
Sign up to save your podcasts
Or


Cutting through buggy adversarial example defenses: fixing 1 line of
Can LLMs Deeply Detect Complex Malicious Queries? A Framework for
When LLMs Meet Cybersecurity: A Systematic Literature Review
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy
LaserEscape: Detecting and Mitigating Optical Probing Attacks
Detecting Android Malware: From Neural Embeddings to Hands-On Validation
A Formal Model of Security Controls' Capabilities and Its Applications
QBER: Quantifying Cyber Risks for Strategic Decisions
UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and
Synthetic Datasets for Program Similarity Research
SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large
Provably Unlearnable Examples
DarkFed: A Data-Free Backdoor Attack in Federated Learning
Online Clustering of Known and Emerging Malware Families
PCG: Mitigating Conflict-based Cache Side-channel Attacks with
Impact of EIP-4844 on Ethereum: Consensus Security, Ethereum Usage,
An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key
FOBNN: Fast Oblivious Binarized Neural Network Inference
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuCutting through buggy adversarial example defenses: fixing 1 line of
Can LLMs Deeply Detect Complex Malicious Queries? A Framework for
When LLMs Meet Cybersecurity: A Systematic Literature Review
Federated Learning Privacy: Attacks, Defenses, Applications, and Policy
LaserEscape: Detecting and Mitigating Optical Probing Attacks
Detecting Android Malware: From Neural Embeddings to Hands-On Validation
A Formal Model of Security Controls' Capabilities and Its Applications
QBER: Quantifying Cyber Risks for Strategic Decisions
UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and
Synthetic Datasets for Program Similarity Research
SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large
Provably Unlearnable Examples
DarkFed: A Data-Free Backdoor Attack in Federated Learning
Online Clustering of Known and Emerging Malware Families
PCG: Mitigating Conflict-based Cache Side-channel Attacks with
Impact of EIP-4844 on Ethereum: Consensus Security, Ethereum Usage,
An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key
FOBNN: Fast Oblivious Binarized Neural Network Inference
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>