
Sign up to save your podcasts
Or


Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models
Secure Aggregation is Not Private Against Membership Inference Attacks
DataCook: Crafting Anti-Adversarial Examples for Healthcare Data
Optimization-based Prompt Injection Attack to LLM-as-a-Judge
Depending on yourself when you should: Mentoring LLM with RL agents to
How Private is DP-SGD?
Healthcare Data Governance, Privacy, and Security - A Conceptual
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the
Provably Secure Disambiguating Neural Linguistic Steganography
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart
Expectations Versus Reality: Evaluating Intrusion Detection Systems in
The Privacy Policy Permission Model: A Unified View of Privacy Policies
Characterizing Dependency Update Practice of NPM, PyPI and Cargo
The Solution of the Zodiac Killer's 340-Character Cipher
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of
Two Birds with One Stone: Differential Privacy by Low-power SRAM Memory
Physical 3D Adversarial Attacks against Monocular Depth Estimation in
Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuEvaluating the Efficacy of Prompt-Engineered Large Multimodal Models
Secure Aggregation is Not Private Against Membership Inference Attacks
DataCook: Crafting Anti-Adversarial Examples for Healthcare Data
Optimization-based Prompt Injection Attack to LLM-as-a-Judge
Depending on yourself when you should: Mentoring LLM with RL agents to
How Private is DP-SGD?
Healthcare Data Governance, Privacy, and Security - A Conceptual
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the
Provably Secure Disambiguating Neural Linguistic Steganography
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart
Expectations Versus Reality: Evaluating Intrusion Detection Systems in
The Privacy Policy Permission Model: A Unified View of Privacy Policies
Characterizing Dependency Update Practice of NPM, PyPI and Cargo
The Solution of the Zodiac Killer's 340-Character Cipher
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of
Two Birds with One Stone: Differential Privacy by Low-power SRAM Memory
Physical 3D Adversarial Attacks against Monocular Depth Estimation in
Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>