
Sign up to save your podcasts
Or


Evaluating Large Language Models for Phishing Detection,
ExtendAttack: Attacking Servers of LRMs via Extending Reasoning
Weakest Link in the Chain: Security Vulnerabilities in Advanced
EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated
Agent Capability Negotiation and Binding Protocol (ACNBP)
Unlearning-Enhanced Website Fingerprinting Attack: Against Backdoor
Watermarking LLM-Generated Datasets in Downstream Tasks
From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in
New characterization of full weight spectrum one-orbit cyclic subspace
The Rich Get Richer in Bitcoin Mining Induced by Blockchain Forks
Tady: A Neural Disassembler without Structural Constraint Violations
Building Automotive Security on Internet Standards: An Integration of
On Immutable Memory Systems for Artificial Agents: A Blockchain-Indexed
Screen Hijack: Visual Poisoning of VLM Agents in Mobile Environments
Dual Protection Ring: User Profiling Via Differential Privacy and
Using LLMs for Security Advisory Investigations: How Far Are We?
CertDW: Towards Certified Dataset Ownership Verification via Conformal
Detecting Hard-Coded Credentials in Software Repositories via LLMs
Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online
Position: Certified Robustness Does Not (Yet) Imply Model Security
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuEvaluating Large Language Models for Phishing Detection,
ExtendAttack: Attacking Servers of LRMs via Extending Reasoning
Weakest Link in the Chain: Security Vulnerabilities in Advanced
EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated
Agent Capability Negotiation and Binding Protocol (ACNBP)
Unlearning-Enhanced Website Fingerprinting Attack: Against Backdoor
Watermarking LLM-Generated Datasets in Downstream Tasks
From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in
New characterization of full weight spectrum one-orbit cyclic subspace
The Rich Get Richer in Bitcoin Mining Induced by Blockchain Forks
Tady: A Neural Disassembler without Structural Constraint Violations
Building Automotive Security on Internet Standards: An Integration of
On Immutable Memory Systems for Artificial Agents: A Blockchain-Indexed
Screen Hijack: Visual Poisoning of VLM Agents in Mobile Environments
Dual Protection Ring: User Profiling Via Differential Privacy and
Using LLMs for Security Advisory Investigations: How Far Are We?
CertDW: Towards Certified Dataset Ownership Verification via Conformal
Detecting Hard-Coded Credentials in Software Repositories via LLMs
Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online
Position: Certified Robustness Does Not (Yet) Imply Model Security
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>