
Sign up to save your podcasts
Or


PerProb: Indirectly Evaluating Memorization in Large Language Models
Exploiting Reset Operations in Cloud-based Quantum Computers to Run Quantum Circuits for Free
PrivATE: Differentially Private Average Treatment Effect Estimation for Observational Data
Aligning Security Compliance and DevOps: A Longitudinal Study
Reasoning-Style Poisoning of LLM Agents via Stealthy Style Transfer: Process-Level Attacks and Runtime Monitoring in RSV Space
VICTOR: Dataset Copyright Auditing in Video Recognition Systems
Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset
Lost in the Pages: WebAssembly Code Recovery through SEV-SNP's Exposed Address Space
Criminal Liability in AI-Enabled Autonomous Vehicles: A Comparative Study
LegionITS: A Federated Intrusion-Tolerant System Architecture
PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design
IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol
CIS-BA: Continuous Interaction Space Based Backdoor Attack for Object Detection in the Real-World
HAL -- An Open-Source Framework for Gate-Level Netlist Analysis
UIXPOSE: Mobile Malware Detection via Intention-Behaviour Discrepancy Analysis
From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis
A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuPerProb: Indirectly Evaluating Memorization in Large Language Models
Exploiting Reset Operations in Cloud-based Quantum Computers to Run Quantum Circuits for Free
PrivATE: Differentially Private Average Treatment Effect Estimation for Observational Data
Aligning Security Compliance and DevOps: A Longitudinal Study
Reasoning-Style Poisoning of LLM Agents via Stealthy Style Transfer: Process-Level Attacks and Runtime Monitoring in RSV Space
VICTOR: Dataset Copyright Auditing in Video Recognition Systems
Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset
Lost in the Pages: WebAssembly Code Recovery through SEV-SNP's Exposed Address Space
Criminal Liability in AI-Enabled Autonomous Vehicles: A Comparative Study
LegionITS: A Federated Intrusion-Tolerant System Architecture
PentestEval: Benchmarking LLM-based Penetration Testing with Modular and Stage-Level Design
IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol
CIS-BA: Continuous Interaction Space Based Backdoor Attack for Object Detection in the Real-World
HAL -- An Open-Source Framework for Gate-Level Netlist Analysis
UIXPOSE: Mobile Malware Detection via Intention-Behaviour Discrepancy Analysis
From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis
A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>