
Sign up to save your podcasts
Or


Defending Against Prompt Injection With a Few DefensiveTokens
EinHops: Einsum Notation for Expressive Homomorphic Operations on
KeyDroid: A Large-Scale Analysis of Secure Key Storage in Android Apps
Can Large Language Models Improve Phishing Defense? A Large-Scale
The Trust Fabric: Decentralized Interoperability and Economic
Mitigating Watermark Stealing Attacks in Generative Models via Multi-Key
Rainbow Artifacts from Electromagnetic Signal Injection Attacks on Image
GuardVal: Dynamic Large Language Model Jailbreak Evaluation for
RADAR: a Radio-based Analytics for Dynamic Association and Recognition
Temporal Unlearnable Examples: Preventing Personal Video Data from
May I have your Attention? Breaking Fine-Tuning based Prompt Injection
Autonomous AI-based Cybersecurity Framework for Critical Infrastructure:
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT
Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models
Shuffling for Semantic Secrecy
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuDefending Against Prompt Injection With a Few DefensiveTokens
EinHops: Einsum Notation for Expressive Homomorphic Operations on
KeyDroid: A Large-Scale Analysis of Secure Key Storage in Android Apps
Can Large Language Models Improve Phishing Defense? A Large-Scale
The Trust Fabric: Decentralized Interoperability and Economic
Mitigating Watermark Stealing Attacks in Generative Models via Multi-Key
Rainbow Artifacts from Electromagnetic Signal Injection Attacks on Image
GuardVal: Dynamic Large Language Model Jailbreak Evaluation for
RADAR: a Radio-based Analytics for Dynamic Association and Recognition
Temporal Unlearnable Examples: Preventing Personal Video Data from
May I have your Attention? Breaking Fine-Tuning based Prompt Injection
Autonomous AI-based Cybersecurity Framework for Critical Infrastructure:
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT
Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models
Shuffling for Semantic Secrecy
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>