
Sign up to save your podcasts
Or


ByteShield: Adversarially Robust End-to-End Malware Detection through Byte Masking
Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing
FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning
True Random Number Generators on IQM Spark
Defining Cost Function of Steganography with Large Language Models
Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs
Device Independent Quantum Secret Sharing Using Multiparty Pseudo-telepathy Game
Chasing Shadows: Pitfalls in LLM Security Research
Comparative Analysis of Hash-based Malware Clustering via K-Means
Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks
Reference Recommendation based Membership Inference Attack against Hybrid-based Recommender Systems
Proof of Trusted Execution: A Consensus Paradigm for Deterministic Blockchain Finality
BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks
ObliInjection: Order-Oblivious Prompt Injection Attack to LLM Agents with Multi-source Data
Transformer-Driven Multimodal Fusion for Explainable Suspiciousness Estimation in Visual Surveillance
A Distributed Framework for Privacy-Enhanced Vision Transformers on the Edge
ZeroOS: A Universal Modular Library OS for zkVMs
FBA$^2$D: Frequency-based Black-box Attack for AI-generated Image Detection
Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuByteShield: Adversarially Robust End-to-End Malware Detection through Byte Masking
Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing
FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning
True Random Number Generators on IQM Spark
Defining Cost Function of Steganography with Large Language Models
Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs
Device Independent Quantum Secret Sharing Using Multiparty Pseudo-telepathy Game
Chasing Shadows: Pitfalls in LLM Security Research
Comparative Analysis of Hash-based Malware Clustering via K-Means
Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks
Reference Recommendation based Membership Inference Attack against Hybrid-based Recommender Systems
Proof of Trusted Execution: A Consensus Paradigm for Deterministic Blockchain Finality
BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks
ObliInjection: Order-Oblivious Prompt Injection Attack to LLM Agents with Multi-source Data
Transformer-Driven Multimodal Fusion for Explainable Suspiciousness Estimation in Visual Surveillance
A Distributed Framework for Privacy-Enhanced Vision Transformers on the Edge
ZeroOS: A Universal Modular Library OS for zkVMs
FBA$^2$D: Frequency-based Black-box Attack for AI-generated Image Detection
Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>