サイバーarXiv

#280 サイバーarxiv (2025-10-14)


Listen Later

本日紹介した論文の一覧

  • Hash chaining degrades security at Facebook

    http://arxiv.org/abs/2510.12665v1

  • PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused

    Graph Neural Networks
    http://arxiv.org/abs/2510.12652v1

  • Noisy Neighbor: Exploiting RDMA for Resource Exhaustion Attacks in

    Containerized Clouds
    http://arxiv.org/abs/2510.12629v1

  • Multi-Copy Security in Unclonable Cryptography

    http://arxiv.org/abs/2510.12626v1

  • Proof of Cloud: Data Center Execution Assurance for Confidential VMs

    http://arxiv.org/abs/2510.12469v1

  • Evaluating and Mitigating LLM-as-a-judge Bias in Communication Systems

    http://arxiv.org/abs/2510.12462v1

  • Attack-Specialized Deep Learning with Ensemble Fusion for Network

    Anomaly Detection
    http://arxiv.org/abs/2510.12455v1

  • Formal Models and Convergence Analysis for Context-Aware Security

    Verification
    http://arxiv.org/abs/2510.12440v1

  • Targeted Pooled Latent-Space Steganalysis Applied to Generative

    Steganography, with a Fix
    http://arxiv.org/abs/2510.12414v1

  • IP-Augmented Multi-Modal Malicious URL Detection Via Token-Contrastive

    Representation Enhancement and Multi-Granularity Fusion
    http://arxiv.org/abs/2510.12395v1

  • Traveling Salesman-Based Token Ordering Improves Stability in

    Homomorphically Encrypted Language Models
    http://arxiv.org/abs/2510.12343v1

  • DeepTrust: Multi-Step Classification through Dissimilar Adversarial

    Representations for Robust Android Malware Detection
    http://arxiv.org/abs/2510.12310v1

  • PromptLocate: Localizing Prompt Injection Attacks

    http://arxiv.org/abs/2510.12252v1

  • HackWorld: Evaluating Computer-Use Agents on Exploiting Web Application

    Vulnerabilities
    http://arxiv.org/abs/2510.12200v1

  • Leaking Queries On Secure Stream Processing Systems

    http://arxiv.org/abs/2510.12172v1

  • VeilAudit: Breaking the Deadlock Between Privacy and Accountability

    Across Blockchains
    http://arxiv.org/abs/2510.12153v1

  • Fairness-Constrained Optimization Attack in Federated Learning

    http://arxiv.org/abs/2510.12143v1

  • Locket: Robust Feature-Locking Technique for Language Models

    http://arxiv.org/abs/2510.12117v1

  • Elevating Medical Image Security: A Cryptographic Framework Integrating

    Hyperchaotic Map and GRU
    http://arxiv.org/abs/2510.12084v1

  • Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3

    http://arxiv.org/abs/2510.12062v1

  • Over-Threshold Multiparty Private Set Intersection for Collaborative

    Network Intrusion Detection
    http://arxiv.org/abs/2510.12045v1

  • Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce

    Applications
    http://arxiv.org/abs/2510.12031v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu