
Sign up to save your podcasts
Or


Silenzio: Secure Non-Interactive Outsourced MLP Training
Identity Control Plane: The Unifying Layer for Zero Trust Infrastructure
User Profiles: The Achilles' Heel of Web Browsers
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to
A Systematic Study on the Design of Odd-Sized Highly Nonlinear Boolean
Near-Term Pseudorandom and Pseudoresource Quantum States
STCL:Curriculum learning Strategies for deep learning image
Quantum Autoencoder for Multivariate Time Series Anomaly Detection
Proof of Useful Intelligence (PoUI): Blockchain Consensus Beyond Energy
From Randomized Response to Randomized Index: Answering Subset Counting
Wolves in the Repository: A Software Engineering Analysis of the XZ
Contrastive Learning for Continuous Touch-Based Authentication
A Comment on "e-PoS: Making PoS Decentralized and Fair"
Enhancing Variational Autoencoders with Smooth Robust Latent Encoding
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network
Automatically Generating Rules of Malicious Software Packages via Large
Developing a Blockchain-Based Secure Digital Contents Distribution
P$_\ell$-Kyber: Packing $\ell$ Plaintexts and Lattice Coding for Kyber
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuSilenzio: Secure Non-Interactive Outsourced MLP Training
Identity Control Plane: The Unifying Layer for Zero Trust Infrastructure
User Profiles: The Achilles' Heel of Web Browsers
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to
A Systematic Study on the Design of Odd-Sized Highly Nonlinear Boolean
Near-Term Pseudorandom and Pseudoresource Quantum States
STCL:Curriculum learning Strategies for deep learning image
Quantum Autoencoder for Multivariate Time Series Anomaly Detection
Proof of Useful Intelligence (PoUI): Blockchain Consensus Beyond Energy
From Randomized Response to Randomized Index: Answering Subset Counting
Wolves in the Repository: A Software Engineering Analysis of the XZ
Contrastive Learning for Continuous Touch-Based Authentication
A Comment on "e-PoS: Making PoS Decentralized and Fair"
Enhancing Variational Autoencoders with Smooth Robust Latent Encoding
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network
Automatically Generating Rules of Malicious Software Packages via Large
Developing a Blockchain-Based Secure Digital Contents Distribution
P$_\ell$-Kyber: Packing $\ell$ Plaintexts and Lattice Coding for Kyber
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>