サイバーarXiv

#129 サイバーarxiv (2024-09-10)


Listen Later

本日紹介した論文の一覧

  • How to Verify Any (Reasonable) Distribution Property: Computationally

    Sound Argument Systems for Distributions
    http://arxiv.org/abs/2409.06594v1

  • Advancing Android Privacy Assessments with Automation

    http://arxiv.org/abs/2409.06564v1

  • ChatGPT's Potential in Cryptography Misuse Detection: A Comparative

    Analysis with Static Analysis Tools
    http://arxiv.org/abs/2409.06561v1

  • Adversary Resilient Learned Bloom Filters

    http://arxiv.org/abs/2409.06556v1

  • DroneXNFT: An NFT-Driven Framework for Secure Autonomous UAV Operations

    and Flight Data Management
    http://arxiv.org/abs/2409.06507v1

  • Ransomware Detection Using Machine Learning in the Linux Kernel

    http://arxiv.org/abs/2409.06452v1

  • HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training

    Data
    http://arxiv.org/abs/2409.06446v1

  • A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving

    Machine Learning Through Hybrid Homomorphic Encryption
    http://arxiv.org/abs/2409.06422v1

  • The Impact of SBOM Generators on Vulnerability Assessment in Python: A

    Comparison and a Novel Approach
    http://arxiv.org/abs/2409.06390v1

  • SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and

    Security Attacks
    http://arxiv.org/abs/2409.06360v1

  • VoiceWukong: Benchmarking Deepfake Voice Detection

    http://arxiv.org/abs/2409.06348v1

  • The Black-Box Simulation Barrier Persists in a Fully Quantum World

    http://arxiv.org/abs/2409.06317v1

  • Catch Me if You Can: Detecting Unauthorized Data Use in Deep Learning

    Models
    http://arxiv.org/abs/2409.06280v1

  • Differential Degradation Vulnerabilities in Censorship Circumvention

    Systems
    http://arxiv.org/abs/2409.06247v1

  • BACKRUNNER: Mitigating Smart Contract Attacks in the Real World

    http://arxiv.org/abs/2409.06213v1

  • Watching TV with the Second-Party: A First Look at Automatic Content

    Recognition Tracking in Smart TVs
    http://arxiv.org/abs/2409.06203v1

  • Responsible Blockchain: STEADI Principles and the Actor-Network

    Theory-based Development Methodology (ANT-RDM)
    http://arxiv.org/abs/2409.06179v1

  • On the Weaknesses of Backdoor-based Model Watermarking: An

    Information-theoretic Perspective
    http://arxiv.org/abs/2409.06130v1

  • Conditional Encryption with Applications to Secure Personalized Password

    Typo Correction
    http://arxiv.org/abs/2409.06128v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu