
Sign up to save your podcasts
Or


ACE: A Security Architecture for LLM-Integrated App Systems
Conformal-DP: Differential Privacy on Riemannian Manifolds via Conformal
DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable
Bipartite Randomized Response Mechanism for Local Differential Privacy
GiBy: A Giant-Step Baby-Step Classifier For Anomaly Detection In
Dual Explanations via Subgraph Matching for Malware Detection
New Capacity Bounds for PIR on Graph and Multigraph-Based Replicated
Quantifying the Noise of Structural Perturbations on Graph Adversarial
Mitigating the Structural Bias in Graph Adversarial Defenses
DP-SMOTE: Integrating Differential Privacy and Oversampling Technique to
Secure Coding with AI, From Creation to Inspection
Unlocking User-oriented Pages: Intention-driven Black-box Scanner for
did:self A registry-less DID method
Enhancing Vulnerability Reports with Automated and Augmented Description
Building Trust in Healthcare with Privacy Techniques: Blockchain in the
DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations
Protocol Dialects as Formal Patterns: A Composable Theory of Lingos --
A Novel Cipher for Enhancing MAVLink Security: Design, Security
The Hidden Risks of LLM-Generated Web Application Code: A
ReCIT: Reconstructing Full Private Data from Gradient in
VIMU: Effective Physics-based Realtime Detection and Recovery against
Mutual Information Minimization for Side-Channel Attack Resistance via
Efficient patient-centric EMR sharing block tree
Starfish: Rebalancing Multi-Party Off-Chain Payment Channels
TriniMark: A Robust Generative Speech Watermarking Method for
Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM
Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains
Robustness via Referencing: D
By KazuACE: A Security Architecture for LLM-Integrated App Systems
Conformal-DP: Differential Privacy on Riemannian Manifolds via Conformal
DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable
Bipartite Randomized Response Mechanism for Local Differential Privacy
GiBy: A Giant-Step Baby-Step Classifier For Anomaly Detection In
Dual Explanations via Subgraph Matching for Malware Detection
New Capacity Bounds for PIR on Graph and Multigraph-Based Replicated
Quantifying the Noise of Structural Perturbations on Graph Adversarial
Mitigating the Structural Bias in Graph Adversarial Defenses
DP-SMOTE: Integrating Differential Privacy and Oversampling Technique to
Secure Coding with AI, From Creation to Inspection
Unlocking User-oriented Pages: Intention-driven Black-box Scanner for
did:self A registry-less DID method
Enhancing Vulnerability Reports with Automated and Augmented Description
Building Trust in Healthcare with Privacy Techniques: Blockchain in the
DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations
Protocol Dialects as Formal Patterns: A Composable Theory of Lingos --
A Novel Cipher for Enhancing MAVLink Security: Design, Security
The Hidden Risks of LLM-Generated Web Application Code: A
ReCIT: Reconstructing Full Private Data from Gradient in
VIMU: Effective Physics-based Realtime Detection and Recovery against
Mutual Information Minimization for Side-Channel Attack Resistance via
Efficient patient-centric EMR sharing block tree
Starfish: Rebalancing Multi-Party Off-Chain Payment Channels
TriniMark: A Robust Generative Speech Watermarking Method for
Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM
Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains
Robustness via Referencing: D