
Sign up to save your podcasts
Or


Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock
SoK: An Introspective Analysis of RPKI Security
The Bright Side of Timed Opacity
Quantifying Psychological Sophistication of Malicious Emails
On the Credibility of Backdoor Attacks Against Object Detectors in the
Understanding Data Reconstruction Leakage in Federated Learning from a
Query-Efficient Video Adversarial Attack with Stylized Logo
Towards Threat Modelling of IoT Context-Sharing Platforms
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuVerifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock
SoK: An Introspective Analysis of RPKI Security
The Bright Side of Timed Opacity
Quantifying Psychological Sophistication of Malicious Emails
On the Credibility of Backdoor Attacks Against Object Detectors in the
Understanding Data Reconstruction Leakage in Federated Learning from a
Query-Efficient Video Adversarial Attack with Stylized Logo
Towards Threat Modelling of IoT Context-Sharing Platforms
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>