read
This article discusses the significance of hashing algorithms in blockchain technology.
― 5 min read
Examining the vulnerability of neural networks to small input changes.
― 7 min read
Research unveils new algorithms enhancing RSA encryption security through better factorization techniques.
― 5 min read
A new method aims to secure semi-supervised learning against backdoor threats.
― 6 min read
New method enhances adversarial attacks on 3D models using diffusion techniques.
― 6 min read