Rahalkar et al., 2022 - Google Patents
Sok: content moderation schemes in end-to-end encrypted systemsRahalkar et al., 2022
View PDF- Document ID
- 11401692173776432465
- Author
- Rahalkar C
- Virgaonkar A
- Publication year
- Publication venue
- arXiv preprint arXiv:2208.11147
External Links
Snippet
This paper aims to survey various techniques utilized for content moderation in end-to-end encryption systems. We assess the challenging aspect of content moderation: maintaining a safe platform while assuring user privacy. We study the unique features of some content …
- 238000000034 method 0 abstract description 36
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11722513B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
| US11044267B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
| US10715543B2 (en) | Detecting computer security risk based on previously observed communications | |
| US11323464B2 (en) | Artifact modification and associated abuse detection | |
| US10326779B2 (en) | Reputation-based threat protection | |
| Paradise et al. | Creation and management of social network honeypots for detecting targeted cyber attacks | |
| US11392691B1 (en) | System and method of securing e-mail against phishing and ransomware attack | |
| Kamara et al. | Outside looking in: Approaches to content moderation in end-to-end encrypted systems | |
| Oerlemans | Investigating cybercrime | |
| Patsakis et al. | Privacy and security for multimedia content shared on OSNs: issues and countermeasures | |
| JP7641409B2 (en) | E-mail security system for blocking and responding to targeted e-mail attacks and method of operation thereof | |
| Nabeel et al. | CADUE: Content-agnostic detection of unwanted Emails for enterprise security | |
| Rahalkar et al. | Sok: content moderation schemes in end-to-end encrypted systems | |
| Khan et al. | Introduction to email, web, and message forensics | |
| JP7641410B2 (en) | Email security system for blocking and responding to targeted email attacks that inspect for unauthorized email server access attacks and method of operation thereof | |
| Shukla et al. | Spoofed Email Based Cyberattack Detection Using Machine Learning | |
| Carle et al. | Network attack detection and defense–Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008 | |
| Rahalkar et al. | Reconciling Safety and Privacy: A Systematic Review of Moderation in End-to-End Encrypted Messaging | |
| Li et al. | Detecting and defending against sybil attacks in social networks: An overview | |
| Al Mazrouei | Designing Anti-spam Detection by Using Locality Sensitive Hash (LSH) | |
| Ganesh et al. | Prevention of DDoS Using AI | |
| Schwieter | Online Safety Regulation & Private Online Communications | |
| Vaid | Cyber Security Awareness, Challenges And Issues | |
| Faraj et al. | Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review | |
| Nulman | Rogue Certificate Detection Using Multi-point and AI Verification |