
Sign up to save your podcasts
Or


LoRID: Low-Rank Iterative Diffusion for Adversarial Purification
LLM Honeypot: Leveraging Large Language Models as Advanced Interactive
Tweezers: A Framework for Security Event Detection via Event
A Secure Standard for NFT Fractionalization
A Study on Asynchronous Vote-based Blockchains
Towards a graph-based foundation model for network traffic analysis
Securing Large Language Models: Addressing Bias, Misinformation, and
Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks
Mobile App Security Trends and Topics: An Examination of Questions From
Building a Cybersecurity Risk Metamodel for Improved Method and Tool
BLens: Contrastive Captioning of Binary Functions using Ensemble
Collaboration Encouraging Quantum Secret Sharing Scheme with Seal
A Toolchain for Assisting Migration of Software Executables Towards
A Spatiotemporal Stealthy Backdoor Attack against Cooperative
Efficient Privacy-Preserving KAN Inference Using Homomorphic Encryption
LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking
Eyes on the Phish(er): Towards Understanding Users' Email Processing
Harnessing TI Feeds for Exploitation Detection
A Deep Dive Into How Open-Source Project Maintainers Review and Resolve
A Mixed-Methods Study of Open-Source Software Maintainers On
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuLoRID: Low-Rank Iterative Diffusion for Adversarial Purification
LLM Honeypot: Leveraging Large Language Models as Advanced Interactive
Tweezers: A Framework for Security Event Detection via Event
A Secure Standard for NFT Fractionalization
A Study on Asynchronous Vote-based Blockchains
Towards a graph-based foundation model for network traffic analysis
Securing Large Language Models: Addressing Bias, Misinformation, and
Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks
Mobile App Security Trends and Topics: An Examination of Questions From
Building a Cybersecurity Risk Metamodel for Improved Method and Tool
BLens: Contrastive Captioning of Binary Functions using Ensemble
Collaboration Encouraging Quantum Secret Sharing Scheme with Seal
A Toolchain for Assisting Migration of Software Executables Towards
A Spatiotemporal Stealthy Backdoor Attack against Cooperative
Efficient Privacy-Preserving KAN Inference Using Homomorphic Encryption
LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking
Eyes on the Phish(er): Towards Understanding Users' Email Processing
Harnessing TI Feeds for Exploitation Detection
A Deep Dive Into How Open-Source Project Maintainers Review and Resolve
A Mixed-Methods Study of Open-Source Software Maintainers On
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>