Computer Sciences

Predator and prey in cyber stasis

In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking ...

Machine learning & AI

Improving security as artificial intelligence moves to smartphones

Smartphones, security cameras, and speakers are just a few of the devices that will soon be running more artificial intelligence software to speed up image- and speech-processing tasks. A compression technique known as quantization ...

Computer Sciences

Are human brains vulnerable to voice morphing attacks?

A recent research study led by the University of Alabama at Birmingham's Department of Computer Science investigated the neural underpinnings of voice security, and analyzed the differences in neural activities when users ...

page 35 from 40