
Sign up to save your podcasts
Or


Empowering Manufacturers with Privacy-Preserving AI Tools: A Case Study
Signals and Symptoms: ICS Attack Dataset From Railway Cyber Range
Tuning without Peeking: Provable Privacy and Generalization Bounds for
Towards Better Attribute Inference Vulnerability Measures
Graph Representation-based Model Poisoning on Federated LLMs in
EGNInfoLeaker: Unveiling the Risks of Public Key Reuse and User Identity
Survivability of Backdoor Attacks on Unconstrained Face Recognition
A Privacy-Preserving Indoor Localization System based on Hierarchical
On the Effect of Ruleset Tuning and Data Imbalance on Explainable
Cybersecurity Issues in Local Energy Markets
SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via
How to Securely Shuffle? A survey about Secure Shufflers for
A new efficient RPKI Design
Rational Censorship Attack: Breaking Blockchain with a Blackboard
A Compact 16-bit S-box over Tower Field $\F_{(((2^2)^2)^2)^2}$ with High
ICLShield: Exploring and Mitigating In-Context Learning Backdoor Attacks
Hardness of Quantum Distribution Learning and Quantum Cryptography
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuEmpowering Manufacturers with Privacy-Preserving AI Tools: A Case Study
Signals and Symptoms: ICS Attack Dataset From Railway Cyber Range
Tuning without Peeking: Provable Privacy and Generalization Bounds for
Towards Better Attribute Inference Vulnerability Measures
Graph Representation-based Model Poisoning on Federated LLMs in
EGNInfoLeaker: Unveiling the Risks of Public Key Reuse and User Identity
Survivability of Backdoor Attacks on Unconstrained Face Recognition
A Privacy-Preserving Indoor Localization System based on Hierarchical
On the Effect of Ruleset Tuning and Data Imbalance on Explainable
Cybersecurity Issues in Local Energy Markets
SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via
How to Securely Shuffle? A survey about Secure Shufflers for
A new efficient RPKI Design
Rational Censorship Attack: Breaking Blockchain with a Blackboard
A Compact 16-bit S-box over Tower Field $\F_{(((2^2)^2)^2)^2}$ with High
ICLShield: Exploring and Mitigating In-Context Learning Backdoor Attacks
Hardness of Quantum Distribution Learning and Quantum Cryptography
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>