
Sign up to save your podcasts
Or


A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic
Mapping Smarter, Not Harder: A Test-Time Reinforcement Learning Agent
Secure Sparse Matrix Multiplications and their Applications to
Provable Unlearning with Gradient Ascent on Two-Layer ReLU Neural
ColumnDisturb: Understanding Column-based Read Disturbance in Real DRAM
SLIE: A Secure and Lightweight Cryptosystem for Data Sharing in IoT
LLM Agents for Automated Web Vulnerability Reproduction: Are We There
FibRace: a large-scale benchmark of client-side proving on mobile
AEX-NStep: Probabilistic Interrupt Counting Attacks on Intel SGX
TITAN: Graph-Executable Reasoning for Cyber Threat Intelligence
Improving Cybercrime Detection and Digital Forensics Investigations with
Symbolic verification of Apple's Find My location-tracking protocol
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program
Certifying optimal MEV strategies with Lean
Stealthy Dual-Trigger Backdoors: Attacking Prompt Tuning in LM-Empowered
Match & Mend: Minimally Invasive Local Reassembly for Patching N-day
Are My Optimized Prompts Compromised? Exploring Vulnerabilities of
BinCtx: Multi-Modal Representation Learning for Robust Android App
Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy,
Beyond a Single Perspective: Towards a Realistic Evaluation of Website
RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics
An Information Asymmetry Game for Trigger-based DNN Model Watermarking
Infrastructure Patterns in Toll Scam Domains: A Comprehensive Analysis
Securing U.S. Critical Infrastructure: Lessons from Stuxnet and the
Power Grid Cybersecurity: Policy Analysis White Paper
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuA Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic
Mapping Smarter, Not Harder: A Test-Time Reinforcement Learning Agent
Secure Sparse Matrix Multiplications and their Applications to
Provable Unlearning with Gradient Ascent on Two-Layer ReLU Neural
ColumnDisturb: Understanding Column-based Read Disturbance in Real DRAM
SLIE: A Secure and Lightweight Cryptosystem for Data Sharing in IoT
LLM Agents for Automated Web Vulnerability Reproduction: Are We There
FibRace: a large-scale benchmark of client-side proving on mobile
AEX-NStep: Probabilistic Interrupt Counting Attacks on Intel SGX
TITAN: Graph-Executable Reasoning for Cyber Threat Intelligence
Improving Cybercrime Detection and Digital Forensics Investigations with
Symbolic verification of Apple's Find My location-tracking protocol
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program
Certifying optimal MEV strategies with Lean
Stealthy Dual-Trigger Backdoors: Attacking Prompt Tuning in LM-Empowered
Match & Mend: Minimally Invasive Local Reassembly for Patching N-day
Are My Optimized Prompts Compromised? Exploring Vulnerabilities of
BinCtx: Multi-Modal Representation Learning for Robust Android App
Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy,
Beyond a Single Perspective: Towards a Realistic Evaluation of Website
RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics
An Information Asymmetry Game for Trigger-based DNN Model Watermarking
Infrastructure Patterns in Toll Scam Domains: A Comprehensive Analysis
Securing U.S. Critical Infrastructure: Lessons from Stuxnet and the
Power Grid Cybersecurity: Policy Analysis White Paper
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>