
Sign up to save your podcasts
Or


LLM Hypnosis: Exploiting User Feedback for Unauthorized Knowledge
Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context
NVIDIA GPU Confidential Computing Demystified
Early Signs of Steganographic Capabilities in Frontier LLMs
Meta SecAlign: A Secure Foundation LLM Against Prompt Injection Attacks
Quantifying Classifier Utility under Local Differential Privacy
Control at Stake: Evaluating the Security Landscape of LLM-Driven Email
SAT-BO: Verification Rule Learning and Optimization for FraudTransaction
Access Control Threatened by Quantum Entanglement
Alleviating Attack Data Scarcity: SCANIA's Experience Towards Enhancing
De-AntiFake: Rethinking the Protective Perturbations Against Voice
Real-Time Monitoring and Transparency in Pizza Production Using IoT and
A 10-bit S-box generated by Feistel construction from cellular automata
Effectively Identifying Wi-Fi Devices through State Transitions
CyberRAG: An agentic RAG cyber attack classification and reporting tool
Privacy-preserving Preselection for Face Identification Based on Packing
Evaluating Language Models For Threat Detection in IoT Security Logs
PII Jailbreaking in LLMs via Activation Steering Reveals Personal
Rethinking Broken Object Level Authorization Attacks Under Zero Trust
Linearly Homomorphic Ring Signature Scheme over Lattices
EIM-TRNG: Obfuscating Deep Neural Network Weights with
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuLLM Hypnosis: Exploiting User Feedback for Unauthorized Knowledge
Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context
NVIDIA GPU Confidential Computing Demystified
Early Signs of Steganographic Capabilities in Frontier LLMs
Meta SecAlign: A Secure Foundation LLM Against Prompt Injection Attacks
Quantifying Classifier Utility under Local Differential Privacy
Control at Stake: Evaluating the Security Landscape of LLM-Driven Email
SAT-BO: Verification Rule Learning and Optimization for FraudTransaction
Access Control Threatened by Quantum Entanglement
Alleviating Attack Data Scarcity: SCANIA's Experience Towards Enhancing
De-AntiFake: Rethinking the Protective Perturbations Against Voice
Real-Time Monitoring and Transparency in Pizza Production Using IoT and
A 10-bit S-box generated by Feistel construction from cellular automata
Effectively Identifying Wi-Fi Devices through State Transitions
CyberRAG: An agentic RAG cyber attack classification and reporting tool
Privacy-preserving Preselection for Face Identification Based on Packing
Evaluating Language Models For Threat Detection in IoT Security Logs
PII Jailbreaking in LLMs via Activation Steering Reveals Personal
Rethinking Broken Object Level Authorization Attacks Under Zero Trust
Linearly Homomorphic Ring Signature Scheme over Lattices
EIM-TRNG: Obfuscating Deep Neural Network Weights with
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>