
Sign up to save your podcasts
Or


Evolution of Cybersecurity Subdisciplines: A Science of Science Study
Medusa: Cross-Modal Transferable Adversarial Attacks on Multimodal Medical Retrieval-Augmented Generation
FedPoisonTTP: A Threat Model and Poisoning Attack for Federated Test-Time Personalization
Adversarial Attack-Defense Co-Evolution for LLM Safety Alignment via Tree-Group Dual-Aware Search and Optimization
Can LLMs Threaten Human Survival? Benchmarking Potential Existential Threats from LLMs via Prefix Completion
A General Framework for Per-record Differential Privacy
Understanding and Mitigating Over-refusal for Large Language Models via Safety Representation
LLM-CSEC: Empirical Evaluation of Security in C/C++ Code Generated by Large Language Models
Defending Large Language Models Against Jailbreak Exploits with Responsible AI Considerations
RoguePrompt: Dual-Layer Ciphering for Self-Reconstruction to Circumvent LLM Moderation
Re-Key-Free, Risky-Free: Adaptable Model Usage Control
Evaluation of Real-Time Mitigation Techniques for Cyber Security in IEC 61850 / IEC 62351 Substations
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuEvolution of Cybersecurity Subdisciplines: A Science of Science Study
Medusa: Cross-Modal Transferable Adversarial Attacks on Multimodal Medical Retrieval-Augmented Generation
FedPoisonTTP: A Threat Model and Poisoning Attack for Federated Test-Time Personalization
Adversarial Attack-Defense Co-Evolution for LLM Safety Alignment via Tree-Group Dual-Aware Search and Optimization
Can LLMs Threaten Human Survival? Benchmarking Potential Existential Threats from LLMs via Prefix Completion
A General Framework for Per-record Differential Privacy
Understanding and Mitigating Over-refusal for Large Language Models via Safety Representation
LLM-CSEC: Empirical Evaluation of Security in C/C++ Code Generated by Large Language Models
Defending Large Language Models Against Jailbreak Exploits with Responsible AI Considerations
RoguePrompt: Dual-Layer Ciphering for Self-Reconstruction to Circumvent LLM Moderation
Re-Key-Free, Risky-Free: Adaptable Model Usage Control
Evaluation of Real-Time Mitigation Techniques for Cyber Security in IEC 61850 / IEC 62351 Substations
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>