
Sign up to save your podcasts
Or


An Efficient Lightweight Blockchain for Decentralized IoT
SecureV2X: An Efficient and Privacy-Preserving System for
Attackers Strike Back? Not Anymore -- An Ensemble of RL Defenders
mmKey: Channel-Aware Beam Shaping for Reliable Key Generation in mmWave
The Double-edged Sword of LLM-based Data Reconstruction: Understanding
LLMs in the SOC: An Empirical Study of Human-AI Collaboration in
EnerSwap: Large-Scale, Privacy-First Automated Market Maker for V2G
DRMD: Deep Reinforcement Learning for Malware Detection under Concept
A Tight Context-aware Privacy Bound for Histogram Publication
Quantum computing on encrypted data with arbitrary rotation gates
Hidden Tail: Adversarial Image Causing Stealthy Resource Consumption in
Immutable Digital Recognition via Blockchain
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS
Membership Inference Attacks on LLM-based Recommender Systems
UniC-RAG: Universal Knowledge Corruption Attacks to Retrieval-Augmented
PRISM: Robust VLM Alignment with Principled Reasoning for Integrated
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuAn Efficient Lightweight Blockchain for Decentralized IoT
SecureV2X: An Efficient and Privacy-Preserving System for
Attackers Strike Back? Not Anymore -- An Ensemble of RL Defenders
mmKey: Channel-Aware Beam Shaping for Reliable Key Generation in mmWave
The Double-edged Sword of LLM-based Data Reconstruction: Understanding
LLMs in the SOC: An Empirical Study of Human-AI Collaboration in
EnerSwap: Large-Scale, Privacy-First Automated Market Maker for V2G
DRMD: Deep Reinforcement Learning for Malware Detection under Concept
A Tight Context-aware Privacy Bound for Histogram Publication
Quantum computing on encrypted data with arbitrary rotation gates
Hidden Tail: Adversarial Image Causing Stealthy Resource Consumption in
Immutable Digital Recognition via Blockchain
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS
Membership Inference Attacks on LLM-based Recommender Systems
UniC-RAG: Universal Knowledge Corruption Attacks to Retrieval-Augmented
PRISM: Robust VLM Alignment with Principled Reasoning for Integrated
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>