
Sign up to save your podcasts
Or


Approximate Algorithms for Verifying Differential Privacy with Gaussian
Wanilla: Sound Noninterference Analysis for WebAssembly
Membrane: A Cryptographic Access Control System for Data Lakes
Securing Cryptographic Software via Typed Assembly Language (Extended
SilentLedger: Privacy-Preserving Auditing for Blockchains with Complete
PAnDA: Rethinking Metric Differential Privacy Optimization at Scale with
Securing Private Federated Learning in a Malicious Setting: A Scalable
Tight Privacy Audit in One Run
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution
Send to which account? Evaluation of an LLM-based Scambaiting System
Flow-Based Detection and Identification of Zero-Day IoT Cameras
Adversarial Attacks Against Automated Fact-Checking: A Survey
DSFL: A Dual-Server Byzantine-Resilient Federated Learning Framework via
Phishing Webpage Detection: Unveiling the Threat Landscape and
Leveraging Blockchain and Proxy Re-Encryption to secure Medical IoT
MIoT-Driven Comparison of Open Blockchain Platforms
Efficient Decoding Methods for Language Models on Encrypted Data
Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage
Overcoming DNSSEC Islands of Security: A TLS and IP-Based Certificate
EFPIX: A zero-trust encrypted flood protocol
Unlocking Reproducibility: Automating re-Build Process for Open-Source
Accelerating AI Development with Cyber Arenas
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuApproximate Algorithms for Verifying Differential Privacy with Gaussian
Wanilla: Sound Noninterference Analysis for WebAssembly
Membrane: A Cryptographic Access Control System for Data Lakes
Securing Cryptographic Software via Typed Assembly Language (Extended
SilentLedger: Privacy-Preserving Auditing for Blockchains with Complete
PAnDA: Rethinking Metric Differential Privacy Optimization at Scale with
Securing Private Federated Learning in a Malicious Setting: A Scalable
Tight Privacy Audit in One Run
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute
AutoStub: Genetic Programming-Based Stub Creation for Symbolic Execution
Send to which account? Evaluation of an LLM-based Scambaiting System
Flow-Based Detection and Identification of Zero-Day IoT Cameras
Adversarial Attacks Against Automated Fact-Checking: A Survey
DSFL: A Dual-Server Byzantine-Resilient Federated Learning Framework via
Phishing Webpage Detection: Unveiling the Threat Landscape and
Leveraging Blockchain and Proxy Re-Encryption to secure Medical IoT
MIoT-Driven Comparison of Open Blockchain Platforms
Efficient Decoding Methods for Language Models on Encrypted Data
Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage
Overcoming DNSSEC Islands of Security: A TLS and IP-Based Certificate
EFPIX: A zero-trust encrypted flood protocol
Unlocking Reproducibility: Automating re-Build Process for Open-Source
Accelerating AI Development with Cyber Arenas
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>