
Sign up to save your podcasts
Or


How to evaluate control measures for LLM agents? A trajectory from today
Infinitely Divisible Noise for Differential Privacy: Nearly Optimal
A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the
Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs
Taming Double-Spending in Offline Payments with Reputation-Weighted Loan
Hollow Victory: How Malicious Proposers Exploit Validator Incentives in
Enhancing Smart Contract Vulnerability Detection in DApps Leveraging
SmartBugBert: BERT-Enhanced Vulnerability Detection for Smart Contract
Select Me! When You Need a Tool: A Black-box Text Attack on Tool
Out of Sight, Still at Risk: The Lifecycle of Transitive Vulnerabilities
Enhancing Trust in AI Marketplaces: Evaluating On-Chain Verification of
Teaching Data Science Students to Sketch Privacy Designs through
A High-Performance Curve25519 and Curve448 Unified Elliptic Curve
Are You Getting What You Pay For? Auditing Model Substitution in LLM
Generative Large Language Model usage in Smart Contract Vulnerability
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuHow to evaluate control measures for LLM agents? A trajectory from today
Infinitely Divisible Noise for Differential Privacy: Nearly Optimal
A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the
Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs
Taming Double-Spending in Offline Payments with Reputation-Weighted Loan
Hollow Victory: How Malicious Proposers Exploit Validator Incentives in
Enhancing Smart Contract Vulnerability Detection in DApps Leveraging
SmartBugBert: BERT-Enhanced Vulnerability Detection for Smart Contract
Select Me! When You Need a Tool: A Black-box Text Attack on Tool
Out of Sight, Still at Risk: The Lifecycle of Transitive Vulnerabilities
Enhancing Trust in AI Marketplaces: Evaluating On-Chain Verification of
Teaching Data Science Students to Sketch Privacy Designs through
A High-Performance Curve25519 and Curve448 Unified Elliptic Curve
Are You Getting What You Pay For? Auditing Model Substitution in LLM
Generative Large Language Model usage in Smart Contract Vulnerability
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>