サイバーarXiv

#285 サイバーarxiv (2025-10-22)


Listen Later

本日紹介した論文の一覧

  • The Tail Tells All: Estimating Model-Level Membership Inference

    Vulnerability Without Reference Models
    http://arxiv.org/abs/2510.19773v1

  • Under Pressure: Security Analysis and Process Impacts of a Commercial

    Smart Air Compressor
    http://arxiv.org/abs/2510.19772v1

  • Exploring the Effect of DNN Depth on Adversarial Attacks in Network

    Intrusion Detection Systems
    http://arxiv.org/abs/2510.19761v1

  • Unfair Mistakes on Social Media: How Demographic Characteristics

    influence Authorship Attribution
    http://arxiv.org/abs/2510.19708v1

  • CircuitGuard: Mitigating LLM Memorization in RTL Code Generation Against

    IP Leakage
    http://arxiv.org/abs/2510.19676v1

  • FidelityGPT: Correcting Decompilation Distortions with Retrieval

    Augmented Generation
    http://arxiv.org/abs/2510.19615v1

  • Can You Trust What You See? Alpha Channel No-Box Attacks on Video Object

    Detection
    http://arxiv.org/abs/2510.19574v1

  • Privacy-Preserving Spiking Neural Networks: A Deep Dive into Encryption

    Parameter Optimisation
    http://arxiv.org/abs/2510.19537v1

  • Cross-Chain Sealed-Bid Auctions Using Confidential Compute Blockchains

    http://arxiv.org/abs/2510.19491v1

  • AegisMCP: Online Graph Intrusion Detection for Tool-Augmented LLMs on

    Edge Devices
    http://arxiv.org/abs/2510.19462v1

  • Transmitter Identification via Volterra Series Based Radio Frequency

    Fingerprint
    http://arxiv.org/abs/2510.19440v1

  • Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node

    Evaluation
    http://arxiv.org/abs/2510.19420v1

  • From See to Shield: ML-Assisted Fine-Grained Access Control for Visual

    Data
    http://arxiv.org/abs/2510.19418v1

  • Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in

    Java Projects
    http://arxiv.org/abs/2510.19393v1

  • A Probabilistic Computing Approach to the Closest Vector Problem for

    Lattice-Based Factoring
    http://arxiv.org/abs/2510.19390v1

  • ConvXformer: Differentially Private Hybrid ConvNeXt-Transformer for

    Inertial Navigation
    http://arxiv.org/abs/2510.19352v1

  • Authorization of Knowledge-base Agents in an Intent-based Management

    Function
    http://arxiv.org/abs/2510.19324v1

  • Collaborative penetration testing suite for emerging generative AI

    algorithms
    http://arxiv.org/abs/2510.19303v1

  • An Adaptive Intelligent Thermal-Aware Routing Protocol for Wireless Body

    Area Networks
    http://arxiv.org/abs/2510.19300v1

  • Reliability and Resilience of AI-Driven Critical Network Infrastructure

    under Cyber-Physical Threats
    http://arxiv.org/abs/2510.19295v1

  • An Empirical Study of Bitwise Operators Intuitiveness through

    Performance Metrics
    http://arxiv.org/abs/2510.19281v1

  • LAPRAD: LLM-Assisted PRotocol Attack Discovery

    http://arxiv.org/abs/2510.19264v1

  • Defending Against Prompt Injection with DataFilter

    http://arxiv.org/abs/2510.19207v1

  • OpenGuardrails: An Open-Source Context-Aware AI Guardrails Platform

    http://arxiv.org/abs/2510.19169v1

  • HAMLOCK: HArdware-Model LOgically Combined attacK

    http://arxiv.org/abs/2510.19145v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu