By: Bhavya, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India, ABSTRACT Sensitive…
Category: Research
Agentic AI to Boost Network Resilience
By: Simar Atwal, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India mco23384@ccet.ac.in…
The Anatomy of an SQL Injection Attack
By: Sahil Kumar, Department of Computer Science Chandigarh College of Engg. & Tech. Chandigarh, India co24355@ccet.ac.in…
Red Teaming AI: How Ethical Hackers are Stress-Testing Generative Models
By: Shavi Bansal, Insights2Techinfo, India Email: shavi@insights2techinfo.com Abstract. Generative AI systems are everywhere in every field…
Post-Quantum Internet: Rethinking Trust in a Quantum World
By: Varsha Arya, Asia University Abstract Quantum computers are coming and they will EASILY break the…
Data Poisoning: The Silent Killer of AI Models
By: Akshat Gaurav, Asia University, Taiwan Abstract When the data used to train a model is…
Role of Natural Language Processing (NLP) in Email Phishing Detection
By: Rekarius; Asia University Abstract Phishing emails are one of the most common phishing attack vectors…
LLM-Based Phishing Detection: URL Phishing and Voice Phishing
By: Rekarius; Asia University Abstract Phishing is a cyberattack in which an attacker deceives users by…
Beyond the Code: A Systematic Review of Psychological Techniques in Phishing Attacks
By: RekaRius; Asia University Abstract Phishing attacks are a combination of technological sophistication and human psychological…
Improving Generalization in Phishing URL Detection: A Review of Multimodal BERT and BERT-PhishFinder Models
By: Rekarius, Asia University Abstract Phishing is a form of cyberattack aimed at gaining access to…
QR code Phishing URL Detection Based on Lightweight Deep Learning Model
By: Rekarius, Asia University Abstract QR Phishing (Quishing) represents a variant of phishing attacks in which…
Phishing Detection Based on Deep Learning in Cloud Environment
By: Rekarius Asia University Abstract Cloud computing services are also targets of phishing attacks. This paper…
Hybrid Deep Learning CNN-GRU and CNN-Bi-GRU Approaches to Smishing Detection
By: Rekarius Asia University Abstract Dependence on mobile device usage opens the door for cybercriminals to…
Deepfake Fraud in Banking and Finance: Exploiting AI for Identity Theft
By: C S Nakul Kalyan; Asia University Abstract This study focuses on the emerging threat of…
AI-Generated News Reports and Obituaries: Fabricating Reality Through Media
By; C S Nakul Kalyan; Asia University Abstract The rapid development of fake news production has…
Text-to-Video Synthesis: Creating Deepfakes from Words Alone
By: C S Nakul Kalyan, Asia University Abstract The development of generative AI models for text-to-video…
Synthetic Data Generation Using Deepfakes: Fueling AI with Fake Inputs
By: C S Nakul Kalyan; Asia University Abstract In this study, we will go through the…
AI-Generated Voices in Scam Calls: Phishing Gets a New Voice
By: C S Nakul Kalyan; Asia University Abstract The emergence of Artificial Intelligence (AI) has paved…
Voice-to-Voice Translation with Lip Sync: A New Era in Multilingual Deepfakes
By: C S Nakul Kalyan; Asia University Abstract In this study, we will propose a detection…
Scene and Background Manipulation in Deepfake Videos: Beyond Green Screens
By: C S Nakul Kalyan, Asia University Abstract Due to advancements in the digital world, technologies…