
Sign up to save your podcasts
Or


Multi-Agent Distributed Optimization With Feasible Set Privacy
Proactive defense against LLM Jailbreak
On Cryptography and Distribution Verification, with Applications to
Imperceptible Jailbreaking against Large Language Models
Less is More: On Copy Complexity in Quantum Cryptography
NatGVD: Natural Adversarial Example Attack towards Graph-based
What your brain activity says about you: A review of neuropsychiatric
Federated Computation of ROC and PR Curves
RL Is a Hammer and LLMs Are Nails: A Simple Reinforcement Learning
Enhancing TreePIR for a Single-Server Setting via Resampling
Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption
Modeling and Managing Temporal Obligations in GUCON Using SPARQL-star
Backing the Wrong Horse: How Bit-Level Netlist Augmentation can Counter
PoS-CoPOR: Proof-of-Stake Consensus Protocol with Native Onion Routing
Computational Certified Deletion Property of Magic Square Game and its
Unified Threat Detection and Mitigation Framework (UTDMF): Combating
P2P: A Poison-to-Poison Remedy for Reliable Backdoor Defense in LLMs
Autonomy Matters: A Study on Personalization-Privacy Dilemma in LLM
Quantum Cryptography and Hardness of Non-Collapsing Measurements
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuMulti-Agent Distributed Optimization With Feasible Set Privacy
Proactive defense against LLM Jailbreak
On Cryptography and Distribution Verification, with Applications to
Imperceptible Jailbreaking against Large Language Models
Less is More: On Copy Complexity in Quantum Cryptography
NatGVD: Natural Adversarial Example Attack towards Graph-based
What your brain activity says about you: A review of neuropsychiatric
Federated Computation of ROC and PR Curves
RL Is a Hammer and LLMs Are Nails: A Simple Reinforcement Learning
Enhancing TreePIR for a Single-Server Setting via Resampling
Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption
Modeling and Managing Temporal Obligations in GUCON Using SPARQL-star
Backing the Wrong Horse: How Bit-Level Netlist Augmentation can Counter
PoS-CoPOR: Proof-of-Stake Consensus Protocol with Native Onion Routing
Computational Certified Deletion Property of Magic Square Game and its
Unified Threat Detection and Mitigation Framework (UTDMF): Combating
P2P: A Poison-to-Poison Remedy for Reliable Backdoor Defense in LLMs
Autonomy Matters: A Study on Personalization-Privacy Dilemma in LLM
Quantum Cryptography and Hardness of Non-Collapsing Measurements
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>