
Sign up to save your podcasts
Or


Protocol insecurity with finitely many sessions and XOR
Logit-Gap Steering: Efficient Short-Suffix Jailbreaks for Aligned Large
Poisoning Attacks to Local Differential Privacy for Ranking Estimation
Lock Prediction for Zero-Downtime Database Encryption
AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and
RawMal-TF: Raw Malware Dataset Labeled by Type and Family
Exploring Privacy and Security as Drivers for Environmental
Differentially Private Synthetic Data Release for Topics API Outputs
An ontological lens on attack trees: Toward adequacy and
Breaking Out from the TESSERACT: Reassessing ML-based Malware Detection
Attestable Audits: Verifiable AI Safety Benchmarks Using Trusted
Threadbox: Sandboxing for Modular Security
Not quite a piece of CHERI-cake: Are new digital security by design
Learning Modular Exponentiation with Transformers
QLPro: Automated Code Vulnerability Discovery via LLM and Static Code
gMBA: Expression Semantic Guided Mixed Boolean-Arithmetic Deobfuscation
Privacy-Preserving Federated Learning Scheme with Mitigating Model
SoK: Semantic Privacy in Large Language Models
Cybersecurity AI: The Dangerous Gap Between Automation and Autonomy
Detect \& Score: Privacy-Preserving Misbehaviour Detection and
Unbounded knapsack problem and double partitions
A Large-Scale Evolvable Dataset for Model Context Protocol Ecosystem and
All Proof of Work But No Proof of Play
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuProtocol insecurity with finitely many sessions and XOR
Logit-Gap Steering: Efficient Short-Suffix Jailbreaks for Aligned Large
Poisoning Attacks to Local Differential Privacy for Ranking Estimation
Lock Prediction for Zero-Downtime Database Encryption
AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and
RawMal-TF: Raw Malware Dataset Labeled by Type and Family
Exploring Privacy and Security as Drivers for Environmental
Differentially Private Synthetic Data Release for Topics API Outputs
An ontological lens on attack trees: Toward adequacy and
Breaking Out from the TESSERACT: Reassessing ML-based Malware Detection
Attestable Audits: Verifiable AI Safety Benchmarks Using Trusted
Threadbox: Sandboxing for Modular Security
Not quite a piece of CHERI-cake: Are new digital security by design
Learning Modular Exponentiation with Transformers
QLPro: Automated Code Vulnerability Discovery via LLM and Static Code
gMBA: Expression Semantic Guided Mixed Boolean-Arithmetic Deobfuscation
Privacy-Preserving Federated Learning Scheme with Mitigating Model
SoK: Semantic Privacy in Large Language Models
Cybersecurity AI: The Dangerous Gap Between Automation and Autonomy
Detect \& Score: Privacy-Preserving Misbehaviour Detection and
Unbounded knapsack problem and double partitions
A Large-Scale Evolvable Dataset for Model Context Protocol Ecosystem and
All Proof of Work But No Proof of Play
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>