
Sign up to save your podcasts
Or


Watermarking Needs Input Repetition Masking
Accountable Liveness
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing
ARCeR: an Agentic RAG for the Automated Definition of Cyber Ranges
Overlapping Error Correction Codes on Two-Dimensional Structures
A Scalable Framework for Post-Quantum Authentication in Public Key
OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum
Secure Transfer Learning: Training Clean Models Against Backdoor in
The Evolution of Zero Trust Architecture (ZTA) from Concept to
zkFuzz: Foundation and Framework for Effective Fuzzing of Zero-Knowledge
Topological Analysis of Mixer Activities in the Bitcoin Network
MDHP-Net: Detecting an Emerging Time-exciting Threat in IVN
From Data Behavior to Code Analysis: A Multimodal Study on Security and
Advanced MST3 Encryption scheme based on generalized Suzuki 2-groups
The Digital Cybersecurity Expert: How Far Have We Come?
PCDiff: Proactive Control for Ownership Protection in Diffusion Models
From Cyber Threat to Data Shield: Constructing Provably Secure File
WalletProbe: A Testing Framework for Browser-based Cryptocurrency Wallet
Blockchain Application in Metaverse: A Review
Progent: Programmable Privilege Control for LLM Agents
Clustering and analysis of user behaviour in blockchain: A case study of
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuWatermarking Needs Input Repetition Masking
Accountable Liveness
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing
ARCeR: an Agentic RAG for the Automated Definition of Cyber Ranges
Overlapping Error Correction Codes on Two-Dimensional Structures
A Scalable Framework for Post-Quantum Authentication in Public Key
OpDiffer: LLM-Assisted Opcode-Level Differential Testing of Ethereum
Secure Transfer Learning: Training Clean Models Against Backdoor in
The Evolution of Zero Trust Architecture (ZTA) from Concept to
zkFuzz: Foundation and Framework for Effective Fuzzing of Zero-Knowledge
Topological Analysis of Mixer Activities in the Bitcoin Network
MDHP-Net: Detecting an Emerging Time-exciting Threat in IVN
From Data Behavior to Code Analysis: A Multimodal Study on Security and
Advanced MST3 Encryption scheme based on generalized Suzuki 2-groups
The Digital Cybersecurity Expert: How Far Have We Come?
PCDiff: Proactive Control for Ownership Protection in Diffusion Models
From Cyber Threat to Data Shield: Constructing Provably Secure File
WalletProbe: A Testing Framework for Browser-based Cryptocurrency Wallet
Blockchain Application in Metaverse: A Review
Progent: Programmable Privilege Control for LLM Agents
Clustering and analysis of user behaviour in blockchain: A case study of
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>