
Sign up to save your podcasts
Or


Poison-splat: Computation Cost Attack on 3D Gaussian Splatting
PP-GWAS: Privacy Preserving Multi-Site Genome-wide Association Studies
CCA-Secure Key-Aggregate Proxy Re-Encryption for Secure Cloud Storage
Unstable Unlearning: The Hidden Risk of Concept Resurgence in Diffusion
Efficient Quantum Pseudorandomness from Hamiltonian Phase States
Study of Attacks on the HHL Quantum Algorithm
APOLLO: A GPT-based tool to detect phishing emails and generate
Ormer: A Manipulation-resistant and Gas-efficient Blockchain Pricing
Deepfake detection in videos with multiple faces using
Towards Robust IoT Defense: Comparative Statistics of Attack Detection
Invisibility Cloak: Disappearance under Human Pose Estimation via
Provable Privacy Attacks on Trained Shallow Neural Networks
Secure Wearable Apps for Remote Healthcare Through Modern Cryptography
Careful About What App Promotion Ads Recommend! Detecting and Explaining
Detecting Training Data of Large Language Models via Expectation
RealVul: Can We Detect Vulnerabilities in Web Applications with LLM?
Adaptive Batch Size for Privately Finding Second-Order Stationary Points
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuPoison-splat: Computation Cost Attack on 3D Gaussian Splatting
PP-GWAS: Privacy Preserving Multi-Site Genome-wide Association Studies
CCA-Secure Key-Aggregate Proxy Re-Encryption for Secure Cloud Storage
Unstable Unlearning: The Hidden Risk of Concept Resurgence in Diffusion
Efficient Quantum Pseudorandomness from Hamiltonian Phase States
Study of Attacks on the HHL Quantum Algorithm
APOLLO: A GPT-based tool to detect phishing emails and generate
Ormer: A Manipulation-resistant and Gas-efficient Blockchain Pricing
Deepfake detection in videos with multiple faces using
Towards Robust IoT Defense: Comparative Statistics of Attack Detection
Invisibility Cloak: Disappearance under Human Pose Estimation via
Provable Privacy Attacks on Trained Shallow Neural Networks
Secure Wearable Apps for Remote Healthcare Through Modern Cryptography
Careful About What App Promotion Ads Recommend! Detecting and Explaining
Detecting Training Data of Large Language Models via Expectation
RealVul: Can We Detect Vulnerabilities in Web Applications with LLM?
Adaptive Batch Size for Privately Finding Second-Order Stationary Points
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>