サイバーarXiv

#245 サイバーarxiv (2025-08-06)


Listen Later

本日紹介した論文の一覧

  • Cybersecurity of Quantum Key Distribution Implementations

    http://arxiv.org/abs/2508.04669v1

  • Millions of inequivalent quadratic APN functions in eight variables

    http://arxiv.org/abs/2508.04644v1

  • 4-Swap: Achieving Grief-Free and Bribery-Safe Atomic Swaps Using Four

    Transactions
    http://arxiv.org/abs/2508.04641v1

  • Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing

    Technologies
    http://arxiv.org/abs/2508.04583v1

  • Attack Pattern Mining to Discover Hidden Threats to Industrial Control

    Systems
    http://arxiv.org/abs/2508.04561v1

  • Privacy Risk Predictions Based on Fundamental Understanding of Personal

    Data and an Evolving Threat Landscape
    http://arxiv.org/abs/2508.04542v1

  • Bases of Riemann-Roch spaces associated with arbitrary elliptic curve

    divisors and their application in constructing various elliptic Codes
    families
    http://arxiv.org/abs/2508.04340v1

  • Per-element Secure Aggregation against Data Reconstruction Attacks in

    Federated Learning
    http://arxiv.org/abs/2508.04285v1

  • Prompt Injection Vulnerability of Consensus Generating Applications in

    Digital Democracy
    http://arxiv.org/abs/2508.04281v1

  • SelectiveShield: Lightweight Hybrid Defense Against Gradient Leakage in

    Federated Learning
    http://arxiv.org/abs/2508.04265v1

  • DP-DocLDM: Differentially Private Document Image Generation using Latent

    Diffusion Models
    http://arxiv.org/abs/2508.04208v1

  • Eliciting and Analyzing Emergent Misalignment in State-of-the-Art Large

    Language Models
    http://arxiv.org/abs/2508.04196v1

  • BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time

    Series Forecasting
    http://arxiv.org/abs/2508.04189v1

  • Secure Development of a Hooking-Based Deception Framework Against

    Keylogging Techniques
    http://arxiv.org/abs/2508.04178v1

  • Evaluating Selective Encryption Against Gradient Inversion Attacks

    http://arxiv.org/abs/2508.04155v1

  • SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for

    Joint Federated Learning in Cross-Device Scenarios
    http://arxiv.org/abs/2508.04100v1

  • Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors

    http://arxiv.org/abs/2508.04094v1

  • Identity Theft in AI Conference Peer Review

    http://arxiv.org/abs/2508.04024v1

  • Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability

    http://arxiv.org/abs/2508.04000v1

  • Reputation-based partition scheme for IoT security

    http://arxiv.org/abs/2508.03981v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu