
Sign up to save your podcasts
Or


Improved Pseudorandom Codes from Permuted Puzzles
Decentralized Trust for Space AI: Blockchain-Based Federated Learning Across Multi-Vendor LEO Satellite Networks
Differentially Private Synthetic Data Generation Using Context-Aware GANs
Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety
NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines
Can the GPC standard eliminate consent banners in the EU?
PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration
Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
An Explainable AI Model for the Detecting Malicious Smart Contracts Based on EVM Opcode Based Features
An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel
Integrating Public Input and Technical Expertise for Effective Cybersecurity Policy Formulation
Labeled Delegated PSI and its Applications in the Public Sector
LLM-based Vulnerable Code Augmentation: Generate or Refactor?
Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs
USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts
Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships
Developing a Strong CPS Defender: An Evolutionary Approach
Privacy-Preserving Identifier Checking in 5G
Secure Audio Embedding in Images using Nature-Inspired Optimization
Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem
MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks
Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties
Security Analysis of Integer Learning with Errors with Rejection Sampling
Information-Dense Reasoning for Efficient and Auditable Security Alert Triage
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuImproved Pseudorandom Codes from Permuted Puzzles
Decentralized Trust for Space AI: Blockchain-Based Federated Learning Across Multi-Vendor LEO Satellite Networks
Differentially Private Synthetic Data Generation Using Context-Aware GANs
Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety
NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines
Can the GPC standard eliminate consent banners in the EU?
PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration
Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
An Explainable AI Model for the Detecting Malicious Smart Contracts Based on EVM Opcode Based Features
An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel
Integrating Public Input and Technical Expertise for Effective Cybersecurity Policy Formulation
Labeled Delegated PSI and its Applications in the Public Sector
LLM-based Vulnerable Code Augmentation: Generate or Refactor?
Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs
USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts
Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships
Developing a Strong CPS Defender: An Evolutionary Approach
Privacy-Preserving Identifier Checking in 5G
Secure Audio Embedding in Images using Nature-Inspired Optimization
Exposing and Defending Membership Leakage in Vulnerability Prediction Models
Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem
MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks
Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties
Security Analysis of Integer Learning with Errors with Rejection Sampling
Information-Dense Reasoning for Efficient and Auditable Security Alert Triage
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>