
Sign up to save your podcasts
Or


An efficient quantum algorithm for computing $S$-units and its
Reproducible Builds for Quantum Computing
Authentication Security of PRF GNSS Ranging
UpSafe$^\circ$C: Upcycling for Controllable Safety in Large Language
FalseCrashReducer: Mitigating False Positive Crashes in OSS-Fuzz-Gen
TAIBOM: Bringing Trustworthiness to AI-Enabled Systems
NoMod: A Non-modular Attack on Module Learning With Errors
Mirage Fools the Ear, Mute Hides the Truth: Precise Targeted Adversarial
ZK-WAGON: Imperceptible Watermark for Image Generation Models using
Secure Multi-Modal Data Fusion in Federated Digital Health Systems via
Constructions of Efficiently Implementable Boolean Functions with
Towards Imperceptible Adversarial Defense: A Gradient-Driven Shield
Evaluating the Robustness of a Production Malware Detection System to
Just Do It!? Computer-Use Agents Exhibit Blind Goal-Directedness
Position: Privacy Is Not Just Memorization!
POLAR: Automating Cyber Threat Prioritization through LLM-Powered
Bypassing Prompt Guards in Production with Controlled-Release Prompting
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuAn efficient quantum algorithm for computing $S$-units and its
Reproducible Builds for Quantum Computing
Authentication Security of PRF GNSS Ranging
UpSafe$^\circ$C: Upcycling for Controllable Safety in Large Language
FalseCrashReducer: Mitigating False Positive Crashes in OSS-Fuzz-Gen
TAIBOM: Bringing Trustworthiness to AI-Enabled Systems
NoMod: A Non-modular Attack on Module Learning With Errors
Mirage Fools the Ear, Mute Hides the Truth: Precise Targeted Adversarial
ZK-WAGON: Imperceptible Watermark for Image Generation Models using
Secure Multi-Modal Data Fusion in Federated Digital Health Systems via
Constructions of Efficiently Implementable Boolean Functions with
Towards Imperceptible Adversarial Defense: A Gradient-Driven Shield
Evaluating the Robustness of a Production Malware Detection System to
Just Do It!? Computer-Use Agents Exhibit Blind Goal-Directedness
Position: Privacy Is Not Just Memorization!
POLAR: Automating Cyber Threat Prioritization through LLM-Powered
Bypassing Prompt Guards in Production with Controlled-Release Prompting
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>