サイバーarXiv

#204 サイバーarxiv (2025-05-20)


Listen Later

本日紹介した論文の一覧

  • Training-Free Watermarking for Autoregressive Image Generation

    http://arxiv.org/abs/2505.14673v1

  • TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website

    Fingerprinting
    http://arxiv.org/abs/2505.14616v1

  • sudoLLM : On Multi-role Alignment of Language Models

    http://arxiv.org/abs/2505.14607v1

  • Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded

    Intrusion Detection on the Edge
    http://arxiv.org/abs/2505.14592v1

  • Towards Verifiability of Total Value Locked (TVL) in Decentralized

    Finance
    http://arxiv.org/abs/2505.14565v1

  • Trustworthy Reputation Games and Applications to Proof-of-Reputation

    Blockchains
    http://arxiv.org/abs/2505.14551v1

  • Can Large Language Models Really Recognize Your Name?

    http://arxiv.org/abs/2505.14549v1

  • Lessons from Defending Gemini Against Indirect Prompt Injections

    http://arxiv.org/abs/2505.14534v1

  • MicroCrypt Assumptions with Quantum Input Sampling and

    Pseudodeterminism: Constructions and Separations
    http://arxiv.org/abs/2505.14461v1

  • Is Your Prompt Safe? Investigating Prompt Injection Attacks Against

    Open-Source LLMs
    http://arxiv.org/abs/2505.14368v1

  • Effects of the Cyber Resilience Act (CRA) on Industrial Equipment

    Manufacturing Companies
    http://arxiv.org/abs/2505.14325v1

  • Vulnerability of Transfer-Learned Neural Networks to Data Reconstruction

    Attacks in Small-Data Regime
    http://arxiv.org/abs/2505.14323v1

  • Exploring Jailbreak Attacks on LLMs through Intent Concealment and

    Diversion
    http://arxiv.org/abs/2505.14316v1

  • Destabilizing Power Grid and Energy Market by Cyberattacks on Smart

    Inverters
    http://arxiv.org/abs/2505.14175v1

  • Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec

    http://arxiv.org/abs/2505.14162v1

  • Invisible Entropy: Towards Safe and Efficient Low-Entropy LLM

    Watermarking
    http://arxiv.org/abs/2505.14112v1

  • AudioJailbreak: Jailbreak Attacks against End-to-End Large

    Audio-Language Models
    http://arxiv.org/abs/2505.14103v1

  • In Search of Lost Data: A Study of Flash Sanitization Practices

    http://arxiv.org/abs/2505.14067v1

  • CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model

    for Complex and Imbalanced Data
    http://arxiv.org/abs/2505.14027v1

  • Zk-SNARK for String Match

    http://arxiv.org/abs/2505.13964v1

  • Beyond Text: Unveiling Privacy Vulnerabilities in Multi-modal

    Retrieval-Augmented Generation
    http://arxiv.org/abs/2505.13957v1

  • D4+: Emergent Adversarial Driving Maneuvers with Approximate Functional

    Optimization
    http://arxiv.org/abs/2505.13942v1

  • The Hidden Dangers of Outdated Software: A Cyber Security Perspective

    http://arxiv.org/abs/2505.13922v1

  • VulCPE: Context-Aware Cybersecurity Vulnerability Retrieval and

    Management
    http://arxiv.org/abs/2505.13895v1

  • PandaGuard: Systematic Evaluation of LLM Safety in the Era of

    Jailbreaking Attacks
    http://arxiv.org/abs/2505.13862v1

  • hChain 4.0: A Secure and Scalable Permissioned Blockchain for EHR

    Management in Smart Healthcare
    http://arxiv.org/abs/2505.13861v1

  • Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit

    Obfuscation
    http://arxiv.org/abs/2505.13848v1

  • Provable Execution in Real-Time Embedded Systems

    http://arxiv.org/abs/2505.13842v1

  • Fragments to Facts: Partial-Information Fragment Inference from LLMs

    http://arxiv.org/abs/2505.13819v1

  • QUT-DV25: A Dataset for Dynamic Analysis of Next-Gen Software Supply

    Chain Attacks
    http://arxiv.org/abs/2505.13804v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語

    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu