サイバーarXiv

#214 サイバーarxiv (2025-06-09)


Listen Later

本日紹介した論文の一覧

  • Unraveling Ethereum's Mempool: The Impact of Fee Fairness, Transaction

    Prioritization, and Consensus Efficiency
    http://arxiv.org/abs/2506.07988v1

  • Exposing Hidden Backdoors in NFT Smart Contracts: A Static Security

    Analysis of Rug Pull Patterns
    http://arxiv.org/abs/2506.07974v1

  • Understanding the Error Sensitivity of Privacy-Aware Computing

    http://arxiv.org/abs/2506.07957v1

  • TokenBreak: Bypassing Text Classification Models Through Token

    Manipulation
    http://arxiv.org/abs/2506.07948v1

  • Secure Distributed Learning for CAVs: Defending Against Gradient Leakage

    with Leveled Homomorphic Encryption
    http://arxiv.org/abs/2506.07894v1

  • SoK: Data Reconstruction Attacks Against Machine Learning Models:

    Definition, Metrics, and Benchmark
    http://arxiv.org/abs/2506.07888v1

  • Evaluating explainable AI for deep learning-based network intrusion

    detection system alert classification
    http://arxiv.org/abs/2506.07882v1

  • Securing Unbounded Differential Privacy Against Timing Attacks

    http://arxiv.org/abs/2506.07868v1

  • Are Trees Really Green? A Detection Approach of IoT Malware Attacks

    http://arxiv.org/abs/2506.07836v1

  • User-space library rootkits revisited: Are user-space detection

    mechanisms futile?
    http://arxiv.org/abs/2506.07827v1

  • LLM Unlearning Should Be Form-Independent

    http://arxiv.org/abs/2506.07795v1

  • "I wasn't sure if this is indeed a security risk": Data-driven

    Understanding of Security Issue Reporting in GitHub Repositories of Open
    Source npm Packages
    http://arxiv.org/abs/2506.07728v1

  • Profiling Electric Vehicles via Early Charging Voltage Patterns

    http://arxiv.org/abs/2506.07714v1

  • Stark-Coleman Invariants and Quantum Lower Bounds: An Integrated

    Framework for Real Quadratic Fields
    http://arxiv.org/abs/2506.07640v1

  • TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in

    Federated Tree-Based Systems
    http://arxiv.org/abs/2506.07605v1

  • MalGEN: A Generative Agent Framework for Modeling Malicious Software in

    Cybersecurity
    http://arxiv.org/abs/2506.07586v1

  • Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain

    http://arxiv.org/abs/2506.07480v1

  • Pixel-Sensitive and Robust Steganography Based on Polar Codes

    http://arxiv.org/abs/2506.07404v1

  • Enhancing Watermarking Quality for LLMs via Contextual Generation States

    Awareness
    http://arxiv.org/abs/2506.07403v1

  • Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks

    Stemming from Alignment Failures
    http://arxiv.org/abs/2506.07402v1

  • From Static to Adaptive Defense: Federated Multi-Agent Deep

    Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in
    UAV Swarm Networks
    http://arxiv.org/abs/2506.07392v1

  • Enhanced Consistency Bi-directional GAN(CBiGAN) for Malware Anomaly

    Detection
    http://arxiv.org/abs/2506.07372v1

  • JavelinGuard: Low-Cost Transformer Architectures for LLM Security

    http://arxiv.org/abs/2506.07330v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu