
Sign up to save your podcasts
Or


An Adversarial Approach to Evaluating the Robustness of Event
Query-Based Adversarial Prompt Generation
An Interview Study on Third-Party Cyber Threat Hunting Processes in the
The Fundamental Limits of Least-Privilege Learning
CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement
Amplifying Training Data Exposure through Fine-Tuning with
Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep
Defending Against Weight-Poisoning Backdoor Attacks for
SCARF: Securing Chips with a Robust Framework against Fabrication-time
Federated Bayesian Network Ensembles
Groot: Adversarial Testing for Generative Text-to-Image Models with
Attack Tree Generation via Process Mining
Acquiring Clean Language Models from Backdoor Poisoned Datasets by
Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on
Privacy-Preserving Low-Rank Adaptation for Latent Diffusion Models
Stealing the Invisible: Unveiling Pre-Trained CNN Models through
AICAttack: Adversarial Image Captioning Attack with Attention-Based
Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced
An Empirical Evaluation of LLMs for Solving Offensive Security
SPML: A DSL for Defending Language Models Against Prompt Attacks
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuAn Adversarial Approach to Evaluating the Robustness of Event
Query-Based Adversarial Prompt Generation
An Interview Study on Third-Party Cyber Threat Hunting Processes in the
The Fundamental Limits of Least-Privilege Learning
CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement
Amplifying Training Data Exposure through Fine-Tuning with
Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep
Defending Against Weight-Poisoning Backdoor Attacks for
SCARF: Securing Chips with a Robust Framework against Fabrication-time
Federated Bayesian Network Ensembles
Groot: Adversarial Testing for Generative Text-to-Image Models with
Attack Tree Generation via Process Mining
Acquiring Clean Language Models from Backdoor Poisoned Datasets by
Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on
Privacy-Preserving Low-Rank Adaptation for Latent Diffusion Models
Stealing the Invisible: Unveiling Pre-Trained CNN Models through
AICAttack: Adversarial Image Captioning Attack with Attention-Based
Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced
An Empirical Evaluation of LLMs for Solving Offensive Security
SPML: A DSL for Defending Language Models Against Prompt Attacks
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>