
Sign up to save your podcasts
Or


Formal Verification for Blockchain-based Insurance Claims Processing
Defending Jailbreak Prompts via In-Context Adversarial Game
VGMShield: Mitigating Misuse of Video Generative Models
How Does Selection Leak Privacy: Revisiting Private Selection and
IT Intrusion Detection Using Statistical Learning and Testbed
TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box
Quantifying Privacy via Information Density
Prompt Stealing Attacks Against Large Language Models
BFT-DSN: A Byzantine Fault Tolerant Decentralized Storage Network
Federated Multi-Task Learning on Non-IID Data Silos: An Experimental
A Novel Protocol Using Captive Portals for FIDO2 Network Authentication
Bounding Reconstruction Attack Success of Adversaries Without Data
APT-MMF: An advanced persistent threat actor attribution method based on
Revisiting the Information Capacity of Neural Network Watermarks: Upper
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel
Robust-Wide: Robust Watermarking against Instruction-driven Image
Rampo: A CEGAR-based Integration of Binary Code Analysis and System
Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors
Generative AI Security: Challenges and Countermeasures
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuFormal Verification for Blockchain-based Insurance Claims Processing
Defending Jailbreak Prompts via In-Context Adversarial Game
VGMShield: Mitigating Misuse of Video Generative Models
How Does Selection Leak Privacy: Revisiting Private Selection and
IT Intrusion Detection Using Statistical Learning and Testbed
TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box
Quantifying Privacy via Information Density
Prompt Stealing Attacks Against Large Language Models
BFT-DSN: A Byzantine Fault Tolerant Decentralized Storage Network
Federated Multi-Task Learning on Non-IID Data Silos: An Experimental
A Novel Protocol Using Captive Portals for FIDO2 Network Authentication
Bounding Reconstruction Attack Success of Adversaries Without Data
APT-MMF: An advanced persistent threat actor attribution method based on
Revisiting the Information Capacity of Neural Network Watermarks: Upper
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel
Robust-Wide: Robust Watermarking against Instruction-driven Image
Rampo: A CEGAR-based Integration of Binary Code Analysis and System
Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors
Generative AI Security: Challenges and Countermeasures
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>