
Sign up to save your podcasts
Or


Strategic Dishonesty Can Undermine AI Safety Evaluations of Frontier LLM
Hybrid Reputation Aggregation: A Robust Defense Mechanism for
STAFF: Stateful Taint-Assisted Full-system Firmware Fuzzing
Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data
The Reverse File System: Towards open cost-effective secure WORM storage
What if we could hot swap our Biometrics?
B-Privacy: Defining and Enforcing Privacy in Weighted Voting
Federated Learning in the Wild: A Comparative Study for Cybersecurity
AEAS: Actionable Exploit Assessment System
Quickest Change Detection in Continuous-Time in Presence of a Covert
Public Key Encryption with Equality Test from Tag-Based Encryption
Ordered Multi-Signatures with Public-Key Aggregation from SXDH
Impossibility Results of Card-Based Protocols via Mathematical
PRNU-Bench: A Novel Benchmark and Model for PRNU-Based Camera
Community Covert Communication - Dynamic Mass Covert Communication
Privacy in Action: Towards Realistic Privacy Mitigation and Evaluation
DINVMark: A Deep Invertible Network for Video Watermarking
A Lightweight Authentication and Key Agreement Protocol Design for FANET
SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models
TextCrafter: Optimization-Calibrated Noise for Defending Against Text
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuStrategic Dishonesty Can Undermine AI Safety Evaluations of Frontier LLM
Hybrid Reputation Aggregation: A Robust Defense Mechanism for
STAFF: Stateful Taint-Assisted Full-system Firmware Fuzzing
Synth-MIA: A Testbed for Auditing Privacy Leakage in Tabular Data
The Reverse File System: Towards open cost-effective secure WORM storage
What if we could hot swap our Biometrics?
B-Privacy: Defining and Enforcing Privacy in Weighted Voting
Federated Learning in the Wild: A Comparative Study for Cybersecurity
AEAS: Actionable Exploit Assessment System
Quickest Change Detection in Continuous-Time in Presence of a Covert
Public Key Encryption with Equality Test from Tag-Based Encryption
Ordered Multi-Signatures with Public-Key Aggregation from SXDH
Impossibility Results of Card-Based Protocols via Mathematical
PRNU-Bench: A Novel Benchmark and Model for PRNU-Based Camera
Community Covert Communication - Dynamic Mass Covert Communication
Privacy in Action: Towards Realistic Privacy Mitigation and Evaluation
DINVMark: A Deep Invertible Network for Video Watermarking
A Lightweight Authentication and Key Agreement Protocol Design for FANET
SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models
TextCrafter: Optimization-Calibrated Noise for Defending Against Text
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>