サイバーarXiv

#28 サイバーarxiv (2024-02-20)


Listen Later

本日紹介した論文の一覧

  • Formal Verification for Blockchain-based Insurance Claims Processing

    http://arxiv.org/abs/2402.13169v1

  • Defending Jailbreak Prompts via In-Context Adversarial Game

    http://arxiv.org/abs/2402.13148v1

  • VGMShield: Mitigating Misuse of Video Generative Models

    http://arxiv.org/abs/2402.13126v1

  • How Does Selection Leak Privacy: Revisiting Private Selection and

    Improved Results for Hyper-parameter Tuning
    http://arxiv.org/abs/2402.13087v1

  • IT Intrusion Detection Using Statistical Learning and Testbed

    Measurements
    http://arxiv.org/abs/2402.13081v1

  • TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box

    Identification
    http://arxiv.org/abs/2402.12991v1

  • Quantifying Privacy via Information Density

    http://arxiv.org/abs/2402.12967v1

  • Prompt Stealing Attacks Against Large Language Models

    http://arxiv.org/abs/2402.12959v1

  • BFT-DSN: A Byzantine Fault Tolerant Decentralized Storage Network

    http://arxiv.org/abs/2402.12889v1

  • Federated Multi-Task Learning on Non-IID Data Silos: An Experimental

    Study
    http://arxiv.org/abs/2402.12876v1

  • A Novel Protocol Using Captive Portals for FIDO2 Network Authentication

    http://arxiv.org/abs/2402.12864v1

  • Bounding Reconstruction Attack Success of Adversaries Without Data

    Priors
    http://arxiv.org/abs/2402.12861v1

  • APT-MMF: An advanced persistent threat actor attribution method based on

    multimodal and multilevel feature fusion
    http://arxiv.org/abs/2402.12743v1

  • Revisiting the Information Capacity of Neural Network Watermarks: Upper

    Bound Estimation and Beyond
    http://arxiv.org/abs/2402.12720v1

  • Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel

    Attack
    http://arxiv.org/abs/2402.12716v1

  • Robust-Wide: Robust Watermarking against Instruction-driven Image

    Editing
    http://arxiv.org/abs/2402.12688v1

  • Rampo: A CEGAR-based Integration of Binary Code Analysis and System

    Falsification for Cyber-Kinetic Vulnerability Detection
    http://arxiv.org/abs/2402.12642v1

  • Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors

    http://arxiv.org/abs/2402.12626v1

  • Generative AI Security: Challenges and Countermeasures

    http://arxiv.org/abs/2402.12617v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu