サイバーarXiv

#192 サイバーarxiv (2025-04-29)


Listen Later

本日紹介した論文の一覧

  • ACE: A Security Architecture for LLM-Integrated App Systems

    http://arxiv.org/abs/2504.20984v1

  • Conformal-DP: Differential Privacy on Riemannian Manifolds via Conformal

    Transformation
    http://arxiv.org/abs/2504.20941v1

  • DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable

    Memory and Differential Information Flow Tracking assisted Processor Fuzzing
    http://arxiv.org/abs/2504.20934v1

  • Bipartite Randomized Response Mechanism for Local Differential Privacy

    http://arxiv.org/abs/2504.20926v1

  • GiBy: A Giant-Step Baby-Step Classifier For Anomaly Detection In

    Industrial Control Systems
    http://arxiv.org/abs/2504.20906v1

  • Dual Explanations via Subgraph Matching for Malware Detection

    http://arxiv.org/abs/2504.20904v1

  • New Capacity Bounds for PIR on Graph and Multigraph-Based Replicated

    Storage
    http://arxiv.org/abs/2504.20888v1

  • Quantifying the Noise of Structural Perturbations on Graph Adversarial

    Attacks
    http://arxiv.org/abs/2504.20869v1

  • Mitigating the Structural Bias in Graph Adversarial Defenses

    http://arxiv.org/abs/2504.20848v1

  • DP-SMOTE: Integrating Differential Privacy and Oversampling Technique to

    Preserve Privacy in Smart Homes
    http://arxiv.org/abs/2504.20827v1

  • Secure Coding with AI, From Creation to Inspection

    http://arxiv.org/abs/2504.20814v1

  • Unlocking User-oriented Pages: Intention-driven Black-box Scanner for

    Real-world Web Applications
    http://arxiv.org/abs/2504.20801v1

  • did:self A registry-less DID method

    http://arxiv.org/abs/2504.20767v1

  • Enhancing Vulnerability Reports with Automated and Augmented Description

    Summarization
    http://arxiv.org/abs/2504.20726v1

  • Building Trust in Healthcare with Privacy Techniques: Blockchain in the

    Cloud
    http://arxiv.org/abs/2504.20700v1

  • DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic

    Signal
    http://arxiv.org/abs/2504.20689v1

  • Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations

    in Ransomware Attacks
    http://arxiv.org/abs/2504.20681v1

  • Protocol Dialects as Formal Patterns: A Composable Theory of Lingos --

    Technical report
    http://arxiv.org/abs/2504.20637v1

  • A Novel Cipher for Enhancing MAVLink Security: Design, Security

    Analysis, and Performance Evaluation Using a Drone Testbed
    http://arxiv.org/abs/2504.20626v1

  • The Hidden Risks of LLM-Generated Web Application Code: A

    Security-Centric Evaluation of Code Generation Capabilities in Large Language
    Models
    http://arxiv.org/abs/2504.20612v1

  • ReCIT: Reconstructing Full Private Data from Gradient in

    Parameter-Efficient Fine-Tuning of Large Language Models
    http://arxiv.org/abs/2504.20570v1

  • VIMU: Effective Physics-based Realtime Detection and Recovery against

    Stealthy Attacks on UAVs
    http://arxiv.org/abs/2504.20569v1

  • Mutual Information Minimization for Side-Channel Attack Resistance via

    Optimal Noise Injection
    http://arxiv.org/abs/2504.20556v1

  • Efficient patient-centric EMR sharing block tree

    http://arxiv.org/abs/2504.20544v1

  • Starfish: Rebalancing Multi-Party Off-Chain Payment Channels

    http://arxiv.org/abs/2504.20536v1

  • TriniMark: A Robust Generative Speech Watermarking Method for

    Trinity-Level Attribution
    http://arxiv.org/abs/2504.20532v1

  • Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM

    Reasoning via Adaptive Token Compression
    http://arxiv.org/abs/2504.20493v1

  • Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains

    through Stealthy Code Changes
    http://arxiv.org/abs/2504.20485v1

  • Robustness via Referencing: D

    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu