
Sign up to save your podcasts
Or


Towards practical secure delegated quantum computing with semi-classical
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification
Artemis: Efficient Commit-and-Prove SNARKs for zkML
A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts
CEF: Connecting Elaborate Federal QKD Networks
Optimal Offline ORAM with Perfect Security via Simple Oblivious Priority
Secure Control Systems for Autonomous Quadrotors against Cyber-Attacks
Log2graphs: An Unsupervised Framework for Log Anomaly Detection with
Practical Investigation on the Distinguishability of Longa's Atomic
Model-Checking the Implementation of Consent
Empowering Visual Artists with Tokenized Digital Assets with NFTs
NPAT Null-Space Projected Adversarial Training Towards Zero
On the second-order zero differential properties of several classes of
What to Consider When Considering Differential Privacy for Policy
GReDP: A More Robust Approach for Differential Privacy Training with
Relax DARTS: Relaxing the Constraints of Differentiable Architecture
Hard-Label Cryptanalytic Extraction of Neural Network Models
Combating Phone Scams with LLM-based Detection: Where Do We Stand?
Blockchain-Enabled IoV: Secure Communication and Trustworthy
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuTowards practical secure delegated quantum computing with semi-classical
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification
Artemis: Efficient Commit-and-Prove SNARKs for zkML
A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts
CEF: Connecting Elaborate Federal QKD Networks
Optimal Offline ORAM with Perfect Security via Simple Oblivious Priority
Secure Control Systems for Autonomous Quadrotors against Cyber-Attacks
Log2graphs: An Unsupervised Framework for Log Anomaly Detection with
Practical Investigation on the Distinguishability of Longa's Atomic
Model-Checking the Implementation of Consent
Empowering Visual Artists with Tokenized Digital Assets with NFTs
NPAT Null-Space Projected Adversarial Training Towards Zero
On the second-order zero differential properties of several classes of
What to Consider When Considering Differential Privacy for Policy
GReDP: A More Robust Approach for Differential Privacy Training with
Relax DARTS: Relaxing the Constraints of Differentiable Architecture
Hard-Label Cryptanalytic Extraction of Neural Network Models
Combating Phone Scams with LLM-based Detection: Where Do We Stand?
Blockchain-Enabled IoV: Secure Communication and Trustworthy
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>