
Sign up to save your podcasts
Or


Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using
Mark Your LLM: Detecting the Misuse of Open-Source Large Language Models
Fundamental Limits of Hierarchical Secure Aggregation with Cyclic User
Cryptoanalysis of a tropical triad matrix semiring key exchange protocol
Lite-PoT: Practical Powers-of-Tau Setup Ceremony
Know Thy Judge: On the Robustness Meta-Evaluation of LLM Safety Judges
Runtime Backdoor Detection for Federated Learning via Representational
Privacy Preserving and Robust Aggregation for Cross-Silo Federated
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection
The Challenge of Identifying the Origin of Black-Box Large Language
Approaches to Quantum Remote Memory Attestation
Malware Detection at the Edge with Lightweight LLMs: A Performance
No Silver Bullet: Towards Demonstrating Secure Software Development for
A Study on Malicious Browser Extensions in 2025
Got Ya! -- Sensors for Identity Management Specific Security Situational
DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts
Qualitative In-Depth Analysis of GDPR Data Subject Access Requests and
Unsupervised anomaly detection on cybersecurity data streams: a case
UniNet: A Unified Multi-granular Traffic Modeling Framework for Network
LiteChain: A Lightweight Blockchain for Verifiable and Scalable
Controlled privacy leakage propagation throughout overlapping grouped
Robust Data Watermarking in Language Models by Injecting Fictitious
Deep Learning Aided Software Vulnerability Detection: A Survey
USBSnoop -- Revealing Device Activities via USB Congestions
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuEvaluation of Privacy-aware Support Vector Machine (SVM) Learning using
Mark Your LLM: Detecting the Misuse of Open-Source Large Language Models
Fundamental Limits of Hierarchical Secure Aggregation with Cyclic User
Cryptoanalysis of a tropical triad matrix semiring key exchange protocol
Lite-PoT: Practical Powers-of-Tau Setup Ceremony
Know Thy Judge: On the Robustness Meta-Evaluation of LLM Safety Judges
Runtime Backdoor Detection for Federated Learning via Representational
Privacy Preserving and Robust Aggregation for Cross-Silo Federated
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection
The Challenge of Identifying the Origin of Black-Box Large Language
Approaches to Quantum Remote Memory Attestation
Malware Detection at the Edge with Lightweight LLMs: A Performance
No Silver Bullet: Towards Demonstrating Secure Software Development for
A Study on Malicious Browser Extensions in 2025
Got Ya! -- Sensors for Identity Management Specific Security Situational
DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts
Qualitative In-Depth Analysis of GDPR Data Subject Access Requests and
Unsupervised anomaly detection on cybersecurity data streams: a case
UniNet: A Unified Multi-granular Traffic Modeling Framework for Network
LiteChain: A Lightweight Blockchain for Verifiable and Scalable
Controlled privacy leakage propagation throughout overlapping grouped
Robust Data Watermarking in Language Models by Injecting Fictitious
Deep Learning Aided Software Vulnerability Detection: A Survey
USBSnoop -- Revealing Device Activities via USB Congestions
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>