
Sign up to save your podcasts
Or


SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols
State Machine Mutation-based Testing Framework for Wireless
CONClave -- Secure and Robust Cooperative Perception for CAVs Using
Jäger: Automated Telephone Call Traceback
Obsidian: Cooperative State-Space Exploration for Performant Inference
Boosting Certificate Robustness for Time Series Classification with
Does the Vulnerability Threaten Our Projects? Automated Vulnerable API
RTFM: How hard are IoT platform providers making it for their
Alignment-Aware Model Extraction Attacks on Large Language Models
SoK: Bitcoin Layer Two (L2)
AdvSecureNet: A Python Toolkit for Adversarial Machine Learning
Advancing Cyber Incident Timeline Analysis Through Rule Based AI and
ResiLogic: Leveraging Composability and Diversity to Design Fault and
Adversarial Attacks on Machine Learning-Aided Visualizations
Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep
Learning Privacy-Preserving Student Networks via
Dissecting Payload-based Transaction Phishing on Ethereum
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuSpecMon: Modular Black-Box Runtime Monitoring of Security Protocols
State Machine Mutation-based Testing Framework for Wireless
CONClave -- Secure and Robust Cooperative Perception for CAVs Using
Jäger: Automated Telephone Call Traceback
Obsidian: Cooperative State-Space Exploration for Performant Inference
Boosting Certificate Robustness for Time Series Classification with
Does the Vulnerability Threaten Our Projects? Automated Vulnerable API
RTFM: How hard are IoT platform providers making it for their
Alignment-Aware Model Extraction Attacks on Large Language Models
SoK: Bitcoin Layer Two (L2)
AdvSecureNet: A Python Toolkit for Adversarial Machine Learning
Advancing Cyber Incident Timeline Analysis Through Rule Based AI and
ResiLogic: Leveraging Composability and Diversity to Design Fault and
Adversarial Attacks on Machine Learning-Aided Visualizations
Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep
Learning Privacy-Preserving Student Networks via
Dissecting Payload-based Transaction Phishing on Ethereum
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>