
Sign up to save your podcasts
Or


Recovering the Pre-Fine-Tuning Weights of Generative Models
A chaotic maps-based privacy-preserving distributed deep learning for
Transaction Capacity, Security and Latency in Blockchains
FedRDF: A Robust and Dynamic Aggregation Function against Poisoning
How Much Does Each Datapoint Leak Your Privacy? Quantifying the
On the Domain Generalizability of RF Fingerprints Through Multifractal
Systematic Literature Review of EM-SCA Attacks on Encryption
Privacy Attacks in Decentralized Learning
TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in
A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions
JustSTART: How to Find an RSA Authentication Bypass on Xilinx
Enhancing Cybersecurity Resilience in Finance with Deep Learning for
An advanced data fabric architecture leveraging homomorphic encryption
Federated Analytics-Empowered Frequent Pattern Mining for Decentralized
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns
DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated
Preserving Data Privacy for ML-driven Applications in Open Radio Access
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart
PAL: Proxy-Guided Black-Box Attack on Large Language Models
Characterizing the Modification Space of Signature IDS Rules
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuRecovering the Pre-Fine-Tuning Weights of Generative Models
A chaotic maps-based privacy-preserving distributed deep learning for
Transaction Capacity, Security and Latency in Blockchains
FedRDF: A Robust and Dynamic Aggregation Function against Poisoning
How Much Does Each Datapoint Leak Your Privacy? Quantifying the
On the Domain Generalizability of RF Fingerprints Through Multifractal
Systematic Literature Review of EM-SCA Attacks on Encryption
Privacy Attacks in Decentralized Learning
TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in
A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions
JustSTART: How to Find an RSA Authentication Bypass on Xilinx
Enhancing Cybersecurity Resilience in Finance with Deep Learning for
An advanced data fabric architecture leveraging homomorphic encryption
Federated Analytics-Empowered Frequent Pattern Mining for Decentralized
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns
DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated
Preserving Data Privacy for ML-driven Applications in Open Radio Access
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart
PAL: Proxy-Guided Black-Box Attack on Large Language Models
Characterizing the Modification Space of Signature IDS Rules
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>