
Sign up to save your podcasts
Or


Vulnerability anti-patterns in Solidity: Increasing smart contracts
Technical Report: Toward Applying Quantum Computing to Network
Remote Timing Attacks on Efficient Language Model Inference
Towards Automated Penetration Testing: Introducing LLM Benchmark,
PAPILLON: PrivAcy Preservation from Internet-based and Local Language
Security and RAS in the Computing Continuum
Feature Homomorphism -- A Cryptographic Scheme For Data Verification
Inferentially-Private Private Information
On the Vulnerability of Text Sanitization
Beyond Yao's Millionaires: Secure Multi-Party Computation of
Publishing Neural Networks in Drug Discovery Might Compromise Training
Downtime Required for Bitcoin Quantum-Safety
Breaking ReAct Agents: Foot-in-the-Door Attack Will Get You In
Test-time Adversarial Defense with Opposite Adversarial Path and High
NodeOP: Optimizing Node Management for Decentralized Networks
Privacy-hardened and hallucination-resistant synthetic data generation
BETA: Automated Black-box Exploration for Timing Attacks in Processors
SoK: Dataset Copyright Auditing in Machine Learning Systems
OMLog: Online Log Anomaly Detection for Evolving System with
(Quantum) Indifferentiability and Pre-Computation
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuVulnerability anti-patterns in Solidity: Increasing smart contracts
Technical Report: Toward Applying Quantum Computing to Network
Remote Timing Attacks on Efficient Language Model Inference
Towards Automated Penetration Testing: Introducing LLM Benchmark,
PAPILLON: PrivAcy Preservation from Internet-based and Local Language
Security and RAS in the Computing Continuum
Feature Homomorphism -- A Cryptographic Scheme For Data Verification
Inferentially-Private Private Information
On the Vulnerability of Text Sanitization
Beyond Yao's Millionaires: Secure Multi-Party Computation of
Publishing Neural Networks in Drug Discovery Might Compromise Training
Downtime Required for Bitcoin Quantum-Safety
Breaking ReAct Agents: Foot-in-the-Door Attack Will Get You In
Test-time Adversarial Defense with Opposite Adversarial Path and High
NodeOP: Optimizing Node Management for Decentralized Networks
Privacy-hardened and hallucination-resistant synthetic data generation
BETA: Automated Black-box Exploration for Timing Attacks in Processors
SoK: Dataset Copyright Auditing in Machine Learning Systems
OMLog: Online Log Anomaly Detection for Evolving System with
(Quantum) Indifferentiability and Pre-Computation
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>