Skip to content

Research

Page 29 of 40

CONTEX-T: Contextual Exploitation of Encrypted Traffic for Device Fingerprinting via Transformer Time-Frequency Analysis

research note

CONTEX-T: Contextual Exploitation of Encrypted Traffic for Device Fingerprinting via Transformer Time-Frequency Analysis

·9 min read·Nazmul Islam, Mohammad Zulkernine

CONTEX-T studies a passive device-fingerprinting attack on encrypted IoT traffic, but instead of working directly in the packet-sequence or grayscale-image domain, it transforms packet-length windo…

researchiot-securitydevice-fingerprintingencrypted-traffictime-frequency-analysis

Read note → Source paper ↗

Large Language Model for OWL Proofs

research note

Large Language Model for OWL Proofs

·11 min read·Hui Yang, Jiaoyan Chen, Uli Sattler

This paper studies whether large language models can generate proof-faithful explanations over OWL ontologies, not just answer entailment queries

researchllm-reasoningontologyowldescription-logic

Read note → Source paper ↗

Telling Human and Machine Handwriting Apart

research note

Telling Human and Machine Handwriting Apart

·11 min read·Luis A. Leiva, Moises Diaz, Nuwan T. Attygalle et al.

This paper asks a security-oriented question: can we reliably distinguish genuine online handwriting from synthetic handwriting generated by modern models and classical motion synthesis? The author…

researchbehavioral-biometricscaptchareverse-turing-testhandwriting-detection

Read note → Source paper ↗

Articles are CC BY 4.0 — feel free to quote with attribution