Results 1 to 10 of about 91,200 (106)
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security [PDF]
A transaction fee mechanism (TFM) is an essential component of a blockchain protocol. However, a systematic evaluation of the real-world impact of TFMs is still absent.
Yulin Liu +5 more
semanticscholar +1 more source
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar +1 more source
SoK: Explainable Machine Learning for Computer Security Applications [PDF]
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem +6 more
semanticscholar +1 more source
UNSW‐NB15 computer security dataset: Analysis through visualization [PDF]
Class imbalance refers to a major issue in data mining where data with unequal class distribution can deteriorate classification performance. Although it alone affects the performance of the classifiers, the joint‐effect of class imbalance and overlap is
Zeinab Zoghi, G. Serpen
semanticscholar +1 more source
Lessons Learned on Machine Learning for Computer Security
We identify 10 generic pitfalls that can affect the experimental outcome of AI driven solutions in computer security. We find that they are prevalent in the literature and provide recommendations for overcoming them in the future.
Daniel Arp +7 more
semanticscholar +1 more source
The importance of possessing hands-on skills in addition to theoretical knowledge for cybersecurity researchers and professionals cannot be overstated.
Stephen V. Cole
semanticscholar +1 more source
A Computer Security System for Cloud Computing Based on Encryption Technique
In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market ...
A. Daniel +4 more
semanticscholar +1 more source
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks [PDF]
Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models.
Daniel Kang +5 more
semanticscholar +1 more source
Application of Data Encryption Technology in Computer Network Information Security
In order to solve the partial optimization problems of the RSA algorithm in computer network security, a method of RSA algorithm optimization based on data encryption was proposed.
Lifeng Li
semanticscholar +1 more source
Automatic human activity recognition is one of the milestones of smart city surveillance projects. Human activity detection and recognition aim to identify the activities based on the observations that are being performed by the subject.
A. Rehman +4 more
semanticscholar +1 more source

