サイバーarXiv

#145 サイバーarxiv (2024-10-17)


Listen Later

本日紹介した論文の一覧

  • Private Counterfactual Retrieval

    http://arxiv.org/abs/2410.13812v1

  • An Exposition of Pathfinding Strategies Within Lightning Network Clients

    http://arxiv.org/abs/2410.13784v1

  • On the practicality of quantum sieving algorithms for the shortest

    vector problem
    http://arxiv.org/abs/2410.13759v1

  • DPFedBank: Crafting a Privacy-Preserving Federated Learning Framework

    for Financial Institutions with Policy Pillars
    http://arxiv.org/abs/2410.13753v1

  • Privacy-Preserving Decentralized AI with Confidential Computing

    http://arxiv.org/abs/2410.13752v1

  • Persistent Pre-Training Poisoning of LLMs

    http://arxiv.org/abs/2410.13722v1

  • On the Role of Attention Heads in Large Language Model Safety

    http://arxiv.org/abs/2410.13708v1

  • Three-Input Ciphertext Multiplication for Homomorphic Encryption

    http://arxiv.org/abs/2410.13545v1

  • A Construction of Evolving $3$-threshold Secret Sharing Scheme with

    Perfect Security and Smaller Share Size
    http://arxiv.org/abs/2410.13529v1

  • Breaking Bad: How Compilers Break Constant-Time~Implementations

    http://arxiv.org/abs/2410.13489v1

  • Advocate -- Trustworthy Evidence in Cloud Systems

    http://arxiv.org/abs/2410.13477v1

  • Trinity: A General Purpose FHE Accelerator

    http://arxiv.org/abs/2410.13405v1

  • Pricing Factors and TFMs for Scalability-Focused ZK-Rollups

    http://arxiv.org/abs/2410.13277v1

  • FRAG: Toward Federated Vector Database Management for Collaborative and

    Secure Retrieval-Augmented Generation
    http://arxiv.org/abs/2410.13272v1

  • Cyber Attacks Prevention Towards Prosumer-based EV Charging Stations: An

    Edge-assisted Federated Prototype Knowledge Distillation Approach
    http://arxiv.org/abs/2410.13260v1

  • Large Language Models are Easily Confused: A Quantitative Metric,

    Security Implications and Typological Analysis
    http://arxiv.org/abs/2410.13237v1

  • A Comprehensive Analysis of Routing Vulnerabilities and Defense

    Strategies in IoT Networks
    http://arxiv.org/abs/2410.13214v1

  • Revocable Encryption, Programs, and More: The Case of Multi-Copy

    Security
    http://arxiv.org/abs/2410.13163v1

  • Data Defenses Against Large Language Models

    http://arxiv.org/abs/2410.13138v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu