
Sign up to save your podcasts
Or


Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and
Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers
EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language
Imitative Membership Inference Attack
Image Encryption Scheme Based on Hyper-Chaotic Map and Self-Adaptive
When Secure Isn't: Assessing the Security of Machine Learning Model
Network-level Censorship Attacks in the InterPlanetary File System
A Secure Sequencer and Data Availability Committee for Rollups (Extended
LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop?
Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on
A Simple Data Exfiltration Game
Marginal sets in semigroups and semirings
Contrastive Self-Supervised Network Intrusion Detection using Augmented
Super-Quadratic Quantum Speed-ups and Guessing Many Likely Keys
Signal-Based Malware Classification Using 1D CNNs
Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V
When Code Crosses Borders: A Security-Centric Evaluation of LLM-based
NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network
From Perception to Protection: A Developer-Centered Study of Security
Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak
Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic
Multi View Slot Attention Using Paraphrased Texts For Face Anti-Spoofing
AttestLLM: Efficient Attestation Framework for Billion-scale On-device
Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack
PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuNeuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and
Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers
EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language
Imitative Membership Inference Attack
Image Encryption Scheme Based on Hyper-Chaotic Map and Self-Adaptive
When Secure Isn't: Assessing the Security of Machine Learning Model
Network-level Censorship Attacks in the InterPlanetary File System
A Secure Sequencer and Data Availability Committee for Rollups (Extended
LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop?
Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on
A Simple Data Exfiltration Game
Marginal sets in semigroups and semirings
Contrastive Self-Supervised Network Intrusion Detection using Augmented
Super-Quadratic Quantum Speed-ups and Guessing Many Likely Keys
Signal-Based Malware Classification Using 1D CNNs
Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V
When Code Crosses Borders: A Security-Centric Evaluation of LLM-based
NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network
From Perception to Protection: A Developer-Centered Study of Security
Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak
Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic
Multi View Slot Attention Using Paraphrased Texts For Face Anti-Spoofing
AttestLLM: Efficient Attestation Framework for Billion-scale On-device
Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack
PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>