サイバーarXiv

#216 サイバーarxiv (2025-06-11)


Listen Later

本日紹介した論文の一覧

  • LLMail-Inject: A Dataset from a Realistic Adaptive Prompt Injection

    Challenge
    http://arxiv.org/abs/2506.09956v1

  • Oracle-Based Multistep Strategy for Solving Polynomial Systems Over

    Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher
    http://arxiv.org/abs/2506.09950v1

  • On the Impossibility of a Perfect Hypervisor

    http://arxiv.org/abs/2506.09825v1

  • Physical Layer-Based Device Fingerprinting for Wireless Security: From

    Theory to Practice
    http://arxiv.org/abs/2506.09807v1

  • Devil's Hand: Data Poisoning Attacks to Locally Private Graph Learning

    Protocols
    http://arxiv.org/abs/2506.09803v1

  • On the Virtues of Information Security in the UK Climate Movement

    http://arxiv.org/abs/2506.09719v1

  • Mapping NVD Records to Their VFCs: How Hard is it?

    http://arxiv.org/abs/2506.09702v1

  • BF-Max: an Efficient Bit Flipping Decoder with Predictable Decoding

    Failure Rate
    http://arxiv.org/abs/2506.09689v1

  • Empirical Quantification of Spurious Correlations in Malware Detection

    http://arxiv.org/abs/2506.09662v1

  • Effective Red-Teaming of Policy-Adherent Agents

    http://arxiv.org/abs/2506.09600v1

  • The Everyday Security of Living with Conflict

    http://arxiv.org/abs/2506.09580v1

  • The Rabin cryptosystem over number fields

    http://arxiv.org/abs/2506.09569v1

  • TooBadRL: Trigger Optimization to Boost Effectiveness of Backdoor

    Attacks on Deep Reinforcement Learning
    http://arxiv.org/abs/2506.09562v1

  • Identity and Access Management for the Computing Continuum

    http://arxiv.org/abs/2506.09559v1

  • Beyond Personalization: Federated Recommendation with Calibration via

    Low-rank Decomposition
    http://arxiv.org/abs/2506.09525v1

  • The Secure Overview and Analysis OF 3GPP MAC CE

    http://arxiv.org/abs/2506.09502v1

  • Covert Entanglement Generation over Bosonic Channels

    http://arxiv.org/abs/2506.09474v1

  • Efficient Modular Multiplier over GF (2^m) for ECPM

    http://arxiv.org/abs/2506.09464v1

  • Learning Obfuscations Of LLM Embedding Sequences: Stained Glass

    Transform
    http://arxiv.org/abs/2506.09452v1

  • LLMs Cannot Reliably Judge (Yet?): A Comprehensive Assessment on the

    Robustness of LLM-as-a-Judge
    http://arxiv.org/abs/2506.09443v1

  • Securing Open RAN: A Survey of Cryptographic Challenges and Emerging

    Solutions for 5G
    http://arxiv.org/abs/2506.09418v1

  • Epass: Efficient and Privacy-Preserving Asynchronous Payment on

    Blockchain
    http://arxiv.org/abs/2506.09387v1

  • ContextBuddy: AI-Enhanced Contextual Insights for Security Alert

    Investigation (Applied to Intrusion Detection)
    http://arxiv.org/abs/2506.09365v1

  • SAGE: Exploring the Boundaries of Unsafe Concept Domain with

    Semantic-Augment Erasing
    http://arxiv.org/abs/2506.09363v1

  • DAVSP: Safety Alignment for Large Vision-Language Models via Deep

    Aligned Visual Safety Prompt
    http://arxiv.org/abs/2506.09353v1

  • What is the Cost of Differential Privacy for Deep Learning-Based

    Trajectory Generation?
    http://arxiv.org/abs/2506.09312v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu