Audio Anti-Spoofing Detection: A Survey
17 hours ago |
arxiv.org
Security and Privacy Product Inclusion
17 hours ago |
arxiv.org
Set-Based Training for Neural Network Verification
1 day, 17 hours ago |
arxiv.org
Attacking Byzantine Robust Aggregation in High Dimensions
1 day, 17 hours ago |
arxiv.org
Physical Layer Authentication Using Information Reconciliation
1 day, 17 hours ago |
arxiv.org
Towards Unclonable Cryptography in the Plain Model
6 days, 17 hours ago |
arxiv.org
SMap: Internet-wide Scanning for Spoofing
6 days, 17 hours ago |
arxiv.org
Physical Layer Authentication Using Information Reconciliation
1 day, 17 hours ago |
arxiv.org
A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
1 day, 17 hours ago |
arxiv.org
Set-Based Training for Neural Network Verification
1 day, 17 hours ago |
arxiv.org
Transferability Ranking of Adversarial Examples
4 days, 17 hours ago |
arxiv.org
Don't Let MEV Slip: The Costs of Swapping on the Uniswap Protocol
5 days, 17 hours ago |
arxiv.org
Explainable Ponzi Schemes Detection on Ethereum
4 days, 17 hours ago |
arxiv.org
A survey on hardware-based malware detection approaches
4 days, 17 hours ago |
arxiv.org
Verifiable Privacy-Preserving Computing
6 days, 17 hours ago |
arxiv.org
Attacking Byzantine Robust Aggregation in High Dimensions
1 day, 17 hours ago |
arxiv.org
Items published with this topic over the last 90 days.
Latest
Audio Anti-Spoofing Detection: A Survey
17 hours ago |
arxiv.org
Security and Privacy Product Inclusion
17 hours ago |
arxiv.org
Set-Based Training for Neural Network Verification
1 day, 17 hours ago |
arxiv.org
Attacking Byzantine Robust Aggregation in High Dimensions
1 day, 17 hours ago |
arxiv.org
Physical Layer Authentication Using Information Reconciliation
1 day, 17 hours ago |
arxiv.org
Top (last 7 days)
Towards Unclonable Cryptography in the Plain Model
6 days, 17 hours ago |
arxiv.org
SMap: Internet-wide Scanning for Spoofing
6 days, 17 hours ago |
arxiv.org
Physical Layer Authentication Using Information Reconciliation
1 day, 17 hours ago |
arxiv.org
A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
1 day, 17 hours ago |
arxiv.org
Set-Based Training for Neural Network Verification
1 day, 17 hours ago |
arxiv.org
Transferability Ranking of Adversarial Examples
4 days, 17 hours ago |
arxiv.org
Don't Let MEV Slip: The Costs of Swapping on the Uniswap Protocol
5 days, 17 hours ago |
arxiv.org
Explainable Ponzi Schemes Detection on Ethereum
4 days, 17 hours ago |
arxiv.org
A survey on hardware-based malware detection approaches
4 days, 17 hours ago |
arxiv.org
Verifiable Privacy-Preserving Computing
6 days, 17 hours ago |
arxiv.org
Attacking Byzantine Robust Aggregation in High Dimensions
1 day, 17 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Advisory Red Consultant
@ Security Risk Advisors | Philadelphia, Pennsylvania, United States
Cyber Business Transformation Change Analyst
@ National Grid | Warwick, GB, CV34 6DA
Cyber Security Analyst
@ Ford Motor Company | Mexico City, MEX, Mexico
Associate Administrator, Cyber Security Governance (Fort Myers)
@ Millennium Physician Group | Fort Myers, FL, United States
Embedded GSOC Lead Operator, Events
@ Sibylline Ltd | Seattle, WA, United States