
Sign up to save your podcasts
Or


Black-Box Opinion Manipulation Attacks to Retrieval-Augmented Generation
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in
Scalable Optimization for Locally Relevant Geo-Location Privacy
Differential Privacy Mechanisms in Neural Tangent Kernel Regression
SecScale: A Scalable and Secure Trusted Execution Environment for
PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local
A Security Assessment tool for Quantum Threat Analysis
Three-State Information Hiding: Provably Secure Asymmetric Steganography
Empirical Analysis of Sri Lankan Mobile Health Ecosystem: A Precursor to
Time Synchronization of TESLA-enabled GNSS Receivers
NeuroPlug: Plugging Side-Channel Leaks in NPUs using Space Filling
EarlyMalDetect: A Novel Approach for Early Windows Malware Detection
A new approach to delegate signing rights to proxy signers using
Intelligo ut Confido: Understanding, Trust and User Experience in
Quantum Key Distribution Routing Protocol in Quantum Networks: Overview
Preset-Voice Matching for Privacy Regulated Speech-to-Speech Translation
Using LLMs to Automate Threat Intelligence Analysis Workflows in
Krait: A Backdoor Attack Against Graph Prompt Tuning
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuBlack-Box Opinion Manipulation Attacks to Retrieval-Augmented Generation
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in
Scalable Optimization for Locally Relevant Geo-Location Privacy
Differential Privacy Mechanisms in Neural Tangent Kernel Regression
SecScale: A Scalable and Secure Trusted Execution Environment for
PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local
A Security Assessment tool for Quantum Threat Analysis
Three-State Information Hiding: Provably Secure Asymmetric Steganography
Empirical Analysis of Sri Lankan Mobile Health Ecosystem: A Precursor to
Time Synchronization of TESLA-enabled GNSS Receivers
NeuroPlug: Plugging Side-Channel Leaks in NPUs using Space Filling
EarlyMalDetect: A Novel Approach for Early Windows Malware Detection
A new approach to delegate signing rights to proxy signers using
Intelligo ut Confido: Understanding, Trust and User Experience in
Quantum Key Distribution Routing Protocol in Quantum Networks: Overview
Preset-Voice Matching for Privacy Regulated Speech-to-Speech Translation
Using LLMs to Automate Threat Intelligence Analysis Workflows in
Krait: A Backdoor Attack Against Graph Prompt Tuning
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>