サイバーarXiv

#260 サイバーarxiv (2025-09-08)


Listen Later

本日紹介した論文の一覧

  • Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and

    Opportunities
    http://arxiv.org/abs/2509.06921v1

  • An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and

    Detection
    http://arxiv.org/abs/2509.06920v1

  • Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers

    from LLMs via Claim Verification
    http://arxiv.org/abs/2509.06902v1

  • EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language

    Models
    http://arxiv.org/abs/2509.06838v1

  • Imitative Membership Inference Attack

    http://arxiv.org/abs/2509.06796v1

  • Image Encryption Scheme Based on Hyper-Chaotic Map and Self-Adaptive

    Diffusion
    http://arxiv.org/abs/2509.06754v1

  • When Secure Isn't: Assessing the Security of Machine Learning Model

    Sharing
    http://arxiv.org/abs/2509.06703v1

  • Network-level Censorship Attacks in the InterPlanetary File System

    http://arxiv.org/abs/2509.06626v1

  • A Secure Sequencer and Data Availability Committee for Rollups (Extended

    Version)
    http://arxiv.org/abs/2509.06614v1

  • LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop?

    http://arxiv.org/abs/2509.06595v1

  • Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on

    the MCP Ecosystem
    http://arxiv.org/abs/2509.06572v1

  • A Simple Data Exfiltration Game

    http://arxiv.org/abs/2509.06571v1

  • Marginal sets in semigroups and semirings

    http://arxiv.org/abs/2509.06562v1

  • Contrastive Self-Supervised Network Intrusion Detection using Augmented

    Negative Pairs
    http://arxiv.org/abs/2509.06550v1

  • Super-Quadratic Quantum Speed-ups and Guessing Many Likely Keys

    http://arxiv.org/abs/2509.06549v1

  • Signal-Based Malware Classification Using 1D CNNs

    http://arxiv.org/abs/2509.06548v1

  • Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V

    Processors
    http://arxiv.org/abs/2509.06509v1

  • When Code Crosses Borders: A Security-Centric Evaluation of LLM-based

    Code Translation
    http://arxiv.org/abs/2509.06504v1

  • NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network

    Executables
    http://arxiv.org/abs/2509.06402v1

  • From Perception to Protection: A Developer-Centered Study of Security

    and Privacy Threats in Extended Reality (XR)
    http://arxiv.org/abs/2509.06368v1

  • Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak

    Attacks?
    http://arxiv.org/abs/2509.06350v1

  • Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic

    Shift
    http://arxiv.org/abs/2509.06338v1

  • Multi View Slot Attention Using Paraphrased Texts For Face Anti-Spoofing

    http://arxiv.org/abs/2509.06336v1

  • AttestLLM: Efficient Attestation Framework for Billion-scale On-device

    LLMs
    http://arxiv.org/abs/2509.06326v1

  • Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack

    http://arxiv.org/abs/2509.06318v1

  • PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss

    Random Variable Optimization
    http://arxiv.org/abs/2509.06264v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu