Dynamic vector commitments that enable local updates of opening proofs h...
We conduct the first large-scale user study examining how users interact...
Blockchains have seen growing traction with cryptocurrencies reaching a
...
ARM recently introduced a security feature called Memory Tagging Extensi...
Layer 2 systems have received increasing attention due to their potentia...
Blockchains are meant to be persistent: posted transactions are immutabl...
Messaging systems built on mesh networks consisting of smartphones
commu...
Onion addresses encode their own public key. They are thus
self-authenti...
This paper presents a new protocol for solving the private heavy-hitters...
We demonstrate that differentially private machine learning has not yet
...
Existing systems for metadata-hiding messaging that provide cryptographi...
We introduce a special class of supersingular curves over F_p^2,
charact...
Popular culture has contemplated societies of thinking machines for
gene...
In December 2015, a bounty emerged to establish both reliable communicat...
Defenses against adversarial examples, such as adversarial training, are...
SentiNet is a novel detection framework for physical attacks on neural
n...
Perceptual ad-blocking is a novel approach that uses visual cues to dete...
We present True2F, a system for second-factor authentication that provid...
Users regularly enter sensitive data, such as passwords, credit card num...
We describe a framework for constructing an efficient non-interactive ke...
As Machine Learning (ML) gets applied to security-critical or sensitive
...
Machine learning models are vulnerable to adversarial examples, inputs
m...
Adversarial examples are maliciously perturbed inputs designed to mislea...