
Sign up to save your podcasts
Or


A Refreshment Stirred, Not Shaken (III): Can Swapping Be Differentially
A Review on Privacy in DAG-Based DLTs
Extending the ElGamal Cryptosystem to the Third Group of Units of
C2RUST-BENCH: A Minimized, Representative Dataset for C-to-Rust
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing
Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle
SOLIDO: A Robust Watermarking Method for Speech Synthesis via Low-Rank
Gaussian Shading++: Rethinking the Realistic Deployment Challenge of
Quantum pseudoresources imply cryptography
Dual Utilization of Perturbation for Stream Data Publication under Local
aiXamine: LLM Safety and Security Simplified
A Security Framework for General Blockchain Layer 2 Protocols
Parallel Kac's Walk Generates PRU
Zero Day Malware Detection with Alpha: Fast DBI with Transformer Models
Towards Fuzzing Zero-Knowledge Proof Circuits (Short Paper)
IoT-AMLHP: Aligned Multimodal Learning of Header-Payload Representations
Protecting Your Voice: Temporal-aware Robust Watermarking
What Lurks Within? Concept Auditing for Shared Diffusion Models at Scale
CSI2Dig: Recovering Digit Content from Smartphone Loudspeakers Using
vApps: Verifiable Applications at Internet Scale
Intent-Aware Authorization for Zero Trust CI/CD
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuA Refreshment Stirred, Not Shaken (III): Can Swapping Be Differentially
A Review on Privacy in DAG-Based DLTs
Extending the ElGamal Cryptosystem to the Third Group of Units of
C2RUST-BENCH: A Minimized, Representative Dataset for C-to-Rust
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing
Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle
SOLIDO: A Robust Watermarking Method for Speech Synthesis via Low-Rank
Gaussian Shading++: Rethinking the Realistic Deployment Challenge of
Quantum pseudoresources imply cryptography
Dual Utilization of Perturbation for Stream Data Publication under Local
aiXamine: LLM Safety and Security Simplified
A Security Framework for General Blockchain Layer 2 Protocols
Parallel Kac's Walk Generates PRU
Zero Day Malware Detection with Alpha: Fast DBI with Transformer Models
Towards Fuzzing Zero-Knowledge Proof Circuits (Short Paper)
IoT-AMLHP: Aligned Multimodal Learning of Header-Payload Representations
Protecting Your Voice: Temporal-aware Robust Watermarking
What Lurks Within? Concept Auditing for Shared Diffusion Models at Scale
CSI2Dig: Recovering Digit Content from Smartphone Loudspeakers Using
vApps: Verifiable Applications at Internet Scale
Intent-Aware Authorization for Zero Trust CI/CD
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>