サイバーarXiv

#103 サイバーarxiv (2024-07-18)


Listen Later

本日紹介した論文の一覧

  • Black-Box Opinion Manipulation Attacks to Retrieval-Augmented Generation

    of Large Language Models
    http://arxiv.org/abs/2407.13757v1

  • CellularLint: A Systematic Approach to Identify Inconsistent Behavior in

    Cellular Network Specifications
    http://arxiv.org/abs/2407.13742v1

  • Scalable Optimization for Locally Relevant Geo-Location Privacy

    http://arxiv.org/abs/2407.13725v1

  • Differential Privacy Mechanisms in Neural Tangent Kernel Regression

    http://arxiv.org/abs/2407.13621v1

  • SecScale: A Scalable and Secure Trusted Execution Environment for

    Servers
    http://arxiv.org/abs/2407.13572v1

  • PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local

    Differential Privacy
    http://arxiv.org/abs/2407.13532v1

  • A Security Assessment tool for Quantum Threat Analysis

    http://arxiv.org/abs/2407.13523v1

  • Three-State Information Hiding: Provably Secure Asymmetric Steganography

    http://arxiv.org/abs/2407.13499v1

  • Empirical Analysis of Sri Lankan Mobile Health Ecosystem: A Precursor to

    an Effective Stakeholder Engagement
    http://arxiv.org/abs/2407.13415v1

  • Time Synchronization of TESLA-enabled GNSS Receivers

    http://arxiv.org/abs/2407.13386v1

  • NeuroPlug: Plugging Side-Channel Leaks in NPUs using Space Filling

    Curves
    http://arxiv.org/abs/2407.13383v1

  • EarlyMalDetect: A Novel Approach for Early Windows Malware Detection

    Based on Sequences of API Calls
    http://arxiv.org/abs/2407.13355v1

  • A new approach to delegate signing rights to proxy signers using

    isogeny-based cryptography
    http://arxiv.org/abs/2407.13318v1

  • Intelligo ut Confido: Understanding, Trust and User Experience in

    Verifiable Receipt-Free E-Voting (long version)
    http://arxiv.org/abs/2407.13240v1

  • Quantum Key Distribution Routing Protocol in Quantum Networks: Overview

    and Challenges
    http://arxiv.org/abs/2407.13156v1

  • Preset-Voice Matching for Privacy Regulated Speech-to-Speech Translation

    Systems
    http://arxiv.org/abs/2407.13153v1

  • Using LLMs to Automate Threat Intelligence Analysis Workflows in

    Security Operation Centers
    http://arxiv.org/abs/2407.13093v1

  • Krait: A Backdoor Attack Against Graph Prompt Tuning

    http://arxiv.org/abs/2407.13068v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu