
Sign up to save your podcasts
Or


S3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit
Quantized Approximate Signal Processing (QASP): Towards Homomorphic
The Ephemeral Threat: Assessing the Security of Algorithmic Trading
Locally Differentially Private Frequency Estimation via Joint Randomized
AutoPentest: Enhancing Vulnerability Management With Autonomous LLM
One For All: Formally Verifying Protocols which use Aggregate Signatures
Private Transformer Inference in MLaaS: A Survey
Defending the Edge: Representative-Attention for Mitigating Backdoor
AttentionGuard: Transformer-based Misbehavior Detection for Secure
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack
The Tangent Space Attack
When Mitigations Backfire: Timing Channel Attacks and Defense for
Dark LLMs: The Growing Threat of Unaligned AI Models
Analysing Safety Risks in LLMs Fine-Tuned with Pseudo-Malicious Cyber
Security and Privacy Measurement on Chinese Consumer IoT Traffic based
DeFeed: Secure Decentralized Cross-Contract Data Feed in Web 3.0 for
From Trade-off to Synergy: A Versatile Symbiotic Watermarking Framework
PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative
Correlating Account on Ethereum Mixing Service via Domain-Invariant
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuS3C2 Summit 2024-09: Industry Secure Software Supply Chain Summit
Quantized Approximate Signal Processing (QASP): Towards Homomorphic
The Ephemeral Threat: Assessing the Security of Algorithmic Trading
Locally Differentially Private Frequency Estimation via Joint Randomized
AutoPentest: Enhancing Vulnerability Management With Autonomous LLM
One For All: Formally Verifying Protocols which use Aggregate Signatures
Private Transformer Inference in MLaaS: A Survey
Defending the Edge: Representative-Attention for Mitigating Backdoor
AttentionGuard: Transformer-based Misbehavior Detection for Secure
Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack
The Tangent Space Attack
When Mitigations Backfire: Timing Channel Attacks and Defense for
Dark LLMs: The Growing Threat of Unaligned AI Models
Analysing Safety Risks in LLMs Fine-Tuned with Pseudo-Malicious Cyber
Security and Privacy Measurement on Chinese Consumer IoT Traffic based
DeFeed: Secure Decentralized Cross-Contract Data Feed in Web 3.0 for
From Trade-off to Synergy: A Versatile Symbiotic Watermarking Framework
PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative
Correlating Account on Ethereum Mixing Service via Domain-Invariant
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>