
Sign up to save your podcasts
Or


Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense
Fun with flags: How Compilers Break and Fix Constant-Time Code
Taming Data Challenges in ML-based Security Tasks: Lessons from
Wrapless: The trustless lending protocol on top of Bitcoin
CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative
Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for
The Impact of Event Data Partitioning on Privacy-aware Process Discovery
Post-Processing in Local Differential Privacy: An Extensive Evaluation
LDP$^3$: An Extensible and Multi-Threaded Toolkit for Local Differential
A Formal Refutation of the Blockchain Trilemma
Automated Reasoning for Vulnerability Management by Design
Asynchronous Event Error-Minimizing Noise for Safeguarding Event Dataset
Polyadic encryption
TuneShield: Mitigating Toxicity in Conversational AI while Fine-tuning
DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning
How Not to Detect Prompt Injections with an LLM
DATABench: Evaluating Dataset Auditing in Deep Learning from an
The Landscape of Memorization in LLMs: Mechanisms, Measurement, and
iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor
AI Agent Smart Contract Exploit Generation
Per-Row Activation Counting on Real Hardware: Demystifying Performance
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuHedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense
Fun with flags: How Compilers Break and Fix Constant-Time Code
Taming Data Challenges in ML-based Security Tasks: Lessons from
Wrapless: The trustless lending protocol on top of Bitcoin
CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative
Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for
The Impact of Event Data Partitioning on Privacy-aware Process Discovery
Post-Processing in Local Differential Privacy: An Extensive Evaluation
LDP$^3$: An Extensible and Multi-Threaded Toolkit for Local Differential
A Formal Refutation of the Blockchain Trilemma
Automated Reasoning for Vulnerability Management by Design
Asynchronous Event Error-Minimizing Noise for Safeguarding Event Dataset
Polyadic encryption
TuneShield: Mitigating Toxicity in Conversational AI while Fine-tuning
DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning
How Not to Detect Prompt Injections with an LLM
DATABench: Evaluating Dataset Auditing in Deep Learning from an
The Landscape of Memorization in LLMs: Mechanisms, Measurement, and
iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor
AI Agent Smart Contract Exploit Generation
Per-Row Activation Counting on Real Hardware: Demystifying Performance
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>