
Sign up to save your podcasts
Or


Machine Learning with Privacy for Protected Attributes
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs
A Survey of LLM-Driven AI Agent Communication: Protocols, Security
Decompiling Smart Contracts with a Large Language Model
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic
From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via
Identifying Physically Realizable Triggers for Backdoored Face
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM
Assessing Risk of Stealing Proprietary Models for Medical Imaging Tasks
FuncVul: An Effective Function Level Vulnerability Detection Model using
An ETSI GS QKD compliant TLS implementation
ZK-SERIES: Privacy-Preserving Authentication using Temporal Biometric
Yotta: A Large-Scale Trustless Data Trading Scheme for Blockchain System
SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and
WebGuard++:Interpretable Malicious URL Detection via Bidirectional
HARPT: A Corpus for Analyzing Consumers' Trust and Privacy Concerns in
Network Structures as an Attack Surface: Topology-Based Privacy Leakage
Private Model Personalization Revisited
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuMachine Learning with Privacy for Protected Attributes
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs
A Survey of LLM-Driven AI Agent Communication: Protocols, Security
Decompiling Smart Contracts with a Large Language Model
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic
From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via
Identifying Physically Realizable Triggers for Backdoored Face
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM
Assessing Risk of Stealing Proprietary Models for Medical Imaging Tasks
FuncVul: An Effective Function Level Vulnerability Detection Model using
An ETSI GS QKD compliant TLS implementation
ZK-SERIES: Privacy-Preserving Authentication using Temporal Biometric
Yotta: A Large-Scale Trustless Data Trading Scheme for Blockchain System
SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and
WebGuard++:Interpretable Malicious URL Detection via Bidirectional
HARPT: A Corpus for Analyzing Consumers' Trust and Privacy Concerns in
Network Structures as an Attack Surface: Topology-Based Privacy Leakage
Private Model Personalization Revisited
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>