[go: up one dir, main page]

Rahalkar et al., 2022 - Google Patents

Sok: content moderation schemes in end-to-end encrypted systems

Rahalkar et al., 2022

View PDF
Document ID
11401692173776432465
Author
Rahalkar C
Virgaonkar A
Publication year
Publication venue
arXiv preprint arXiv:2208.11147

External Links

Snippet

This paper aims to survey various techniques utilized for content moderation in end-to-end encryption systems. We assess the challenging aspect of content moderation: maintaining a safe platform while assuring user privacy. We study the unique features of some content …
Continue reading at arxiv.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US11722513B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US11044267B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US10715543B2 (en) Detecting computer security risk based on previously observed communications
US11323464B2 (en) Artifact modification and associated abuse detection
US10326779B2 (en) Reputation-based threat protection
Paradise et al. Creation and management of social network honeypots for detecting targeted cyber attacks
US11392691B1 (en) System and method of securing e-mail against phishing and ransomware attack
Kamara et al. Outside looking in: Approaches to content moderation in end-to-end encrypted systems
Oerlemans Investigating cybercrime
Patsakis et al. Privacy and security for multimedia content shared on OSNs: issues and countermeasures
JP7641409B2 (en) E-mail security system for blocking and responding to targeted e-mail attacks and method of operation thereof
Nabeel et al. CADUE: Content-agnostic detection of unwanted Emails for enterprise security
Rahalkar et al. Sok: content moderation schemes in end-to-end encrypted systems
Khan et al. Introduction to email, web, and message forensics
JP7641410B2 (en) Email security system for blocking and responding to targeted email attacks that inspect for unauthorized email server access attacks and method of operation thereof
Shukla et al. Spoofed Email Based Cyberattack Detection Using Machine Learning
Carle et al. Network attack detection and defense–Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008
Rahalkar et al. Reconciling Safety and Privacy: A Systematic Review of Moderation in End-to-End Encrypted Messaging
Li et al. Detecting and defending against sybil attacks in social networks: An overview
Al Mazrouei Designing Anti-spam Detection by Using Locality Sensitive Hash (LSH)
Ganesh et al. Prevention of DDoS Using AI
Schwieter Online Safety Regulation & Private Online Communications
Vaid Cyber Security Awareness, Challenges And Issues
Faraj et al. Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review
Nulman Rogue Certificate Detection Using Multi-point and AI Verification