
Sign up to save your podcasts
Or


Whisper Leak: a side-channel attack on Large Language Models
Watermarking Large Language Models in Europe: Interpreting the AI Act in
Multi-robot searching with limited sensing range for static and mobile
Security and Privacy Management of IoT Using Quantum Computing
Federated Anonymous Blocklisting across Service Providers and its
LaMoS: Enabling Efficient Large Number Modular Multiplication through
Two thousand years of the oracle problem. Insights from Ancient Delphi
Let the Bees Find the Weak Spots: A Path Planning Perspective on
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation
Death by a Thousand Prompts: Open Model Vulnerability Analysis
Smartphone User Fingerprinting on Wireless Traffic
Bayesian Advantage of Re-Identification Attack in the Shuffle Model
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuWhisper Leak: a side-channel attack on Large Language Models
Watermarking Large Language Models in Europe: Interpreting the AI Act in
Multi-robot searching with limited sensing range for static and mobile
Security and Privacy Management of IoT Using Quantum Computing
Federated Anonymous Blocklisting across Service Providers and its
LaMoS: Enabling Efficient Large Number Modular Multiplication through
Two thousand years of the oracle problem. Insights from Ancient Delphi
Let the Bees Find the Weak Spots: A Path Planning Perspective on
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation
Death by a Thousand Prompts: Open Model Vulnerability Analysis
Smartphone User Fingerprinting on Wireless Traffic
Bayesian Advantage of Re-Identification Attack in the Shuffle Model
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>