
Sign up to save your podcasts
Or


Exploring the Market Dynamics of Liquid Staking Derivatives (LSDs)
On Central Primitives for Quantum Cryptography with Classical
SoK: Cryptocurrency Wallets -- A Security Review and Classification
Securing OPEN-RAN Equipment Using Blockchain-Based Supply Chain
Complexity Assessment of Analog Security Primitives Using the Disentropy
A Holistic Approach for Bitcoin Confirmation Times & Optimal Fee
Model X-ray:Detect Backdoored Models via Decision Boundary
PureLottery: Fair and Bias-Resistant Leader Election with a Novel
Robustness-Congruent Adversarial Training for Secure Machine Learning
Towards an Enforceable GDPR Specification
A Scalable Multi-Layered Blockchain Architecture for Enhanced EHR
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing
HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware
Chain-of-Thought Prompting of Large Language Models for Discovering and
Time-Restricted Double-Spending Attack on PoW-based Blockchains
Blockchain for Finance: A Survey
Purified and Unified Steganographic Network
AI-Driven Anonymization: Protecting Personal Data Privacy While
Adversarial Perturbations of Physical Signals
A Pioneering Study and An Innovative Information Theory-based Approach
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuExploring the Market Dynamics of Liquid Staking Derivatives (LSDs)
On Central Primitives for Quantum Cryptography with Classical
SoK: Cryptocurrency Wallets -- A Security Review and Classification
Securing OPEN-RAN Equipment Using Blockchain-Based Supply Chain
Complexity Assessment of Analog Security Primitives Using the Disentropy
A Holistic Approach for Bitcoin Confirmation Times & Optimal Fee
Model X-ray:Detect Backdoored Models via Decision Boundary
PureLottery: Fair and Bias-Resistant Leader Election with a Novel
Robustness-Congruent Adversarial Training for Secure Machine Learning
Towards an Enforceable GDPR Specification
A Scalable Multi-Layered Blockchain Architecture for Enhanced EHR
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing
HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware
Chain-of-Thought Prompting of Large Language Models for Discovering and
Time-Restricted Double-Spending Attack on PoW-based Blockchains
Blockchain for Finance: A Survey
Purified and Unified Steganographic Network
AI-Driven Anonymization: Protecting Personal Data Privacy While
Adversarial Perturbations of Physical Signals
A Pioneering Study and An Innovative Information Theory-based Approach
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>