
Sign up to save your podcasts
Or


LOKI: Proactively Discovering Online Scam Websites by Mining Toxic
Poison to Detect: Detection of Targeted Overfitting in Federated
Time-Constrained Intelligent Adversaries for Automation Vulnerability
zkToken: Empowering Holders to Limit Revocation Checks for Verifiable
Efficient Byzantine-Robust Privacy-Preserving Federated Learning via
NeuroStrike: Neuron-Level Attacks on Aligned LLMs
A Practical Adversarial Attack against Sequence-based Deep Learning
Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP
Anomaly Detection in Industrial Control Systems Based on Cross-Domain
On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy
Removal Attack and Defense on AI-generated Content Latent-based
A Holistic Approach to E-Commerce Innovation: Redefining Security and
Time-Based State-Management of Hash-Based Signature CAs for
An Unsupervised Learning Approach For A Reliable Profiling Of Cyber
Cyber Attack Mitigation Framework for Denial of Service (DoS) Attacks in
Inducing Uncertainty for Test-Time Privacy
Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from
AMLNet: A Knowledge-Based Multi-Agent Framework to Generate and Detect
ILA: Correctness via Type Checking for Fully Homomorphic Encryption
Dstack: A Zero Trust Framework for Confidential Containers
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuLOKI: Proactively Discovering Online Scam Websites by Mining Toxic
Poison to Detect: Detection of Targeted Overfitting in Federated
Time-Constrained Intelligent Adversaries for Automation Vulnerability
zkToken: Empowering Holders to Limit Revocation Checks for Verifiable
Efficient Byzantine-Robust Privacy-Preserving Federated Learning via
NeuroStrike: Neuron-Level Attacks on Aligned LLMs
A Practical Adversarial Attack against Sequence-based Deep Learning
Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP
Anomaly Detection in Industrial Control Systems Based on Cross-Domain
On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy
Removal Attack and Defense on AI-generated Content Latent-based
A Holistic Approach to E-Commerce Innovation: Redefining Security and
Time-Based State-Management of Hash-Based Signature CAs for
An Unsupervised Learning Approach For A Reliable Profiling Of Cyber
Cyber Attack Mitigation Framework for Denial of Service (DoS) Attacks in
Inducing Uncertainty for Test-Time Privacy
Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from
AMLNet: A Knowledge-Based Multi-Agent Framework to Generate and Detect
ILA: Correctness via Type Checking for Fully Homomorphic Encryption
Dstack: A Zero Trust Framework for Confidential Containers
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>