
Sign up to save your podcasts
Or


Cocoon: A System Architecture for Differentially Private Training with
Security-Robustness Trade-offs in Diffusion Steganography: A Comparative
Covert Quantum Learning: Privately and Verifiably Learning from Quantum
Exposing LLM User Privacy via Traffic Fingerprint Analysis: A Study of
A multi-layered embedded intrusion detection framework for programmable
Spectral Graph Clustering under Differential Privacy: Balancing Privacy,
GNN-enhanced Traffic Anomaly Detection for Next-Generation SDN-Enabled
Pseudo-MDPs: A Novel Framework for Efficiently Optimizing Last Revealer
RedTWIZ: Diverse LLM Red Teaming via Adaptive Attack Planning
VelLMes: A high-interaction AI-based deception framework
I Can't Patch My OT Systems! A Look at CISA's KEVC Workarounds &
The Knowledge Complexity of Quantum Problems
Multi-hop Deep Joint Source-Channel Coding with Deep Hash Distillation
Exposing Citation Vulnerabilities in Generative Engines
Bionetta: Efficient Client-Side Zero-Knowledge Machine Learning Proving
Differentially Private Synthetic Text Generation for Retrieval-Augmented
Representation Gap of the Motzkin Monoid
Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial?
Distilling Lightweight Language Models for C/C++ Vulnerabilities
Unsupervised Backdoor Detection and Mitigation for Spiking Neural
Code Agent can be an End-to-end System Hacker: Benchmarking Real-world
Reading Between the Lines: Towards Reliable Black-box LLM Fingerprinting
Auto-Stega: An Agent-Driven System for Lifelong Strategy Evolution in
Benchmarking Fake Voice Detection in the Fake Voice Generation Arms Race
SpyChain: Multi-Vector Supply Chain Attacks on Small Satellite Systems
From Description to Detection: LLM based Extendable O-RAN Compliant
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuCocoon: A System Architecture for Differentially Private Training with
Security-Robustness Trade-offs in Diffusion Steganography: A Comparative
Covert Quantum Learning: Privately and Verifiably Learning from Quantum
Exposing LLM User Privacy via Traffic Fingerprint Analysis: A Study of
A multi-layered embedded intrusion detection framework for programmable
Spectral Graph Clustering under Differential Privacy: Balancing Privacy,
GNN-enhanced Traffic Anomaly Detection for Next-Generation SDN-Enabled
Pseudo-MDPs: A Novel Framework for Efficiently Optimizing Last Revealer
RedTWIZ: Diverse LLM Red Teaming via Adaptive Attack Planning
VelLMes: A high-interaction AI-based deception framework
I Can't Patch My OT Systems! A Look at CISA's KEVC Workarounds &
The Knowledge Complexity of Quantum Problems
Multi-hop Deep Joint Source-Channel Coding with Deep Hash Distillation
Exposing Citation Vulnerabilities in Generative Engines
Bionetta: Efficient Client-Side Zero-Knowledge Machine Learning Proving
Differentially Private Synthetic Text Generation for Retrieval-Augmented
Representation Gap of the Motzkin Monoid
Is the Hard-Label Cryptanalytic Model Extraction Really Polynomial?
Distilling Lightweight Language Models for C/C++ Vulnerabilities
Unsupervised Backdoor Detection and Mitigation for Spiking Neural
Code Agent can be an End-to-end System Hacker: Benchmarking Real-world
Reading Between the Lines: Towards Reliable Black-box LLM Fingerprinting
Auto-Stega: An Agent-Driven System for Lifelong Strategy Evolution in
Benchmarking Fake Voice Detection in the Fake Voice Generation Arms Race
SpyChain: Multi-Vector Supply Chain Attacks on Small Satellite Systems
From Description to Detection: LLM based Extendable O-RAN Compliant
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>