
Sign up to save your podcasts
Or


ArtistAuditor: Auditing Artist Style Pirate in Text-to-Image Generation
GraphAttack: Exploiting Representational Blindspots in LLM Safety
Algorithms for the Shortest Vector Problem in $2$-dimensional Lattices,
SoK: Security of EMV Contactless Payment Systems
A Numerical Gradient Inversion Attack in Variational Quantum
Set You Straight: Auto-Steering Denoising Trajectories to Sidestep
MCP Guardian: A Security-First Layer for Safeguarding MCP-Based AI
Attack-Defense Trees with Offensive and Defensive Attributes (with
Adversary-Augmented Simulation for Fairness Evaluation and Defense in
Malicious Code Detection in Smart Contracts via Opcode Vectorization
Quantum Computing Supported Adversarial Attack-Resilient Autonomous
Privacy-Preserving CNN Training with Transfer Learning: Two Hidden
The Chronicles of Foundation AI for Forensics of Multi-Agent Provenance
Codes over Finite Ring $\mathbb{Z}_k$, MacWilliams Identity and Theta
Provable Secure Steganography Based on Adaptive Dynamic Sampling
Local Data Quantity-Aware Weighted Averaging for Federated Learning with
Anonymous Public Announcements
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuArtistAuditor: Auditing Artist Style Pirate in Text-to-Image Generation
GraphAttack: Exploiting Representational Blindspots in LLM Safety
Algorithms for the Shortest Vector Problem in $2$-dimensional Lattices,
SoK: Security of EMV Contactless Payment Systems
A Numerical Gradient Inversion Attack in Variational Quantum
Set You Straight: Auto-Steering Denoising Trajectories to Sidestep
MCP Guardian: A Security-First Layer for Safeguarding MCP-Based AI
Attack-Defense Trees with Offensive and Defensive Attributes (with
Adversary-Augmented Simulation for Fairness Evaluation and Defense in
Malicious Code Detection in Smart Contracts via Opcode Vectorization
Quantum Computing Supported Adversarial Attack-Resilient Autonomous
Privacy-Preserving CNN Training with Transfer Learning: Two Hidden
The Chronicles of Foundation AI for Forensics of Multi-Agent Provenance
Codes over Finite Ring $\mathbb{Z}_k$, MacWilliams Identity and Theta
Provable Secure Steganography Based on Adaptive Dynamic Sampling
Local Data Quantity-Aware Weighted Averaging for Federated Learning with
Anonymous Public Announcements
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>