We propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models. Falcon presents four main advantages-(i) It is …
Abstract Starting with electronic Bulletin Board Systems (BBSs), Usenet and email, the adoption and continued use of technology to facilitate the viewing and possession of child …
Social media platforms exacerbate trauma, and many users experience various forms of trauma unique to them (eg, doxxing and swatting). Trauma is the psychological and physical …
Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens …
Online hate and harassment poses a threat to the digital safety of people globally. In light of this risk, there is a need to equip as many people as possible with advice to stay safer …
European law has recognised the need for international cross-disciplinary collaboration to both identify, locate and safeguard victims and prevent, investigate and prosecute online …
Nowadays, the growing number of cases of possession and distribution of Child Sexual Abuse (CSA) material pose a significant challenge for Law Enforcement Agencies (LEAs). In …
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media, such as child sexual abuse material and extremist content. The predominant approach at …
Q Hao, L Luo, STK Jan, G Wang - … of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
Perceptual hashing is widely used to search or match similar images for digital forensics and cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well …