サイバーarXiv

#188 サイバーarxiv (2025-04-22)


Listen Later

本日紹介した論文の一覧

  • Automated Static Vulnerability Detection via a Holistic Neuro-symbolic

    Approach
    http://arxiv.org/abs/2504.16057v1

  • How Private is Your Attention? Bridging Privacy with In-Context Learning

    http://arxiv.org/abs/2504.16000v1

  • Structural Properties of Non-Linear Cellular Automata: Permutivity,

    Surjectivity and Reversibility
    http://arxiv.org/abs/2504.15949v1

  • Adversarial Observations in Weather Forecasting

    http://arxiv.org/abs/2504.15942v1

  • Cryptoanalysis of a public key exchange based on circulant matrix over

    digital semiring
    http://arxiv.org/abs/2504.15880v1

  • Quantifying Source Speaker Leakage in One-to-One Voice Conversion

    http://arxiv.org/abs/2504.15822v1

  • EFFACT: A Highly Efficient Full-Stack FHE Acceleration Platform

    http://arxiv.org/abs/2504.15817v1

  • RRC Signaling Storm Detection in O-RAN

    http://arxiv.org/abs/2504.15738v1

  • Trusted Compute Units: A Framework for Chained Verifiable Computations

    http://arxiv.org/abs/2504.15717v1

  • A Time Series Analysis of Malware Uploads to Programming Language

    Ecosystems
    http://arxiv.org/abs/2504.15695v1

  • Trustworthy Decentralized Autonomous Machines: A New Paradigm in

    Automation Economy
    http://arxiv.org/abs/2504.15676v1

  • TrojanDam: Detection-Free Backdoor Defense in Federated Learning through

    Proactive Model Robustification utilizing OOD Data
    http://arxiv.org/abs/2504.15674v1

  • A Study On Mixup-inspired Augmentation Methods For Software

    Vulnerability Detection
    http://arxiv.org/abs/2504.15632v1

  • Exploring the Role of Large Language Models in Cybersecurity: A

    Systematic Survey
    http://arxiv.org/abs/2504.15622v1

  • Yet Another Diminishing Spark: Low-level Cyberattacks in the Israel-Gaza

    Conflict
    http://arxiv.org/abs/2504.15592v1

  • A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training

    and Deployment
    http://arxiv.org/abs/2504.15585v1

  • On the Price of Differential Privacy for Hierarchical Clustering

    http://arxiv.org/abs/2504.15580v1

  • DecETT: Accurate App Fingerprinting Under Encrypted Tunnels via Dual

    Decouple-based Semantic Enhancement
    http://arxiv.org/abs/2504.15565v1

  • T2VShield: Model-Agnostic Jailbreak Defense for Text-to-Video Models

    http://arxiv.org/abs/2504.15512v1

  • Guillotine: Hypervisors for Isolating Malicious AIs

    http://arxiv.org/abs/2504.15499v1

  • Scalable APT Malware Classification via Parallel Feature Extraction and

    GPU-Accelerated Learning
    http://arxiv.org/abs/2504.15497v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu