
Sign up to save your podcasts
Or


AI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X
Compiling Any $\mathsf{MIP}^{*}$ into a (Succinct) Classical Interactive
Rethinking Provenance Completeness with a Learning-Based Linux Scheduler
An Improved Quantum Algorithm for 3-Tuple Lattice Sieving
Parallel Spooky Pebbling Makes Regev Factoring More Practical
ExPrESSO: Zero-Knowledge backed Extensive Privacy Preserving Single
A Haskell to FHE Transpiler
New Machine Learning Approaches for Intrusion Detection in ADS-B
Systematic Assessment of Cache Timing Vulnerabilities on RISC-V
TracE2E: Easily Deployable Middleware for Decentralized Data
LLMs Learn to Deceive Unintentionally: Emergent Misalignment in
LLM-Assisted Web Measurements
A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection:
A Unified Approach to Quantum Key Leasing with a Classical Lessor
Backdoor Vectors: a Task Arithmetic View on Backdoor Attacks and
Composition Law of Conjugate Observables in Random Permutation Sorting
Fewer Weights, More Problems: A Practical Attack on LLM Pruning
From Defender to Devil? Unintended Risk Interactions Induced by LLM
Decentralised Blockchain Management Through Digital Twins
MetaDefense: Defending Finetuning-based Jailbreak Attack Before and
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile
ANCORA: Accurate Intrusion Recovery for Web Applications
Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuAI-Driven Post-Quantum Cryptography for Cyber-Resilient V2X
Compiling Any $\mathsf{MIP}^{*}$ into a (Succinct) Classical Interactive
Rethinking Provenance Completeness with a Learning-Based Linux Scheduler
An Improved Quantum Algorithm for 3-Tuple Lattice Sieving
Parallel Spooky Pebbling Makes Regev Factoring More Practical
ExPrESSO: Zero-Knowledge backed Extensive Privacy Preserving Single
A Haskell to FHE Transpiler
New Machine Learning Approaches for Intrusion Detection in ADS-B
Systematic Assessment of Cache Timing Vulnerabilities on RISC-V
TracE2E: Easily Deployable Middleware for Decentralized Data
LLMs Learn to Deceive Unintentionally: Emergent Misalignment in
LLM-Assisted Web Measurements
A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection:
A Unified Approach to Quantum Key Leasing with a Classical Lessor
Backdoor Vectors: a Task Arithmetic View on Backdoor Attacks and
Composition Law of Conjugate Observables in Random Permutation Sorting
Fewer Weights, More Problems: A Practical Attack on LLM Pruning
From Defender to Devil? Unintended Risk Interactions Induced by LLM
Decentralised Blockchain Management Through Digital Twins
MetaDefense: Defending Finetuning-based Jailbreak Attack Before and
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile
ANCORA: Accurate Intrusion Recovery for Web Applications
Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>