サイバーarXiv

#150 サイバーarxiv (2024-10-28)


Listen Later

本日紹介した論文の一覧

  • On Homomorphic Encryption Based Strategies for Class Imbalance in

    Federated Learning
    http://arxiv.org/abs/2410.21192v1

  • Improving BB84 Efficiency with Delayed Measurement via Quantum Memory

    http://arxiv.org/abs/2410.21191v1

  • Unharmful Backdoor-based Client-side Watermarking in Federated Learning

    http://arxiv.org/abs/2410.21179v1

  • Privacy-Preserving for Images in Satellite Communications: A

    Comprehensive Review of Chaos-Based Encryption
    http://arxiv.org/abs/2410.21177v1

  • Differentially Private Learned Indexes

    http://arxiv.org/abs/2410.21164v1

  • Fingerprinting Browsers in Encrypted Communications

    http://arxiv.org/abs/2410.21101v1

  • Shallow Diffuse: Robust and Invisible Watermarking through

    Low-Dimensional Subspaces in Diffusion Models
    http://arxiv.org/abs/2410.21088v1

  • CTINEXUS: Leveraging Optimized LLM In-Context Learning for Constructing

    Cybersecurity Knowledge Graphs Under Data Scarcity
    http://arxiv.org/abs/2410.21060v1

  • Sorting Out the Bad Seeds: Automatic Classification of Cryptocurrency

    Abuse Reports
    http://arxiv.org/abs/2410.21041v1

  • CovFUZZ: Coverage-based fuzzer for 4G&5G protocols

    http://arxiv.org/abs/2410.20958v1

  • An RSA Cryptosystem over a Halidon Group Ring of a Dihedral Group

    http://arxiv.org/abs/2410.20912v1

  • Hacking Back the AI-Hacker: Prompt Injection as a Defense Against

    LLM-driven Cyberattacks
    http://arxiv.org/abs/2410.20911v1

  • Fakeium: A Dynamic Execution Environment for JavaScript Program Analysis

    http://arxiv.org/abs/2410.20862v1

  • ByteNet: Rethinking Multimedia File Fragment Classification through

    Visual Perspectives
    http://arxiv.org/abs/2410.20855v1

  • ADLM -- stega: A Universal Adaptive Token Selection Algorithm for

    Improving Steganographic Text Quality via Information Entropy
    http://arxiv.org/abs/2410.20825v1

  • FreqMark: Invisible Image Watermarking via Frequency Based Optimization

    in Latent Space
    http://arxiv.org/abs/2410.20824v1

  • Detecting Malicious Accounts in Web3 through Transaction Graph

    http://arxiv.org/abs/2410.20713v1

  • COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart

    Contracts
    http://arxiv.org/abs/2410.20712v1

  • Embedding with Large Language Models for Classification of HIPAA

    Safeguard Compliance Rules
    http://arxiv.org/abs/2410.20664v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu