
Sign up to save your podcasts
Or


RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines
Learning to Triage Taint Flows Reported by Dynamic Program Analysis in
SafeFFI: Efficient Sanitization at the Boundary Between Safe and Unsafe
Risk Psychology & Cyber-Attack Tactics
Decentralized Exchange that Mitigate a Bribery Attack
Black Box Absorption: LLMs Undermining Innovative Ideas
AdaDoS: Adaptive DoS Attack via Deep Adversarial Reinforcement Learning
Adversary-Aware Private Inference over Wireless Channels
On the cybersecurity of LoRaWAN-based system: a Smart-Lighting case
Transferable Black-Box One-Shot Forging of Watermarks via Image
MAC Aggregation over Lossy Channels in DTLS 1.3
NeuPerm: Disrupting Malware Hidden in Neural Network Parameters by
Classport: Designing Runtime Dependency Introspection for Java
GhostEI-Bench: Do Mobile Agents Resilience to Environmental Injection in
Enhancing Security in Deep Reinforcement Learning: A Comprehensive
Privacy Protection of Automotive Location Data Based on
In-DRAM True Random Number Generation Using Simultaneous Multiple-Row
HHEML: Hybrid Homomorphic Encryption for Privacy-Preserving Machine
Beyond Text: Multimodal Jailbreaking of Vision-Language and Audio Models
Separating Pseudorandom Generators from Logarithmic Pseudorandom States
SAID: Empowering Large Language Models with Self-Activating Internal
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuRAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines
Learning to Triage Taint Flows Reported by Dynamic Program Analysis in
SafeFFI: Efficient Sanitization at the Boundary Between Safe and Unsafe
Risk Psychology & Cyber-Attack Tactics
Decentralized Exchange that Mitigate a Bribery Attack
Black Box Absorption: LLMs Undermining Innovative Ideas
AdaDoS: Adaptive DoS Attack via Deep Adversarial Reinforcement Learning
Adversary-Aware Private Inference over Wireless Channels
On the cybersecurity of LoRaWAN-based system: a Smart-Lighting case
Transferable Black-Box One-Shot Forging of Watermarks via Image
MAC Aggregation over Lossy Channels in DTLS 1.3
NeuPerm: Disrupting Malware Hidden in Neural Network Parameters by
Classport: Designing Runtime Dependency Introspection for Java
GhostEI-Bench: Do Mobile Agents Resilience to Environmental Injection in
Enhancing Security in Deep Reinforcement Learning: A Comprehensive
Privacy Protection of Automotive Location Data Based on
In-DRAM True Random Number Generation Using Simultaneous Multiple-Row
HHEML: Hybrid Homomorphic Encryption for Privacy-Preserving Machine
Beyond Text: Multimodal Jailbreaking of Vision-Language and Audio Models
Separating Pseudorandom Generators from Logarithmic Pseudorandom States
SAID: Empowering Large Language Models with Self-Activating Internal
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>