
Sign up to save your podcasts
Or


Private Geometric Median in Nearly-Linear Time
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path
Exposing Go's Hidden Bugs: A Novel Concolic Framework
Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge
TrojanStego: Your Language Model Can Secretly Be A Steganographic
Transformer in Protein: A Survey
DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in
Differential Privacy Analysis of Decentralized Gossip Averaging under
Novel Loss-Enhanced Universal Adversarial Patches for Sustainable
Evaluating AI cyber capabilities with crowdsourced elicitation
Deconstructing Obfuscation: A four-dimensional framework for evaluating
CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in
One Surrogate to Fool Them All: Universal, Transferable, and Targeted
Poison in the Well: Feature Embedding Disruption in Backdoor Attacks
What Really Matters in Many-Shot Attacks? An Empirical Study of
A Comprehensive Real-World Assessment of Audio Watermarking Algorithms:
STOPA: A Database of Systematic VariaTion Of DeePfake Audio for Open-Set
Weak-Jamming Detection in IEEE 802.11 Networks: Techniques, Scenarios
Language of Network: A Generative Pre-trained Model for Encrypted
An Empirical Study of JavaScript Inclusion Security Issues in Chrome
Structure Disruption: Subverting Malicious Diffusion-Based Inpainting
CoTGuard: Using Chain-of-Thought Triggering for Copyright Protection in
VADER: A Human-Evaluated Benchmark for Vulnerability Assessment,
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuPrivate Geometric Median in Nearly-Linear Time
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path
Exposing Go's Hidden Bugs: A Novel Concolic Framework
Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge
TrojanStego: Your Language Model Can Secretly Be A Steganographic
Transformer in Protein: A Survey
DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in
Differential Privacy Analysis of Decentralized Gossip Averaging under
Novel Loss-Enhanced Universal Adversarial Patches for Sustainable
Evaluating AI cyber capabilities with crowdsourced elicitation
Deconstructing Obfuscation: A four-dimensional framework for evaluating
CPA-RAG:Covert Poisoning Attacks on Retrieval-Augmented Generation in
One Surrogate to Fool Them All: Universal, Transferable, and Targeted
Poison in the Well: Feature Embedding Disruption in Backdoor Attacks
What Really Matters in Many-Shot Attacks? An Empirical Study of
A Comprehensive Real-World Assessment of Audio Watermarking Algorithms:
STOPA: A Database of Systematic VariaTion Of DeePfake Audio for Open-Set
Weak-Jamming Detection in IEEE 802.11 Networks: Techniques, Scenarios
Language of Network: A Generative Pre-trained Model for Encrypted
An Empirical Study of JavaScript Inclusion Security Issues in Chrome
Structure Disruption: Subverting Malicious Diffusion-Based Inpainting
CoTGuard: Using Chain-of-Thought Triggering for Copyright Protection in
VADER: A Human-Evaluated Benchmark for Vulnerability Assessment,
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>