New security protocol shields data from attackers during cloud-based computation
The technique leverages quantum properties of light to guarantee security while preserving the accuracy of a deep-learning model.
The technique leverages quantum properties of light to guarantee security while preserving the accuracy of a deep-learning model.
PhD student Mariel García-Montes researches the internet’s far-reaching impact on society, especially regarding privacy and young people.
Researchers developed an easy-to-use tool that enables an AI practitioner to find data that suits the purpose of their model, which could improve accuracy and reduce bias.
AI agents could soon become indistinguishable from humans online. Could “personhood credentials” protect people against digital imposters?
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
Doctoral student and recent MAD Design Fellow Jonathan Zong SM ’20 discusses a proposed framework to map how individuals can say “no” to technology misuses.
The ambient light sensors responsible for smart devices’ brightness adjustments can capture images of touch interactions like swiping and tapping for hackers.
Speranza system brings hope to users that the package they download is functional software, not malware.
With the PockEngine training method, machine-learning models can efficiently and continuously learn from user data on edge devices like smartphones.
The SecureLoop search tool efficiently identifies secure designs for hardware that can boost the performance of complex AI tasks, while requiring less energy.
Researchers use synthetic data to improve a model’s ability to grasp conceptual information, which could enhance automatic captioning and question-answering systems.
Researchers create a privacy technique that protects sensitive data while maintaining a machine-learning model’s performance.
The system analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information.
Cloud security and video forensics software have been transitioned to end users.
New research enables users to search for information without revealing their queries, based on a method that is 30 times faster than comparable prior techniques.