サイバーarXiv

#264 サイバーarxiv (2025-09-15)


Listen Later

本日紹介した論文の一覧

  • LOKI: Proactively Discovering Online Scam Websites by Mining Toxic

    Search Queries
    http://arxiv.org/abs/2509.12181v1

  • Poison to Detect: Detection of Targeted Overfitting in Federated

    Learning
    http://arxiv.org/abs/2509.11974v1

  • Time-Constrained Intelligent Adversaries for Automation Vulnerability

    Testing: A Multi-Robot Patrol Case Study
    http://arxiv.org/abs/2509.11971v1

  • zkToken: Empowering Holders to Limit Revocation Checks for Verifiable

    Credentials
    http://arxiv.org/abs/2509.11934v1

  • Efficient Byzantine-Robust Privacy-Preserving Federated Learning via

    Dimension Compression
    http://arxiv.org/abs/2509.11870v1

  • NeuroStrike: Neuron-Level Attacks on Aligned LLMs

    http://arxiv.org/abs/2509.11864v1

  • A Practical Adversarial Attack against Sequence-based Deep Learning

    Malware Classifiers
    http://arxiv.org/abs/2509.11836v1

  • Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP

    Address Sharing Scenarios
    http://arxiv.org/abs/2509.11833v1

  • Anomaly Detection in Industrial Control Systems Based on Cross-Domain

    Representation Learning
    http://arxiv.org/abs/2509.11786v1

  • On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy

    Constraints
    http://arxiv.org/abs/2509.11761v1

  • Removal Attack and Defense on AI-generated Content Latent-based

    Watermarking
    http://arxiv.org/abs/2509.11745v1

  • A Holistic Approach to E-Commerce Innovation: Redefining Security and

    User Experience
    http://arxiv.org/abs/2509.11712v1

  • Time-Based State-Management of Hash-Based Signature CAs for

    VPN-Authentication
    http://arxiv.org/abs/2509.11695v1

  • An Unsupervised Learning Approach For A Reliable Profiling Of Cyber

    Threat Actors Reported Globally Based On Complete Contextual Information Of
    Cyber Attacks
    http://arxiv.org/abs/2509.11683v1

  • Cyber Attack Mitigation Framework for Denial of Service (DoS) Attacks in

    Fog Computing
    http://arxiv.org/abs/2509.11668v1

  • Inducing Uncertainty for Test-Time Privacy

    http://arxiv.org/abs/2509.11625v1

  • Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from

    Cyber Threat Intelligence for Precise Threats Attribution
    http://arxiv.org/abs/2509.11615v1

  • AMLNet: A Knowledge-Based Multi-Agent Framework to Generate and Detect

    Realistic Money Laundering Transactions
    http://arxiv.org/abs/2509.11595v1

  • ILA: Correctness via Type Checking for Fully Homomorphic Encryption

    http://arxiv.org/abs/2509.11559v1

  • Dstack: A Zero Trust Framework for Confidential Containers

    http://arxiv.org/abs/2509.11555v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu