
Sign up to save your podcasts
Or


Poisoning Attacks on Federated Learning-based Wireless Traffic
Chain of trust: Unraveling the references among Common Criteria
AI-Generated Faces in the Real World: A Large-Scale Case Study of
Dismantling Common Internet Services for Ad-Malware Detection
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of
Investigating child sexual abuse material availability, searches, and
DPTraj-PM: Differentially Private Trajectory Synthesis Using Prefix Tree
Towards Proxy Staking Accounts Based on NFTs in Ethereum
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution
Protecting Your LLMs with Information Bottleneck
Audio Anti-Spoofing Detection: A Survey
Distributional Black-Box Model Inversion Attack with Multi-Agent
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuPoisoning Attacks on Federated Learning-based Wireless Traffic
Chain of trust: Unraveling the references among Common Criteria
AI-Generated Faces in the Real World: A Large-Scale Case Study of
Dismantling Common Internet Services for Ad-Malware Detection
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of
Investigating child sexual abuse material availability, searches, and
DPTraj-PM: Differentially Private Trajectory Synthesis Using Prefix Tree
Towards Proxy Staking Accounts Based on NFTs in Ethereum
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution
Protecting Your LLMs with Information Bottleneck
Audio Anti-Spoofing Detection: A Survey
Distributional Black-Box Model Inversion Attack with Multi-Agent
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>