
Sign up to save your podcasts
Or


Securing WiFi Fingerprint-based Indoor Localization Systems from
SecReEvalBench: A Multi-turned Security Resilience Evaluation Benchmark
Security through the Eyes of AI: How Visualization is Shaping Malware
Post-Quantum Secure Decentralized Random Number Generation Protocol with
Apple's Synthetic Defocus Noise Pattern: Characterization and Forensic
Private LoRA Fine-tuning of Open-Source LLMs with Homomorphic Encryption
Assessing the Latency of Network Layer Security in 5G Networks
Comet: Accelerating Private Inference for Large Language Model by
Securing Genomic Data Against Inference Attacks in Federated Learning
One Trigger Token Is Enough: A Defense Strategy for Balancing Safety and
Real-Time Bit-Level Encryption of Full High-Definition Video Without
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuSecuring WiFi Fingerprint-based Indoor Localization Systems from
SecReEvalBench: A Multi-turned Security Resilience Evaluation Benchmark
Security through the Eyes of AI: How Visualization is Shaping Malware
Post-Quantum Secure Decentralized Random Number Generation Protocol with
Apple's Synthetic Defocus Noise Pattern: Characterization and Forensic
Private LoRA Fine-tuning of Open-Source LLMs with Homomorphic Encryption
Assessing the Latency of Network Layer Security in 5G Networks
Comet: Accelerating Private Inference for Large Language Model by
Securing Genomic Data Against Inference Attacks in Federated Learning
One Trigger Token Is Enough: A Defense Strategy for Balancing Safety and
Real-Time Bit-Level Encryption of Full High-Definition Video Without
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>