
Sign up to save your podcasts
Or


ChineseHarm-Bench: A Chinese Harmful Content Detection Benchmark
Monitoring Decomposition Attacks in LLMs with Lightweight Sequential
ME: Trigger Element Combination Backdoor Attack on Copyright
Quantifying Azure RBAC Wildcard Overreach
ObfusBFA: A Holistic Approach to Safeguarding DNNs from Different Types
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
Commitment Schemes for Multi-Party Computation
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework
GOLIATH: A Decentralized Framework for Data Collection in Intelligent
From IOCs to Group Profiles: On the Specificity of Threat Group
CyFence: Securing Cyber-Physical Controllers via Trusted Execution
Assessing the Resilience of Automotive Intrusion Detection Systems to
SoK: Evaluating Jailbreak Guardrails for Large Language Models
A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring
Specification and Evaluation of Multi-Agent LLM Systems -- Prototype and
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against
FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular
Can We Infer Confidential Properties of Training Data from LLMs?
Adaptive Chosen-Ciphertext Security of Distributed Broadcast Encryption
A Comprehensive Survey of Unmanned Aerial Systems' Risks and Mitigation
ELFuzz: Efficient Input Generation via LLM-driven Synthesis Over Fuzzer
AI-Based Software Vulnerability Detection: A Systematic Literature
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuChineseHarm-Bench: A Chinese Harmful Content Detection Benchmark
Monitoring Decomposition Attacks in LLMs with Lightweight Sequential
ME: Trigger Element Combination Backdoor Attack on Copyright
Quantifying Azure RBAC Wildcard Overreach
ObfusBFA: A Holistic Approach to Safeguarding DNNs from Different Types
TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks
Commitment Schemes for Multi-Party Computation
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework
GOLIATH: A Decentralized Framework for Data Collection in Intelligent
From IOCs to Group Profiles: On the Specificity of Threat Group
CyFence: Securing Cyber-Physical Controllers via Trusted Execution
Assessing the Resilience of Automotive Intrusion Detection Systems to
SoK: Evaluating Jailbreak Guardrails for Large Language Models
A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring
Specification and Evaluation of Multi-Agent LLM Systems -- Prototype and
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against
FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular
Can We Infer Confidential Properties of Training Data from LLMs?
Adaptive Chosen-Ciphertext Security of Distributed Broadcast Encryption
A Comprehensive Survey of Unmanned Aerial Systems' Risks and Mitigation
ELFuzz: Efficient Input Generation via LLM-driven Synthesis Over Fuzzer
AI-Based Software Vulnerability Detection: A Systematic Literature
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>