
Sign up to save your podcasts
Or


LLMail-Inject: A Dataset from a Realistic Adaptive Prompt Injection
Oracle-Based Multistep Strategy for Solving Polynomial Systems Over
On the Impossibility of a Perfect Hypervisor
Physical Layer-Based Device Fingerprinting for Wireless Security: From
Devil's Hand: Data Poisoning Attacks to Locally Private Graph Learning
On the Virtues of Information Security in the UK Climate Movement
Mapping NVD Records to Their VFCs: How Hard is it?
BF-Max: an Efficient Bit Flipping Decoder with Predictable Decoding
Empirical Quantification of Spurious Correlations in Malware Detection
Effective Red-Teaming of Policy-Adherent Agents
The Everyday Security of Living with Conflict
The Rabin cryptosystem over number fields
TooBadRL: Trigger Optimization to Boost Effectiveness of Backdoor
Identity and Access Management for the Computing Continuum
Beyond Personalization: Federated Recommendation with Calibration via
The Secure Overview and Analysis OF 3GPP MAC CE
Covert Entanglement Generation over Bosonic Channels
Efficient Modular Multiplier over GF (2^m) for ECPM
Learning Obfuscations Of LLM Embedding Sequences: Stained Glass
LLMs Cannot Reliably Judge (Yet?): A Comprehensive Assessment on the
Securing Open RAN: A Survey of Cryptographic Challenges and Emerging
Epass: Efficient and Privacy-Preserving Asynchronous Payment on
ContextBuddy: AI-Enhanced Contextual Insights for Security Alert
SAGE: Exploring the Boundaries of Unsafe Concept Domain with
DAVSP: Safety Alignment for Large Vision-Language Models via Deep
What is the Cost of Differential Privacy for Deep Learning-Based
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuLLMail-Inject: A Dataset from a Realistic Adaptive Prompt Injection
Oracle-Based Multistep Strategy for Solving Polynomial Systems Over
On the Impossibility of a Perfect Hypervisor
Physical Layer-Based Device Fingerprinting for Wireless Security: From
Devil's Hand: Data Poisoning Attacks to Locally Private Graph Learning
On the Virtues of Information Security in the UK Climate Movement
Mapping NVD Records to Their VFCs: How Hard is it?
BF-Max: an Efficient Bit Flipping Decoder with Predictable Decoding
Empirical Quantification of Spurious Correlations in Malware Detection
Effective Red-Teaming of Policy-Adherent Agents
The Everyday Security of Living with Conflict
The Rabin cryptosystem over number fields
TooBadRL: Trigger Optimization to Boost Effectiveness of Backdoor
Identity and Access Management for the Computing Continuum
Beyond Personalization: Federated Recommendation with Calibration via
The Secure Overview and Analysis OF 3GPP MAC CE
Covert Entanglement Generation over Bosonic Channels
Efficient Modular Multiplier over GF (2^m) for ECPM
Learning Obfuscations Of LLM Embedding Sequences: Stained Glass
LLMs Cannot Reliably Judge (Yet?): A Comprehensive Assessment on the
Securing Open RAN: A Survey of Cryptographic Challenges and Emerging
Epass: Efficient and Privacy-Preserving Asynchronous Payment on
ContextBuddy: AI-Enhanced Contextual Insights for Security Alert
SAGE: Exploring the Boundaries of Unsafe Concept Domain with
DAVSP: Safety Alignment for Large Vision-Language Models via Deep
What is the Cost of Differential Privacy for Deep Learning-Based
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>