
Sign up to save your podcasts
Or


PACEbench: A Framework for Evaluating Practical AI Cyber-Exploitation
Continual Release of Densest Subgraphs: Privacy Amplification &
Bag of Tricks for Subverting Reasoning-based Safety Guardrails
Uncertainty-Aware, Risk-Adaptive Access Control for Agentic Systems
Living Off the LLM: How LLMs Will Change Adversary Tactics
TBRD: TESLA Authenticated UAS Broadcast Remote ID
TDADL-IE: A Deep Learning-Driven Cryptographic Architecture for Medical
How to Get Actual Privacy and Utility from Privacy Models: the
Large Language Models Are Effective Code Watermarkers
Collaborative Shadows: Distributed Backdoor Attacks in LLM-Based
MPCitH-based Signatures from Restricted Decoding Problems
TraceAegis: Securing LLM-Based Agents via Hierarchical and Behavioral
Evaluating Line-level Localization Ability of Learning-based Code
RAG-Pull: Imperceptible Attacks on RAG Systems for Code Generation
TypePilot: Leveraging the Scala Type System for Secure LLM-generated
CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense
N-output Mechanism: Estimating Statistical Information from Numerical
A Vision for Access Control in LLM-based Agent Systems
Stabilizing the Staking Rate, Dynamically Distributed Inflation and
Secret-Protected Evolution for Differentially Private Synthetic Text
DITTO: A Spoofing Attack Framework on Watermarked LLMs via Knowledge
Neutral Agent-based Adversarial Policy Learning against Deep
TabVLA: Targeted Backdoor Attacks on Vision-Language-Action Models
A Symmetric-Key Cryptosystem Based on the Burnside Ring of a Compact Lie
A Simple and Efficient One-Shot Signature Scheme
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuPACEbench: A Framework for Evaluating Practical AI Cyber-Exploitation
Continual Release of Densest Subgraphs: Privacy Amplification &
Bag of Tricks for Subverting Reasoning-based Safety Guardrails
Uncertainty-Aware, Risk-Adaptive Access Control for Agentic Systems
Living Off the LLM: How LLMs Will Change Adversary Tactics
TBRD: TESLA Authenticated UAS Broadcast Remote ID
TDADL-IE: A Deep Learning-Driven Cryptographic Architecture for Medical
How to Get Actual Privacy and Utility from Privacy Models: the
Large Language Models Are Effective Code Watermarkers
Collaborative Shadows: Distributed Backdoor Attacks in LLM-Based
MPCitH-based Signatures from Restricted Decoding Problems
TraceAegis: Securing LLM-Based Agents via Hierarchical and Behavioral
Evaluating Line-level Localization Ability of Learning-based Code
RAG-Pull: Imperceptible Attacks on RAG Systems for Code Generation
TypePilot: Leveraging the Scala Type System for Secure LLM-generated
CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense
N-output Mechanism: Estimating Statistical Information from Numerical
A Vision for Access Control in LLM-based Agent Systems
Stabilizing the Staking Rate, Dynamically Distributed Inflation and
Secret-Protected Evolution for Differentially Private Synthetic Text
DITTO: A Spoofing Attack Framework on Watermarked LLMs via Knowledge
Neutral Agent-based Adversarial Policy Learning against Deep
TabVLA: Targeted Backdoor Attacks on Vision-Language-Action Models
A Symmetric-Key Cryptosystem Based on the Burnside Ring of a Compact Lie
A Simple and Efficient One-Shot Signature Scheme
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>