
Sign up to save your podcasts
Or


NoisePrints: Distortion-Free Watermarks for Authorship in Private
Local Information-Theoretic Security via Euclidean Geometry
In-Browser LLM-Guided Fuzzing for Real-Time Prompt Injection Testing in
How Blind and Low-Vision Users Manage Their Passwords
Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored
Toward Efficient Inference Attacks: Shadow Model Sharing via
Towards Trusted Service Monitoring: Verifiable Service Level Agreements
Generalist++: A Meta-learning Framework for Mitigating Trade-off in
Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine
Fast Authenticated and Interoperable Multimedia Healthcare Data over
GRIDAI: Generating and Repairing Intrusion Detection Rules via
Searching for a Farang: Collective Security among Women in Pattaya,
Privacy-Aware Framework of Robust Malware Detection in Indoor Robots:
ShuffleV: A Microarchitectural Defense Strategy against Electromagnetic
From base cases to backdoors: An Empirical Study of Unnatural Crypto-API
From misinformation to climate crisis: Navigating vulnerabilities in the
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuNoisePrints: Distortion-Free Watermarks for Authorship in Private
Local Information-Theoretic Security via Euclidean Geometry
In-Browser LLM-Guided Fuzzing for Real-Time Prompt Injection Testing in
How Blind and Low-Vision Users Manage Their Passwords
Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored
Toward Efficient Inference Attacks: Shadow Model Sharing via
Towards Trusted Service Monitoring: Verifiable Service Level Agreements
Generalist++: A Meta-learning Framework for Mitigating Trade-off in
Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine
Fast Authenticated and Interoperable Multimedia Healthcare Data over
GRIDAI: Generating and Repairing Intrusion Detection Rules via
Searching for a Farang: Collective Security among Women in Pattaya,
Privacy-Aware Framework of Robust Malware Detection in Indoor Robots:
ShuffleV: A Microarchitectural Defense Strategy against Electromagnetic
From base cases to backdoors: An Empirical Study of Unnatural Crypto-API
From misinformation to climate crisis: Navigating vulnerabilities in the
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>