Computer Sciences

Are human brains vulnerable to voice morphing attacks?

A recent research study led by the University of Alabama at Birmingham's Department of Computer Science investigated the neural underpinnings of voice security, and analyzed the differences in neural activities when users ...

Computer Sciences

AQM+: A new model for visual dialog question generation

Researchers at Clova AI Research, NAVER and LINE, have recently proposed a new framework called AQM+ that allows dialog systems to generate context-relevant questions and answers. Their model, outlined in a paper pre-published ...

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Computer Sciences

Securing the 'internet of things' in the quantum age

MIT researchers have developed a novel cryptography circuit that can be used to protect low-power "internet of things" (IoT) devices in the coming age of quantum computing.

Computer Sciences

Supercomputers can spot cyber threats

Identifying cybersecurity threats from raw internet data can be like locating a needle in a haystack. The amount of internet traffic data generated in a 48-hour period, for example, is too massive for one or even 100 laptops ...

page 1 from 59