
Sign up to save your podcasts
Or


TriHaRd: Higher Resilience for TEE Trusted Time
A Proof of Success and Reward Distribution Protocol for Multi-bridge Architecture in Cross-chain Communication
Virtual camera detection: Catching video injection attacks in remote biometric systems
TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection
Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
Objectives and Design Principles in Offline Payments with Central Bank Digital Currency (CBDC)
Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs
LLM-Assisted AHP for Explainable Cyber Range Evaluation
From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection
Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques
When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection
Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
On Sybil Proofness in Competitive Combinatorial Exchanges
Watermarks for Language Models via Probabilistic Automata
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuTriHaRd: Higher Resilience for TEE Trusted Time
A Proof of Success and Reward Distribution Protocol for Multi-bridge Architecture in Cross-chain Communication
Virtual camera detection: Catching video injection attacks in remote biometric systems
TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection
Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
Objectives and Design Principles in Offline Payments with Central Bank Digital Currency (CBDC)
Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs
LLM-Assisted AHP for Explainable Cyber Range Evaluation
From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection
Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques
When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection
Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks
FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
On Sybil Proofness in Competitive Combinatorial Exchanges
Watermarks for Language Models via Probabilistic Automata
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>