
Sign up to save your podcasts
Or


Security Assessment of Mobile Banking Apps in West African Economic and
Quantum Cryptography: an overview of Quantum Key Distribution
Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
WiP: Towards a Secure SECP256K1 for Crypto Wallets: Hardware
Two Sides of the Same Coin: Large-scale Measurements of Builder and
ROBIN: Robust and Invisible Watermarks for Diffusion Models with
FedRISE: Rating Induced Sign Election of Gradients for Byzantine
A Novel Access Control and Privacy-Enhancing Approach for Models in Edge
Attribute-Based Encryption With Payable Outsourced Decryption Using
MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue
Deferred Poisoning: Making the Model More Vulnerable via Hessian
Optimal Defenses Against Gradient Reconstruction Attacks
NeurIPS 2023 Competition: Privacy Preserving Federated Learning Document
Physical Layer Deception in OFDM Systems
Can Graph Neural Networks Expose Training Data Properties? An Efficient
Learning Constant-Depth Circuits in Malicious Noise Models
Towards Personalized Federated Learning via Comprehensive Knowledge
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuSecurity Assessment of Mobile Banking Apps in West African Economic and
Quantum Cryptography: an overview of Quantum Key Distribution
Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
WiP: Towards a Secure SECP256K1 for Crypto Wallets: Hardware
Two Sides of the Same Coin: Large-scale Measurements of Builder and
ROBIN: Robust and Invisible Watermarks for Diffusion Models with
FedRISE: Rating Induced Sign Election of Gradients for Byzantine
A Novel Access Control and Privacy-Enhancing Approach for Models in Edge
Attribute-Based Encryption With Payable Outsourced Decryption Using
MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue
Deferred Poisoning: Making the Model More Vulnerable via Hessian
Optimal Defenses Against Gradient Reconstruction Attacks
NeurIPS 2023 Competition: Privacy Preserving Federated Learning Document
Physical Layer Deception in OFDM Systems
Can Graph Neural Networks Expose Training Data Properties? An Efficient
Learning Constant-Depth Circuits in Malicious Noise Models
Towards Personalized Federated Learning via Comprehensive Knowledge
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>