
Sign up to save your podcasts
Or


TZ-LLM: Protecting On-Device Large Language Models with Arm TrustZone
Tuning for Two Adversaries: Enhancing the Robustness Against Transfer and Query-Based Attacks using Hyperparameter Tuning
It's a Feature, Not a Bug: Secure and Auditable State Rollback for Confidential Cloud Applications
Robust Client-Server Watermarking for Split Federated Learning
Exploring the Effectiveness of Google Play Store's Privacy Transparency Channels
ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models
Interpretable Ransomware Detection Using Hybrid Large Language Models: A Comparative Analysis of BERT, RoBERTa, and DeBERTa Through LIME and SHAP
Tight and Practical Privacy Auditing for Differentially Private In-Context Learning
InfoDecom: Decomposing Information for Defending against Privacy Leakage in Split Inference
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
AutoMalDesc: Large-Scale Script Analysis for Cyber Threat Research
RegionMarker: A Region-Triggered Semantic Watermarking Framework for Embedding-as-a-Service Copyright Protection
Whistledown: Combining User-Level Privacy with Conversational Coherence in LLMs
DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents
A Secure Semantic Communication System Based on Knowledge Graph
SoK: The Last Line of Defense: On Backdoor Defense Evaluation
VEIL: Jailbreaking Text-to-Video Models via Visual Exploitation from Implicit Language
SmartPoC: Generating Executable and Validated PoCs for Smart Contract Bug Reports
SafeGRPO: Self-Rewarded Multimodal Safety Alignment via Rule-Governed Policy Optimization
The Grain Family of Stream Ciphers: an Abstraction, Strengthening of Components and New Concrete Instantiations
Esim: EVM Bytecode Similarity Detection Based on Stable-Semantic Graph
T2I-Based Physical-World Appearance Attack against Traffic Sign Recognition Systems in Autonomous Driving
Privacy-Preserving Federated Learning from Partial Decryption Verifiable Threshold Multi-Client Functional Encryption
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuTZ-LLM: Protecting On-Device Large Language Models with Arm TrustZone
Tuning for Two Adversaries: Enhancing the Robustness Against Transfer and Query-Based Attacks using Hyperparameter Tuning
It's a Feature, Not a Bug: Secure and Auditable State Rollback for Confidential Cloud Applications
Robust Client-Server Watermarking for Split Federated Learning
Exploring the Effectiveness of Google Play Store's Privacy Transparency Channels
ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models
Interpretable Ransomware Detection Using Hybrid Large Language Models: A Comparative Analysis of BERT, RoBERTa, and DeBERTa Through LIME and SHAP
Tight and Practical Privacy Auditing for Differentially Private In-Context Learning
InfoDecom: Decomposing Information for Defending against Privacy Leakage in Split Inference
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping
AutoMalDesc: Large-Scale Script Analysis for Cyber Threat Research
RegionMarker: A Region-Triggered Semantic Watermarking Framework for Embedding-as-a-Service Copyright Protection
Whistledown: Combining User-Level Privacy with Conversational Coherence in LLMs
DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents
A Secure Semantic Communication System Based on Knowledge Graph
SoK: The Last Line of Defense: On Backdoor Defense Evaluation
VEIL: Jailbreaking Text-to-Video Models via Visual Exploitation from Implicit Language
SmartPoC: Generating Executable and Validated PoCs for Smart Contract Bug Reports
SafeGRPO: Self-Rewarded Multimodal Safety Alignment via Rule-Governed Policy Optimization
The Grain Family of Stream Ciphers: an Abstraction, Strengthening of Components and New Concrete Instantiations
Esim: EVM Bytecode Similarity Detection Based on Stable-Semantic Graph
T2I-Based Physical-World Appearance Attack against Traffic Sign Recognition Systems in Autonomous Driving
Privacy-Preserving Federated Learning from Partial Decryption Verifiable Threshold Multi-Client Functional Encryption
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>