all InfoSec news
Topic: inputs
Are aligned neural networks adversarially aligned?
1 week, 4 days ago |
arxiv.org
Metric Differential Privacy at the User-Level
1 week, 4 days ago |
arxiv.org
How to Build a Phishing Playbook Part 4: Testing and Publishing
2 weeks, 5 days ago |
securityboulevard.com
Encore: fuzzing (noun) [Word Notes]
3 weeks, 4 days ago |
thecyberwire.com
Set-Based Training for Neural Network Verification
3 weeks, 5 days ago |
arxiv.org
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
1 month, 1 week ago |
arxiv.org
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models
1 month, 1 week ago |
arxiv.org
Exploring Backdoor Vulnerabilities of Chat Models
1 month, 2 weeks ago |
arxiv.org
Defending Against Indirect Prompt Injection Attacks With Spotlighting
1 month, 3 weeks ago |
arxiv.org
Malicious Security for Sparse Private Histograms
1 month, 3 weeks ago |
www.iacr.org
Day 1 of 30-Day .NET Challenge: Boolean Expressions
1 month, 4 weeks ago |
dev.to
USN-6675-1: ImageProcessing vulnerability
2 months, 1 week ago |
ubuntu.com
Ubuntu Security Notice USN-6672-1
2 months, 2 weeks ago |
packetstormsecurity.com
USN-6672-1: Node.js vulnerabilities
2 months, 2 weeks ago |
ubuntu.com
Verification of Neural Networks' Global Robustness
2 months, 2 weeks ago |
arxiv.org
The NISQ Complexity of Collision Finding
2 months, 2 weeks ago |
www.iacr.org
The NISQ Complexity of Collision Finding
2 months, 2 weeks ago |
arxiv.org
Adversarial Perturbations of Physical Signals
2 months, 2 weeks ago |
arxiv.org
SoK: Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge
2 months, 3 weeks ago |
arxiv.org
Exploiting Class Probabilities for Black-box Sentence-level Attacks
2 months, 3 weeks ago |
arxiv.org
Ubuntu Security Notice USN-6584-2
2 months, 3 weeks ago |
packetstormsecurity.com
USN-6584-2: Libspf2 vulnerabilities
2 months, 3 weeks ago |
ubuntu.com
Communication-Optimal Convex Agreement
3 months ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Are aligned neural networks adversarially aligned?
1 week, 4 days ago |
arxiv.org
Metric Differential Privacy at the User-Level
1 week, 4 days ago |
arxiv.org
How to Build a Phishing Playbook Part 4: Testing and Publishing
2 weeks, 5 days ago |
securityboulevard.com
Encore: fuzzing (noun) [Word Notes]
3 weeks, 4 days ago |
thecyberwire.com
Set-Based Training for Neural Network Verification
3 weeks, 5 days ago |
arxiv.org
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
1 month, 1 week ago |
arxiv.org
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models
1 month, 1 week ago |
arxiv.org
Exploring Backdoor Vulnerabilities of Chat Models
1 month, 2 weeks ago |
arxiv.org
Defending Against Indirect Prompt Injection Attacks With Spotlighting
1 month, 3 weeks ago |
arxiv.org
Malicious Security for Sparse Private Histograms
1 month, 3 weeks ago |
www.iacr.org
Day 1 of 30-Day .NET Challenge: Boolean Expressions
1 month, 4 weeks ago |
dev.to
USN-6675-1: ImageProcessing vulnerability
2 months, 1 week ago |
ubuntu.com
Ubuntu Security Notice USN-6672-1
2 months, 2 weeks ago |
packetstormsecurity.com
USN-6672-1: Node.js vulnerabilities
2 months, 2 weeks ago |
ubuntu.com
Verification of Neural Networks' Global Robustness
2 months, 2 weeks ago |
arxiv.org
The NISQ Complexity of Collision Finding
2 months, 2 weeks ago |
www.iacr.org
The NISQ Complexity of Collision Finding
2 months, 2 weeks ago |
arxiv.org
Adversarial Perturbations of Physical Signals
2 months, 2 weeks ago |
arxiv.org
SoK: Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge
2 months, 3 weeks ago |
arxiv.org
Exploiting Class Probabilities for Black-box Sentence-level Attacks
2 months, 3 weeks ago |
arxiv.org
Ubuntu Security Notice USN-6584-2
2 months, 3 weeks ago |
packetstormsecurity.com
USN-6584-2: Libspf2 vulnerabilities
2 months, 3 weeks ago |
ubuntu.com
Communication-Optimal Convex Agreement
3 months ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg
@ Hifield | Strasbourg, France
Lead Security Specialist
@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas
Consultant SOC / CERT H/F
@ Hifield | Sèvres, France