サイバーarXiv

#283 サイバーarxiv (2025-10-20)


Listen Later

本日紹介した論文の一覧

  • VERA-V: Variational Inference Framework for Jailbreaking Vision-Language

    Models
    http://arxiv.org/abs/2510.17759v1

  • CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious

    Attacks
    http://arxiv.org/abs/2510.17687v1

  • SARSteer: Safeguarding Large Audio Language Models via Safe-Ablated

    Refusal Steering
    http://arxiv.org/abs/2510.17633v1

  • GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with

    Denoising Models
    http://arxiv.org/abs/2510.17621v1

  • Dynamic Switched Quantum Key Distribution Networkwith PUF-based

    authentication
    http://arxiv.org/abs/2510.17552v1

  • Cybersecurity AI: Evaluating Agentic Cybersecurity in Attack/Defense

    CTFs
    http://arxiv.org/abs/2510.17521v1

  • Process Automation Architecture Using RFID for Transparent Voting

    Systems
    http://arxiv.org/abs/2510.17403v1

  • Comparison and performance analysis of dynamic encrypted control

    approaches
    http://arxiv.org/abs/2510.17333v1

  • The Hidden Dangers of Public Serverless Repositories: An Empirical

    Security Assessment
    http://arxiv.org/abs/2510.17311v1

  • Single-Shuffle Full-Open Card-Based Protocols for Any Function

    http://arxiv.org/abs/2510.17308v1

  • A polynomial-based QCQP solver for encrypted optimization

    http://arxiv.org/abs/2510.17294v1

  • Analysis of Input-Output Mappings in Coinjoin Transactions with

    Arbitrary Values
    http://arxiv.org/abs/2510.17284v1

  • Multimodal Safety Is Asymmetric: Cross-Modal Exploits Unlock Black-Box

    MLLMs Jailbreaks
    http://arxiv.org/abs/2510.17277v1

  • Breaking and Fixing Defenses Against Control-Flow Hijacking in

    Multi-Agent Systems
    http://arxiv.org/abs/2510.17276v1

  • Exploiting the Potential of Linearity in Automatic Differentiation and

    Computational Cryptography
    http://arxiv.org/abs/2510.17220v1

  • QRïS: A Preemptive Novel Method for Quishing Detection Through

    Structural Features of QR
    http://arxiv.org/abs/2510.17175v1

  • Can Transformer Memory Be Corrupted? Investigating Cache-Side

    Vulnerabilities in Large Language Models
    http://arxiv.org/abs/2510.17098v1

  • Quantum Key Distribution for Virtual Power Plant Communication: A

    Lightweight Key-Aware Scheduler with Provable Stability
    http://arxiv.org/abs/2510.17087v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu