Watermarking

TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features

Authors: Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang | Published: 2023-12-01 | Updated: 2025-03-21
URL analysis techniques
Watermarking
Malicious Website Detection

MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files

Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08
Watermarking
Malware Classification
Watermarking Settings for Medical Data

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30
Watermarking
Robustness Evaluation
Adversarial attack

Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29
Watermarking
Cryptography
Cryptography

De-identification of clinical free text using natural language processing: A systematic review of current approaches

Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28
Watermarking
Data Obfuscation
Watermarking Settings for Medical Data

Acoustic Cybersecurity: Exploiting Voice-Activated Systems

Authors: Forrest McKee, David Noever | Published: 2023-11-23
Watermarking
Cybersecurity
Speech Synthesis Technology

Embarrassingly Simple Text Watermarks

Authors: Ryoma Sato, Yuki Takezawa, Han Bao, Kenta Niwa, Makoto Yamada | Published: 2023-10-13
Watermarking
Steganography Techniques
Data Generation

A Semantic Invariant Robust Watermark for Large Language Models

Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19
Watermarking
Prompt Injection
Performance Evaluation

Adversarial Attacks on Combinatorial Multi-Armed Bandits

Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04
Algorithm
Watermarking
Machine Learning Method

Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset

Authors: Tharindu Lakshan Yasarathna, Lojenaa Navanesan, Simon Barque, Assanka Sayakkara, Nhien-An Le-Khac | Published: 2023-10-04
Watermarking
Cross-Device Analysis
Classification Pattern Analysis