サイバーarXiv

#110 サイバーarxiv (2024-08-05)


Listen Later

本日紹介した論文の一覧

  • Can Reinforcement Learning Unlock the Hidden Dangers in Aligned Large

    Language Models?
    http://arxiv.org/abs/2408.02651v1

  • Detection of Compromised Functions in a Serverless Cloud Environment

    http://arxiv.org/abs/2408.02641v1

  • Command-line Obfuscation Detection using Small Language Models

    http://arxiv.org/abs/2408.02637v1

  • Introducing a Comprehensive, Continuous, and Collaborative Survey of

    Intrusion Detection Datasets
    http://arxiv.org/abs/2408.02521v1

  • Practical Attacks against Black-box Code Completion Engines

    http://arxiv.org/abs/2408.02509v1

  • Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in

    Customized Large Language Models
    http://arxiv.org/abs/2408.02416v1

  • From Generalist to Specialist: Exploring CWE-Specific Vulnerability

    Detection
    http://arxiv.org/abs/2408.02329v1

  • XDC Network Assessment: Decentralization, Scalability and Security

    http://arxiv.org/abs/2408.02318v1

  • Quantum Clustering for Cybersecurity

    http://arxiv.org/abs/2408.02314v1

  • A Lean Transformer Model for Dynamic Malware Analysis and Detection

    http://arxiv.org/abs/2408.02313v1

  • On the Robustness of Malware Detectors to Adversarial Samples

    http://arxiv.org/abs/2408.02310v1

  • PROF: Protected Order Flow in a Profit-Seeking World

    http://arxiv.org/abs/2408.02303v1

  • SoK: Fighting Counterfeits with Cyber-Physical Synergy Based on

    Physically-Unclonable Identifiers of Paper Surface
    http://arxiv.org/abs/2408.02221v1

  • X.509 Information Security Certification Based on Post-Quantum

    Cryptography
    http://arxiv.org/abs/2408.02179v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu