
Sign up to save your podcasts
Or


Graph of Effort: Quantifying Risk of AI Usage for Vulnerability
Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for the
Securing Satellite Communications: Real-Time Video Encryption Scheme on
Investigating The Implications of Cyberattacks Against Precision
From Head to Tail: Efficient Black-box Model Inversion Attack via
AI Agents in Cryptoland: Practical Attacks and No Silver Bullet
Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated
Doing More With Less: Mismatch-Based Risk-Limiting Audits
Fast Homomorphic Linear Algebra with BLAS
Temporal-Spatial Attention Network (TSAN) for DoS Attack Detection in
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language
Digital Asset Data Lakehouse. The concept based on a blockchain research
Are We There Yet? A Study of Decentralized Identity Applications
ALLMod: Exploring $\underline{\mathbf{A}}$rea-Efficiency of
Using Data Redundancy Techniques to Detect and Correct Errors in Logical
DroidTTP: Mapping Android Applications with TTP for Cyber Threat
Detecting LLM-Written Peer Reviews
AutoRedTeamer: Autonomous Red Teaming with Lifelong Attack Integration
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuGraph of Effort: Quantifying Risk of AI Usage for Vulnerability
Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for the
Securing Satellite Communications: Real-Time Video Encryption Scheme on
Investigating The Implications of Cyberattacks Against Precision
From Head to Tail: Efficient Black-box Model Inversion Attack via
AI Agents in Cryptoland: Practical Attacks and No Silver Bullet
Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated
Doing More With Less: Mismatch-Based Risk-Limiting Audits
Fast Homomorphic Linear Algebra with BLAS
Temporal-Spatial Attention Network (TSAN) for DoS Attack Detection in
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language
Digital Asset Data Lakehouse. The concept based on a blockchain research
Are We There Yet? A Study of Decentralized Identity Applications
ALLMod: Exploring $\underline{\mathbf{A}}$rea-Efficiency of
Using Data Redundancy Techniques to Detect and Correct Errors in Logical
DroidTTP: Mapping Android Applications with TTP for Cyber Threat
Detecting LLM-Written Peer Reviews
AutoRedTeamer: Autonomous Red Teaming with Lifelong Attack Integration
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>