サイバーarXiv

#171 サイバーarxiv (2025-03-20)


Listen Later

本日紹介した論文の一覧

  • Graph of Effort: Quantifying Risk of AI Usage for Vulnerability

    Assessment
    http://arxiv.org/abs/2503.16392v1

  • Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for the

    Food and Agriculture Sector
    http://arxiv.org/abs/2503.16292v1

  • Securing Satellite Communications: Real-Time Video Encryption Scheme on

    Satellite Payloads
    http://arxiv.org/abs/2503.16287v1

  • Investigating The Implications of Cyberattacks Against Precision

    Agricultural Equipment
    http://arxiv.org/abs/2503.16283v1

  • From Head to Tail: Efficient Black-box Model Inversion Attack via

    Long-tailed Learning
    http://arxiv.org/abs/2503.16266v1

  • AI Agents in Cryptoland: Practical Attacks and No Silver Bullet

    http://arxiv.org/abs/2503.16248v1

  • Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated

    Learning: A Step Towards Responsible AI
    http://arxiv.org/abs/2503.16233v1

  • Doing More With Less: Mismatch-Based Risk-Limiting Audits

    http://arxiv.org/abs/2503.16104v1

  • Fast Homomorphic Linear Algebra with BLAS

    http://arxiv.org/abs/2503.16080v1

  • Temporal-Spatial Attention Network (TSAN) for DoS Attack Detection in

    Network Traffic
    http://arxiv.org/abs/2503.16047v1

  • BadToken: Token-level Backdoor Attacks to Multi-modal Large Language

    Models
    http://arxiv.org/abs/2503.16023v1

  • Digital Asset Data Lakehouse. The concept based on a blockchain research

    center
    http://arxiv.org/abs/2503.15968v1

  • Are We There Yet? A Study of Decentralized Identity Applications

    http://arxiv.org/abs/2503.15964v1

  • ALLMod: Exploring $\underline{\mathbf{A}}$rea-Efficiency of

    $\underline{\mathbf{L}}$UT-based $\underline{\mathbf{L}}$arge Number
    $\underline{\mathbf{Mod}}$ular Reduction via Hybrid Workloads
    http://arxiv.org/abs/2503.15916v1

  • Using Data Redundancy Techniques to Detect and Correct Errors in Logical

    Data
    http://arxiv.org/abs/2503.15881v1

  • DroidTTP: Mapping Android Applications with TTP for Cyber Threat

    Intelligence
    http://arxiv.org/abs/2503.15866v1

  • Detecting LLM-Written Peer Reviews

    http://arxiv.org/abs/2503.15772v1

  • AutoRedTeamer: Autonomous Red Teaming with Lifelong Attack Integration

    http://arxiv.org/abs/2503.15754v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu