
Sign up to save your podcasts
Or


Case Study: Neural Network Malware Detection Verification for Feature
AI-Enabled System for Efficient and Effective Cyber Incident Detection
Hook-in Privacy Techniques for gRPC-based Microservice Communication
Best-of-Venom: Attacking RLHF by Injecting Poisoned Preference Data
Simplifying MBA Expression Using E-Graphs
SoK: Gradient Leakage in Federated Learning
Optimal Controller Realizations against False Data Injections in
Certified PEFTSmoothing: Parameter-Efficient Fine-Tuning with Randomized
Reflected Search Poisoning for Illicit Promotion
Automated Attack Synthesis for Constant Product Market Makers
Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in
A Note on the Common Haar State Model
Have You Merged My Model? On The Robustness of Large Language Model IP
Semantic Stealth: Adversarial Text Attacks on NLP Using Several Methods
Enabling Privacy-Preserving Cyber Threat Detection with Federated
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuCase Study: Neural Network Malware Detection Verification for Feature
AI-Enabled System for Efficient and Effective Cyber Incident Detection
Hook-in Privacy Techniques for gRPC-based Microservice Communication
Best-of-Venom: Attacking RLHF by Injecting Poisoned Preference Data
Simplifying MBA Expression Using E-Graphs
SoK: Gradient Leakage in Federated Learning
Optimal Controller Realizations against False Data Injections in
Certified PEFTSmoothing: Parameter-Efficient Fine-Tuning with Randomized
Reflected Search Poisoning for Illicit Promotion
Automated Attack Synthesis for Constant Product Market Makers
Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in
A Note on the Common Haar State Model
Have You Merged My Model? On The Robustness of Large Language Model IP
Semantic Stealth: Adversarial Text Attacks on NLP Using Several Methods
Enabling Privacy-Preserving Cyber Threat Detection with Federated
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>