Watermarking

Malicious code detection in android: the role of sequence characteristics and disassembling methods

Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02
LSTM Model Performance Evaluation
Watermarking
Malware Classification

Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting

Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05
Watermarking
Machine Unlearning
Watermark Evaluation

TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features

Authors: Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang | Published: 2023-12-01 | Updated: 2025-03-21
URL analysis techniques
Watermarking
Malicious Website Detection

MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files

Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08
Watermarking
Malware Classification
Watermarking Settings for Medical Data

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30
Watermarking
Robustness Evaluation
Adversarial attack

Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29
Watermarking
Cryptography
Cryptography

De-identification of clinical free text using natural language processing: A systematic review of current approaches

Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28
Watermarking
Data Obfuscation
Watermarking Settings for Medical Data

Acoustic Cybersecurity: Exploiting Voice-Activated Systems

Authors: Forrest McKee, David Noever | Published: 2023-11-23
Watermarking
Cybersecurity
Speech Synthesis Technology

Embarrassingly Simple Text Watermarks

Authors: Ryoma Sato, Yuki Takezawa, Han Bao, Kenta Niwa, Makoto Yamada | Published: 2023-10-13
Watermarking
Steganography Techniques
Data Generation

A Semantic Invariant Robust Watermark for Large Language Models

Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19
Watermarking
Prompt Injection
Performance Evaluation