サイバーarXiv

#251 サイバーarxiv (2025-08-18)


Listen Later

本日紹介した論文の一覧

  • AutoBnB-RAG: Enhancing Multi-Agent Incident Response with

    Retrieval-Augmented Generation
    http://arxiv.org/abs/2508.13118v1

  • VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in

    Verilog
    http://arxiv.org/abs/2508.13092v1

  • MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of

    Diverse Innovative Strategies
    http://arxiv.org/abs/2508.13048v1

  • AuthenTree: A Scalable MPC-Based Distributed Trust Architecture for

    Chiplet-based Heterogeneous Systems
    http://arxiv.org/abs/2508.13033v1

  • The Application of Transformer-Based Models for Predicting Consequences

    of Cyber Attacks
    http://arxiv.org/abs/2508.13030v1

  • Prescriptive Zero Trust- Assessing the impact of zero trust on cyber

    attack prevention
    http://arxiv.org/abs/2508.12953v1

  • SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite

    State Machines in Systems-on-Chip
    http://arxiv.org/abs/2508.12910v1

  • FuSaR: A Fuzzification-Based Method for LRM Safety-Reasoning Balance

    http://arxiv.org/abs/2508.12897v1

  • Supporting Socially Constrained Private Communications with

    SecureWhispers
    http://arxiv.org/abs/2508.12870v1

  • The covering radius of Butson Hadamard codes for the homogeneous metric

    http://arxiv.org/abs/2508.12859v1

  • Efficient and Verifiable Privacy-Preserving Convolutional Computation

    for CNN Inference with Untrusted Clouds
    http://arxiv.org/abs/2508.12832v1

  • Unlearning Comparator: A Visual Analytics System for Comparative

    Evaluation of Machine Unlearning Methods
    http://arxiv.org/abs/2508.12730v1

  • MPOCryptoML: Multi-Pattern based Off-Chain Crypto Money Laundering

    Detection
    http://arxiv.org/abs/2508.12641v1

  • Consiglieres in the Shadow: Understanding the Use of Uncensored Large

    Language Models in Cybercrimes
    http://arxiv.org/abs/2508.12622v1

  • UAV Individual Identification via Distilled RF Fingerprints-Based LLM in

    ISAC Networks
    http://arxiv.org/abs/2508.12597v1

  • Reducing False Positives with Active Behavioral Analysis for Cloud

    Security
    http://arxiv.org/abs/2508.12584v1

  • Cyber Risks to Next-Gen Brain-Computer Interfaces: Analysis and

    Recommendations
    http://arxiv.org/abs/2508.12571v1

  • Data-driven Trust Bootstrapping for Mobile Edge Computing-based

    Industrial IoT Services
    http://arxiv.org/abs/2508.12560v1

  • DEFENDCLI: {Command-Line} Driven Attack Provenance Examination

    http://arxiv.org/abs/2508.12553v1

  • The Hidden Cost of Correlation: Rethinking Privacy Leakage in Local

    Differential Privacy
    http://arxiv.org/abs/2508.12539v1

  • Systematic Analysis of MCP Security

    http://arxiv.org/abs/2508.12538v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu