
Sign up to save your podcasts
Or


PoW Security-Latency under Random Delays and the Effect of Transaction
Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions
Fully Automated Selfish Mining Analysis in Efficient Proof Systems
Leveraging LSTM and GAN for Modern Malware Detection
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key
Enhancing Scalability of Metric Differential Privacy via Secret Dataset
WALLETRADAR: Towards Automating the Detection of Vulnerabilities in
Enhancing Physical Layer Communication Security through Generative AI
Three variations of Heads or Tails Game for Bitcoin
CAKE: Sharing Slices of Confidential Data on Blockchain
GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against
The Malware as a Service ecosystem
A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed
Going Proactive and Explanatory Against Malware Concept Drift
Quantum Unpredictability
An Improved Reversible Data Hiding Algorithm Based on Reconstructed
Watermarking Neuromorphic Brains: Intellectual Property Protection in
MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic
Differentially Private Post-Processing for Fair Regression
Locally Differentially Private In-Context Learning
Enabling Privacy-Preserving and Publicly Auditable Federated Learning
Robust and Reusable Fuzzy Extractors for Low-entropy Rate Randomness
Explainability-Informed Targeted Malware Misclassification
Assemblage: Automatic Binary Dataset Construction for Machine Learning
TBNet: A Neural Architectural Defense Framework Facilitating DNN Model
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuPoW Security-Latency under Random Delays and the Effect of Transaction
Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions
Fully Automated Selfish Mining Analysis in Efficient Proof Systems
Leveraging LSTM and GAN for Modern Malware Detection
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key
Enhancing Scalability of Metric Differential Privacy via Secret Dataset
WALLETRADAR: Towards Automating the Detection of Vulnerabilities in
Enhancing Physical Layer Communication Security through Generative AI
Three variations of Heads or Tails Game for Bitcoin
CAKE: Sharing Slices of Confidential Data on Blockchain
GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against
The Malware as a Service ecosystem
A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed
Going Proactive and Explanatory Against Malware Concept Drift
Quantum Unpredictability
An Improved Reversible Data Hiding Algorithm Based on Reconstructed
Watermarking Neuromorphic Brains: Intellectual Property Protection in
MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic
Differentially Private Post-Processing for Fair Regression
Locally Differentially Private In-Context Learning
Enabling Privacy-Preserving and Publicly Auditable Federated Learning
Robust and Reusable Fuzzy Extractors for Low-entropy Rate Randomness
Explainability-Informed Targeted Malware Misclassification
Assemblage: Automatic Binary Dataset Construction for Machine Learning
TBNet: A Neural Architectural Defense Framework Facilitating DNN Model
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>