
Sign up to save your podcasts
Or


On the Out-of-Distribution Backdoor Attack for Federated Learning
Trustworthy and Confidential SBOM Exchange
Characterizing Phishing Pages by JavaScript Capabilities
Vulnerability Patching Across Software Products and Software Components:
Digital Sovereignty Control Framework for Military AI-based Cyber
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer
MIA-EPT: Membership Inference Attack via Error Prediction for Tabular
Bridging Threat Models and Detections: Formal Verification via CADP
xOffense: An AI-driven autonomous penetration testing framework with
Universal share based quantum multi secret image sharing scheme
xRWA: A Cross-Chain Framework for Interoperability of Real-World Assets
Sy-FAR: Symmetry-based Fair Adversarial Robustness
Jailbreaking Large Language Models Through Content Concretization
A Graph-Based Approach to Alert Contextualisation in Security Operations
EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable
A Fault Analysis on SNOVA
Hardened CTIDH: Dummy-Free and Deterministic CTIDH
A Scalable Architecture for Efficient Multi-bit Fully Homomorphic
A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for
Secure and Efficient Out-of-band Call Metadata Transmission
Yet Another Watermark for Large Language Models
Exploiting Timing Side-Channels in Quantum Circuits Simulation Via
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuOn the Out-of-Distribution Backdoor Attack for Federated Learning
Trustworthy and Confidential SBOM Exchange
Characterizing Phishing Pages by JavaScript Capabilities
Vulnerability Patching Across Software Products and Software Components:
Digital Sovereignty Control Framework for Military AI-based Cyber
SLasH-DSA: Breaking SLH-DSA Using an Extensible End-To-End Rowhammer
MIA-EPT: Membership Inference Attack via Error Prediction for Tabular
Bridging Threat Models and Detections: Formal Verification via CADP
xOffense: An AI-driven autonomous penetration testing framework with
Universal share based quantum multi secret image sharing scheme
xRWA: A Cross-Chain Framework for Interoperability of Real-World Assets
Sy-FAR: Symmetry-based Fair Adversarial Robustness
Jailbreaking Large Language Models Through Content Concretization
A Graph-Based Approach to Alert Contextualisation in Security Operations
EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable
A Fault Analysis on SNOVA
Hardened CTIDH: Dummy-Free and Deterministic CTIDH
A Scalable Architecture for Efficient Multi-bit Fully Homomorphic
A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for
Secure and Efficient Out-of-band Call Metadata Transmission
Yet Another Watermark for Large Language Models
Exploiting Timing Side-Channels in Quantum Circuits Simulation Via
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>