Securing the Loop: UAV-Based Systems Under Attack

This review explores how to protect sensitive data and maintain reliable control in unmanned aerial vehicle networks facing potential eavesdropping.

This review explores how to protect sensitive data and maintain reliable control in unmanned aerial vehicle networks facing potential eavesdropping.
New research offers a robust defense against attacks that aim to identify the origin of data used in collaborative machine learning.
A new approach reveals the structure of mirabolic Hecke algebras and their surprising connections to quantum groups and Hall-Littlewood functions.
Researchers have developed a novel system leveraging secure enclaves to continuously verify software authorship and runtime behavior, even under attack.

New research reveals how compressing the memory of large language models fundamentally alters their ability to access and utilize information.
Researchers have successfully linked molecular quantum emitters on a single chain, paving the way for brighter, more efficient quantum photonic devices.
A new analysis suggests quantum computation offers a path forward for tackling notoriously difficult problems in quantum chromodynamics, though stable hadron calculations remain within the reach of classical methods.

Researchers have developed a novel framework that dramatically accelerates large language model inference by focusing on optimizing the verification process.

A comprehensive review explores the evolving landscape of privacy-preserving architectures for the increasingly connected worlds of the Internet of Things and vehicular communications.
New research explores the challenges of creating perfectly secure one-time programs and proposes a pathway toward achieving a practical level of security known as ‘SEQ security’.