A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption

Authors: Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong, Tanveer Khan, Antonis Michalas | Published: 2024-09-10

VoiceWukong: Benchmarking Deepfake Voice Detection

Authors: Ziwei Yan, Yanjie Zhao, Haoyu Wang | Published: 2024-09-10

On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective

Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10

Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research

Authors: Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday | Published: 2024-09-09

Using Large Language Models for Template Detection from Security Event Logs

Authors: Risto Vaarandi, Hayretdin Bahsi | Published: 2024-09-08 | Updated: 2025-03-23

2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures

Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20

MILE: A Mutation Testing Framework of In-Context Learning Systems

Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07

A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems

Authors: Nanda Rani, Bikash Saha, Sandeep Kumar Shukla | Published: 2024-09-07 | Updated: 2024-10-06

The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions

Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06

Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography

Authors: Pingzhi Li, Tianlong Chen, Junyu Liu | Published: 2024-09-06