サイバーarXiv

#27 サイバーarxiv (2024-02-19)


Listen Later

本日紹介した論文の一覧

  • An Adversarial Approach to Evaluating the Robustness of Event

    Identification Models
    http://arxiv.org/abs/2402.12338v1

  • Query-Based Adversarial Prompt Generation

    http://arxiv.org/abs/2402.12329v1

  • An Interview Study on Third-Party Cyber Threat Hunting Processes in the

    U.S. Department of Homeland Security
    http://arxiv.org/abs/2402.12252v1

  • The Fundamental Limits of Least-Privilege Learning

    http://arxiv.org/abs/2402.12235v1

  • CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement

    Learning for LLM-based Mutation
    http://arxiv.org/abs/2402.12222v1

  • Amplifying Training Data Exposure through Fine-Tuning with

    Pseudo-Labeled Memberships
    http://arxiv.org/abs/2402.12189v1

  • Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep

    Learning via Adversarial Training
    http://arxiv.org/abs/2402.12187v1

  • Defending Against Weight-Poisoning Backdoor Attacks for

    Parameter-Efficient Fine-Tuning
    http://arxiv.org/abs/2402.12168v1

  • SCARF: Securing Chips with a Robust Framework against Fabrication-time

    Hardware Trojans
    http://arxiv.org/abs/2402.12162v1

  • Federated Bayesian Network Ensembles

    http://arxiv.org/abs/2402.12142v1

  • Groot: Adversarial Testing for Generative Text-to-Image Models with

    Tree-based Semantic Transformation
    http://arxiv.org/abs/2402.12100v1

  • Attack Tree Generation via Process Mining

    http://arxiv.org/abs/2402.12040v1

  • Acquiring Clean Language Models from Backdoor Poisoned Datasets by

    Downscaling Frequency Space
    http://arxiv.org/abs/2402.12026v1

  • Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on

    Chain of Thought
    http://arxiv.org/abs/2402.12023v1

  • Privacy-Preserving Low-Rank Adaptation for Latent Diffusion Models

    http://arxiv.org/abs/2402.11989v1

  • Stealing the Invisible: Unveiling Pre-Trained CNN Models through

    Adversarial Examples and Timing Side-Channels
    http://arxiv.org/abs/2402.11953v1

  • AICAttack: Adversarial Image Captioning Attack with Attention-Based

    Optimization
    http://arxiv.org/abs/2402.11940v1

  • Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced

    Tracking and Security Features
    http://arxiv.org/abs/2402.11829v1

  • An Empirical Evaluation of LLMs for Solving Offensive Security

    Challenges
    http://arxiv.org/abs/2402.11814v1

  • SPML: A DSL for Defending Language Models Against Prompt Attacks

    http://arxiv.org/abs/2402.11755v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu