
Sign up to save your podcasts
Or


CryptoGuard: An AI-Based Cryptojacking Detection Dashboard Prototype
I Know Who Clones Your Code: Interpretable Smart Contract Similarity
Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset
What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion
Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts
ENSI: Efficient Non-Interactive Secure Inference for Large Language
[Extended] Ethics in Computer Security Research: A Data-Driven
On the Security of SSH Client Signatures
ORCA: Unveiling Obscure Containers In The Wild
What You Code Is What We Prove: Translating BLE App Logic into Formal
A Cyber-Twin Based Honeypot for Gathering Threat Intelligence
Enabling Regulatory Multi-Agent Collaboration: Architecture, Challenges,
Shell or Nothing: Real-World Benchmarks and Memory-Activated Agents for
Enhancing Cyber Threat Hunting -- A Visual Approach with the Forensic
IoTFuzzSentry: A Protocol Guided Mutation Based Fuzzer for Automatic
Character-Level Perturbations Disrupt LLM Watermarks
CryptGNN: Enabling Secure Inference for Graph Neural Networks
AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System
DP-FedLoRA: Privacy-Enhanced Federated Fine-Tuning for On-Device Large
Towards Confidential and Efficient LLM Inference with Dual Privacy
Beyond Tag Collision: Cluster-based Memory Management for Tag-based
Fingerprinting Deep Packet Inspection Devices by Their Ambiguities
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuCryptoGuard: An AI-Based Cryptojacking Detection Dashboard Prototype
I Know Who Clones Your Code: Interpretable Smart Contract Similarity
Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset
What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion
Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts
ENSI: Efficient Non-Interactive Secure Inference for Large Language
[Extended] Ethics in Computer Security Research: A Data-Driven
On the Security of SSH Client Signatures
ORCA: Unveiling Obscure Containers In The Wild
What You Code Is What We Prove: Translating BLE App Logic into Formal
A Cyber-Twin Based Honeypot for Gathering Threat Intelligence
Enabling Regulatory Multi-Agent Collaboration: Architecture, Challenges,
Shell or Nothing: Real-World Benchmarks and Memory-Activated Agents for
Enhancing Cyber Threat Hunting -- A Visual Approach with the Forensic
IoTFuzzSentry: A Protocol Guided Mutation Based Fuzzer for Automatic
Character-Level Perturbations Disrupt LLM Watermarks
CryptGNN: Enabling Secure Inference for Graph Neural Networks
AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System
DP-FedLoRA: Privacy-Enhanced Federated Fine-Tuning for On-Device Large
Towards Confidential and Efficient LLM Inference with Dual Privacy
Beyond Tag Collision: Cluster-based Memory Management for Tag-based
Fingerprinting Deep Packet Inspection Devices by Their Ambiguities
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>