
Sign up to save your podcasts
Or


Training-Free Watermarking for Autoregressive Image Generation
TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website
sudoLLM : On Multi-role Alignment of Language Models
Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded
Towards Verifiability of Total Value Locked (TVL) in Decentralized
Trustworthy Reputation Games and Applications to Proof-of-Reputation
Can Large Language Models Really Recognize Your Name?
Lessons from Defending Gemini Against Indirect Prompt Injections
MicroCrypt Assumptions with Quantum Input Sampling and
Is Your Prompt Safe? Investigating Prompt Injection Attacks Against
Effects of the Cyber Resilience Act (CRA) on Industrial Equipment
Vulnerability of Transfer-Learned Neural Networks to Data Reconstruction
Exploring Jailbreak Attacks on LLMs through Intent Concealment and
Destabilizing Power Grid and Energy Market by Cyberattacks on Smart
Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec
Invisible Entropy: Towards Safe and Efficient Low-Entropy LLM
AudioJailbreak: Jailbreak Attacks against End-to-End Large
In Search of Lost Data: A Study of Flash Sanitization Practices
CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model
Zk-SNARK for String Match
Beyond Text: Unveiling Privacy Vulnerabilities in Multi-modal
D4+: Emergent Adversarial Driving Maneuvers with Approximate Functional
The Hidden Dangers of Outdated Software: A Cyber Security Perspective
VulCPE: Context-Aware Cybersecurity Vulnerability Retrieval and
PandaGuard: Systematic Evaluation of LLM Safety in the Era of
hChain 4.0: A Secure and Scalable Permissioned Blockchain for EHR
Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit
Provable Execution in Real-Time Embedded Systems
Fragments to Facts: Partial-Information Fragment Inference from LLMs
QUT-DV25: A Dataset for Dynamic Analysis of Next-Gen Software Supply
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語
By KazuTraining-Free Watermarking for Autoregressive Image Generation
TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website
sudoLLM : On Multi-role Alignment of Language Models
Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded
Towards Verifiability of Total Value Locked (TVL) in Decentralized
Trustworthy Reputation Games and Applications to Proof-of-Reputation
Can Large Language Models Really Recognize Your Name?
Lessons from Defending Gemini Against Indirect Prompt Injections
MicroCrypt Assumptions with Quantum Input Sampling and
Is Your Prompt Safe? Investigating Prompt Injection Attacks Against
Effects of the Cyber Resilience Act (CRA) on Industrial Equipment
Vulnerability of Transfer-Learned Neural Networks to Data Reconstruction
Exploring Jailbreak Attacks on LLMs through Intent Concealment and
Destabilizing Power Grid and Energy Market by Cyberattacks on Smart
Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec
Invisible Entropy: Towards Safe and Efficient Low-Entropy LLM
AudioJailbreak: Jailbreak Attacks against End-to-End Large
In Search of Lost Data: A Study of Flash Sanitization Practices
CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model
Zk-SNARK for String Match
Beyond Text: Unveiling Privacy Vulnerabilities in Multi-modal
D4+: Emergent Adversarial Driving Maneuvers with Approximate Functional
The Hidden Dangers of Outdated Software: A Cyber Security Perspective
VulCPE: Context-Aware Cybersecurity Vulnerability Retrieval and
PandaGuard: Systematic Evaluation of LLM Safety in the Era of
hChain 4.0: A Secure and Scalable Permissioned Blockchain for EHR
Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit
Provable Execution in Real-Time Embedded Systems
Fragments to Facts: Partial-Information Fragment Inference from LLMs
QUT-DV25: A Dataset for Dynamic Analysis of Next-Gen Software Supply
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語