
Sign up to save your podcasts
Or


ImportSnare: Directed "Code Manual" Hijacking in Retrieval-Augmented
Guided Reasoning in LLM-Driven Penetration Testing Using Structured
A Non-Monotonic Relationship: An Empirical Analysis of Hybrid Quantum
Inner-product Functional Encryption with Fine-grained Revocation for
AgentSentinel: An End-to-End and Real-Time Security Defense Framework
Empirical Security Analysis of Software-based Fault Isolation through
Factuality Beyond Coherence: Evaluating LLM Watermarking Methods for
Leveraging Digital Twin-as-a-Service Towards Continuous and Automated
Embedded Off-Switches for AI Compute
FlexEmu: Towards Flexible MCU Peripheral Emulation (Extended Version)
Enhanced cast-128 with adaptive s-box optimization via neural networks
PatchSeeker: Mapping NVD Records to their Vulnerability-fixing Commits
Extension of Spatial k-Anonymity: New Metrics for Assessing the
Backdoor Attacks and Defenses in Computer Vision Domain: A Survey
Biometric Bound Credentials for Age Verification
A Decade-long Landscape of Advanced Persistent Threats: Longitudinal
When Fine-Tuning is Not Enough: Lessons from HSAD on Hybrid and
SafeToolBench: Pioneering a Prospective Benchmark to Evaluating Tool
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuImportSnare: Directed "Code Manual" Hijacking in Retrieval-Augmented
Guided Reasoning in LLM-Driven Penetration Testing Using Structured
A Non-Monotonic Relationship: An Empirical Analysis of Hybrid Quantum
Inner-product Functional Encryption with Fine-grained Revocation for
AgentSentinel: An End-to-End and Real-Time Security Defense Framework
Empirical Security Analysis of Software-based Fault Isolation through
Factuality Beyond Coherence: Evaluating LLM Watermarking Methods for
Leveraging Digital Twin-as-a-Service Towards Continuous and Automated
Embedded Off-Switches for AI Compute
FlexEmu: Towards Flexible MCU Peripheral Emulation (Extended Version)
Enhanced cast-128 with adaptive s-box optimization via neural networks
PatchSeeker: Mapping NVD Records to their Vulnerability-fixing Commits
Extension of Spatial k-Anonymity: New Metrics for Assessing the
Backdoor Attacks and Defenses in Computer Vision Domain: A Survey
Biometric Bound Credentials for Age Verification
A Decade-long Landscape of Advanced Persistent Threats: Longitudinal
When Fine-Tuning is Not Enough: Lessons from HSAD on Hybrid and
SafeToolBench: Pioneering a Prospective Benchmark to Evaluating Tool
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>