Randomness supports many critical functions in the field of machine lear...
While text-based machine learning models that operate on visual inputs o...
Stable Diffusion revolutionised image creation from descriptive text. GP...
In this paper we're going to explore the ways in which security proofs c...
Search engines are vulnerable to attacks against indexing and searching ...
Legislators and policymakers worldwide are debating options for suppress...
European lawmakers have ruled that users on different platforms should b...
Threat modelling is foundational to secure systems engineering and shoul...
Ian Levy and Crispin Robinson's position paper "Thoughts on child safety...
Early backdoor attacks against machine learning set off an arms race in
...
While vulnerability research often focuses on technical findings and
pos...
There has been substantial commentary on the role of cyberattacks,
hackt...
Since Bitcoin appeared in 2009, over 6,000 different cryptocurrency proj...
Online extremism is a growing and pernicious problem, and increasingly l...
We present a new type of attack in which source code is maliciously enco...
Our increasing reliance on digital technology for personal, economic, an...
Several years of research have shown that machine-learning systems are
v...
Inpainting is a learned interpolation technique that is based on generat...
Machine learning is vulnerable to a wide variety of different attacks. I...
Voice assistants are now ubiquitous and listen in on our everyday lives....
The wide adaption of 3D point-cloud data in safety-critical applications...
Value-function-based methods have long played an important role in
reinf...
In this paper, we present BatNet, a data transmission mechanism using
ul...
One of the most critical security protocol problems for humans is when y...
We improve the effectiveness of propagation- and linear-optimization-bas...
The high energy costs of neural network training and inference led to th...
Convolutional Neural Networks (CNNs) are deployed in more and more
class...
Rental scams are a type of advance fee fraud, in which the scammer tries...
Value-based reinforcement learning (RL) methods like Q-learning have sho...
Recent research on reinforcement learning has shown that trained agents ...
We present the first acoustic side-channel attack that recovers what use...
Convolutional Neural Networks (CNNs) are widely used to solve classifica...
The first six months of 2018 have seen cryptocurrency thefts of 761 mill...
We present an ideal mixed-integer programming (MIP) formulation for a
re...
Deep Neural Networks (DNNs) have become a powerful tool for a wide range...
As deep neural networks (DNNs) become widely used, pruned and quantised
...