サイバーarXiv

#131 サイバーarxiv (2024-09-12)


Listen Later

本日紹介した論文の一覧

  • LoRID: Low-Rank Iterative Diffusion for Adversarial Purification

    http://arxiv.org/abs/2409.08255v1

  • LLM Honeypot: Leveraging Large Language Models as Advanced Interactive

    Honeypot Systems
    http://arxiv.org/abs/2409.08234v1

  • Tweezers: A Framework for Security Event Detection via Event

    Attribution-centric Tweet Embedding
    http://arxiv.org/abs/2409.08221v1

  • A Secure Standard for NFT Fractionalization

    http://arxiv.org/abs/2409.08190v1

  • A Study on Asynchronous Vote-based Blockchains

    http://arxiv.org/abs/2409.08161v1

  • Towards a graph-based foundation model for network traffic analysis

    http://arxiv.org/abs/2409.08111v1

  • Securing Large Language Models: Addressing Bias, Misinformation, and

    Prompt Attacks
    http://arxiv.org/abs/2409.08087v1

  • Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks

    against RAG-based Inference in Scale and Severity Using Jailbreaking
    http://arxiv.org/abs/2409.08045v1

  • Mobile App Security Trends and Topics: An Examination of Questions From

    Stack Overflow
    http://arxiv.org/abs/2409.07926v1

  • Building a Cybersecurity Risk Metamodel for Improved Method and Tool

    Integration
    http://arxiv.org/abs/2409.07906v1

  • BLens: Contrastive Captioning of Binary Functions using Ensemble

    Embedding
    http://arxiv.org/abs/2409.07889v1

  • Collaboration Encouraging Quantum Secret Sharing Scheme with Seal

    Property
    http://arxiv.org/abs/2409.07863v1

  • A Toolchain for Assisting Migration of Software Executables Towards

    Post-Quantum Crytography
    http://arxiv.org/abs/2409.07852v1

  • A Spatiotemporal Stealthy Backdoor Attack against Cooperative

    Multi-Agent Deep Reinforcement Learning
    http://arxiv.org/abs/2409.07775v1

  • Efficient Privacy-Preserving KAN Inference Using Homomorphic Encryption

    http://arxiv.org/abs/2409.07751v1

  • LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking

    http://arxiv.org/abs/2409.07743v1

  • Eyes on the Phish(er): Towards Understanding Users' Email Processing

    Pattern and Mental Models in Phishing Detection
    http://arxiv.org/abs/2409.07717v1

  • Harnessing TI Feeds for Exploitation Detection

    http://arxiv.org/abs/2409.07709v1

  • A Deep Dive Into How Open-Source Project Maintainers Review and Resolve

    Bug Bounty Reports
    http://arxiv.org/abs/2409.07670v1

  • A Mixed-Methods Study of Open-Source Software Maintainers On

    Vulnerability Management and Platform Security Features
    http://arxiv.org/abs/2409.07669v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu