
Sign up to save your podcasts
Or


How Good is Post-Hoc Watermarking With Language Model Rephrasing?
Pixel Seal: Adversarial-only training for invisible image and video watermarking
PrivateXR: Defending Privacy Attacks in Extended Reality Through Explainable AI-Guided Differential Privacy
Non-Linear Strong Data-Processing for Quantum Hockey-Stick Divergences
Channel State Information Preprocessing for CSI-based Physical-Layer Authentication Using Reconciliation
Phishing Detection System: An Ensemble Approach Using Character-Level CNN and Feature Engineering
Efficient Bitcoin Meta-Protocol Transaction and Data Discovery Through nLockTime Field Repurposing
Protecting Deep Neural Network Intellectual Property with Chaos-Based White-Box Watermarking
Prefix Probing: Lightweight Harmful Content Detection for Large Language Models
A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection
From Essence to Defense: Adaptive Semantic-aware Watermarking for Embedding-as-a-Service Copyright Protection
Large Language Models as a (Bad) Security Norm in the Context of Regulation and Compliance
SoK: Reviewing Two Decades of Security, Privacy, Accessibility, and Usability Studies on Internet of Things for Older Adults
A first look at common RPKI publication practices
Agent Tools Orchestration Leaks More: Dataset, Benchmark, and Mitigation
Beyond the Benchmark: Innovative Defenses Against Prompt Injection Attacks
In-Context Probing for Membership Inference in Fine-Tuned Language Models
Empirical Evaluation of Structured Synthetic Data Privacy Metrics: Novel experimental framework
Love, Lies, and Language Models: Investigating AI's Role in Romance-Baiting Scams
DualGuard: Dual-stream Large Language Model Watermarking Defense against Paraphrase and Spoofing Attack
Autoencoder-based Denoising Defense against Adversarial Attacks on Object Detection
Design of a Decentralized Fixed-Income Lending Automated Market Maker Protocol Supporting Arbitrary Maturities
ContextLeak: Auditing Leakage in Private In-Context Learning Methods
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuHow Good is Post-Hoc Watermarking With Language Model Rephrasing?
Pixel Seal: Adversarial-only training for invisible image and video watermarking
PrivateXR: Defending Privacy Attacks in Extended Reality Through Explainable AI-Guided Differential Privacy
Non-Linear Strong Data-Processing for Quantum Hockey-Stick Divergences
Channel State Information Preprocessing for CSI-based Physical-Layer Authentication Using Reconciliation
Phishing Detection System: An Ensemble Approach Using Character-Level CNN and Feature Engineering
Efficient Bitcoin Meta-Protocol Transaction and Data Discovery Through nLockTime Field Repurposing
Protecting Deep Neural Network Intellectual Property with Chaos-Based White-Box Watermarking
Prefix Probing: Lightweight Harmful Content Detection for Large Language Models
A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection
From Essence to Defense: Adaptive Semantic-aware Watermarking for Embedding-as-a-Service Copyright Protection
Large Language Models as a (Bad) Security Norm in the Context of Regulation and Compliance
SoK: Reviewing Two Decades of Security, Privacy, Accessibility, and Usability Studies on Internet of Things for Older Adults
A first look at common RPKI publication practices
Agent Tools Orchestration Leaks More: Dataset, Benchmark, and Mitigation
Beyond the Benchmark: Innovative Defenses Against Prompt Injection Attacks
In-Context Probing for Membership Inference in Fine-Tuned Language Models
Empirical Evaluation of Structured Synthetic Data Privacy Metrics: Novel experimental framework
Love, Lies, and Language Models: Investigating AI's Role in Romance-Baiting Scams
DualGuard: Dual-stream Large Language Model Watermarking Defense against Paraphrase and Spoofing Attack
Autoencoder-based Denoising Defense against Adversarial Attacks on Object Detection
Design of a Decentralized Fixed-Income Lending Automated Market Maker Protocol Supporting Arbitrary Maturities
ContextLeak: Auditing Leakage in Private In-Context Learning Methods
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>