RETVec: Resilient and Efficient Text Vectorizer
Elie's Cybersecurity Blog
by
2M ago
This research study presented at NeurIPS 2024 introduces RETVec, a robust and multilingual text vectorizer that provides efficiency and resilience against typos and adversarial attacks for neural-based text processing ..read more
Visit website
Hybrid Post-Quantum Signatures in Hardware Security Keys
Elie's Cybersecurity Blog
by
2M ago
We introduce a hybrid digital signature scheme based on two building blocks: a classically-secure scheme, ECDSA, and a post-quantum secure one, Dilithium. Our hybrid scheme maintains the guarantees of each underlying building block even if the other one is broken, thus being resistant to classical and quantum attacks ..read more
Visit website
On the consequences of the AI workforce entering the market
Elie's Cybersecurity Blog
by
2M ago
Exploring the societal impact of the GenAI workforce entering the market ..read more
Visit website
How AI helps keeping Gmail inboxes malware free
Elie's Cybersecurity Blog
by
2M ago
This talk provides an overview of how Google uses AI to strengthen Gmail's document defenses and withstand attacks that evade traditional AVs ..read more
Visit website
It's common and a part of being a content creator: Understanding How Creators Experience and Cope with Hate and Harassment Online
Elie's Cybersecurity Blog
by
2M ago
This research study presented at CHI investigates the widespread online harassment faced by content creators, and highlights the need for better support and protection on social media platforms ..read more
Visit website
Designing Toxic Content Classification for a Diversity of Perspectives
Elie's Cybersecurity Blog
by
2M ago
This large-scale study demonstrates, by surveying 17280 participants, that existing toxicity classifiers fail to generalize to the diverse concerns of Internet users ..read more
Visit website
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Elie's Cybersecurity Blog
by
2M ago
We propose a comprehensive online hate and harassment taxonomy derived from analyzing over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs ..read more
Visit website
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
Elie's Cybersecurity Blog
by
2M ago
We analyze over 1.2 billion email-based phishing and malware attacks against Gmail users to understand which factors place a person at heightened risk of being targeted ..read more
Visit website
Why wouldn't someone think of democracy as a target? Security practices & challenges of people involved with U.S. political campaigns"
Elie's Cybersecurity Blog
by
2M ago
In this UX research we identify the key cybersecurity challenges faced by political campaigns as they face increasing threats from well-funded, sophisticated attackers, especially nation-states ..read more
Visit website
Hybrid Post-Quantum Signatures in Hardware Security Keys
Elie's Cybersecurity Blog
by
8M ago
We introduce a hybrid digital signature scheme based on two building blocks: a classically-secure scheme, ECDSA, and a post-quantum secure one, Dilithium. Our hybrid scheme maintains the guarantees of each underlying building block even if the other one is broken, thus being resistant to classical and quantum attacks ..read more
Visit website

Follow Elie's Cybersecurity Blog on FeedSpot

Continue with Google
Continue with Apple
OR