
Sign up to save your podcasts
Or


VERA-V: Variational Inference Framework for Jailbreaking Vision-Language
CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious
SARSteer: Safeguarding Large Audio Language Models via Safe-Ablated
GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with
Dynamic Switched Quantum Key Distribution Networkwith PUF-based
Cybersecurity AI: Evaluating Agentic Cybersecurity in Attack/Defense
Process Automation Architecture Using RFID for Transparent Voting
Comparison and performance analysis of dynamic encrypted control
The Hidden Dangers of Public Serverless Repositories: An Empirical
Single-Shuffle Full-Open Card-Based Protocols for Any Function
A polynomial-based QCQP solver for encrypted optimization
Analysis of Input-Output Mappings in Coinjoin Transactions with
Multimodal Safety Is Asymmetric: Cross-Modal Exploits Unlock Black-Box
Breaking and Fixing Defenses Against Control-Flow Hijacking in
Exploiting the Potential of Linearity in Automatic Differentiation and
QRïS: A Preemptive Novel Method for Quishing Detection Through
Can Transformer Memory Be Corrupted? Investigating Cache-Side
Quantum Key Distribution for Virtual Power Plant Communication: A
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuVERA-V: Variational Inference Framework for Jailbreaking Vision-Language
CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious
SARSteer: Safeguarding Large Audio Language Models via Safe-Ablated
GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with
Dynamic Switched Quantum Key Distribution Networkwith PUF-based
Cybersecurity AI: Evaluating Agentic Cybersecurity in Attack/Defense
Process Automation Architecture Using RFID for Transparent Voting
Comparison and performance analysis of dynamic encrypted control
The Hidden Dangers of Public Serverless Repositories: An Empirical
Single-Shuffle Full-Open Card-Based Protocols for Any Function
A polynomial-based QCQP solver for encrypted optimization
Analysis of Input-Output Mappings in Coinjoin Transactions with
Multimodal Safety Is Asymmetric: Cross-Modal Exploits Unlock Black-Box
Breaking and Fixing Defenses Against Control-Flow Hijacking in
Exploiting the Potential of Linearity in Automatic Differentiation and
QRïS: A Preemptive Novel Method for Quishing Detection Through
Can Transformer Memory Be Corrupted? Investigating Cache-Side
Quantum Key Distribution for Virtual Power Plant Communication: A
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>