
Sign up to save your podcasts
Or


Enhancing Reverse Engineering: Investigating and Benchmarking Large
Attention Masks Help Adversarial Attacks to Bypass Safety Detectors
Why quantum state verification cannot be both efficient and secure: a
Cloning Games, Black Holes and Cryptography
Differential Privacy Overview and Fundamental Techniques
Differentially Private Continual Learning using Pre-Trained Models
EarCapAuth: Biometric Method for Earables Using Capacitive Sensing
Verification of Neural Networks against Convolutional Perturbations via
Experimental Secure Multiparty Computation from Quantum Oblivious
Anonymous Public-Key Quantum Money and Quantum Voting
Game-Theoretic Defenses for Robust Conformal Prediction Against
Towards Secured Smart Grid 2.0: Exploring Security Threats, Protection
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuEnhancing Reverse Engineering: Investigating and Benchmarking Large
Attention Masks Help Adversarial Attacks to Bypass Safety Detectors
Why quantum state verification cannot be both efficient and secure: a
Cloning Games, Black Holes and Cryptography
Differential Privacy Overview and Fundamental Techniques
Differentially Private Continual Learning using Pre-Trained Models
EarCapAuth: Biometric Method for Earables Using Capacitive Sensing
Verification of Neural Networks against Convolutional Perturbations via
Experimental Secure Multiparty Computation from Quantum Oblivious
Anonymous Public-Key Quantum Money and Quantum Voting
Game-Theoretic Defenses for Robust Conformal Prediction Against
Towards Secured Smart Grid 2.0: Exploring Security Threats, Protection
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>