
Sign up to save your podcasts
Or


Anomaly Detection in Certificate Transparency Logs
SINBAD: Saliency-informed detection of breakage caused by ad blocking
Systematic Use of Random Self-Reducibility against Physical Attacks
Air Gap: Protecting Privacy-Conscious Conversational Agents
Gröbner Basis Cryptanalysis of Ciminion and Hydra
HackCar: a test platform for attacks and defenses on a cost-contained
Adversarial Threats to Automatic Modulation Open Set Recognition in
A fuzzy reward and punishment scheme for vehicular ad hoc networks
A trust management framework for vehicular ad hoc networks
The Need Of Trustworthy Announcements To Achieve Driving Comfort
Critical Infrastructure Protection: Generative AI, Challenges, and
Systematic review, analysis, and characterisation of malicious
Enhancing Data Integrity and Traceability in Industry Cyber Physical
Explanation as a Watermark: Towards Harmless and Multi-bit Model
Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications
Blockchains for Internet of Things: Fundamentals, Applications, and
Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of
Large Language Models for Cyber Security: A Systematic Literature Review
Honeyfile Camouflage: Hiding Fake Files in Plain Sight
AttacKG+:Boosting Attack Knowledge Graph Construction with Large
Cryptanalysis of the SIMON Cypher Using Neo4j
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuAnomaly Detection in Certificate Transparency Logs
SINBAD: Saliency-informed detection of breakage caused by ad blocking
Systematic Use of Random Self-Reducibility against Physical Attacks
Air Gap: Protecting Privacy-Conscious Conversational Agents
Gröbner Basis Cryptanalysis of Ciminion and Hydra
HackCar: a test platform for attacks and defenses on a cost-contained
Adversarial Threats to Automatic Modulation Open Set Recognition in
A fuzzy reward and punishment scheme for vehicular ad hoc networks
A trust management framework for vehicular ad hoc networks
The Need Of Trustworthy Announcements To Achieve Driving Comfort
Critical Infrastructure Protection: Generative AI, Challenges, and
Systematic review, analysis, and characterisation of malicious
Enhancing Data Integrity and Traceability in Industry Cyber Physical
Explanation as a Watermark: Towards Harmless and Multi-bit Model
Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications
Blockchains for Internet of Things: Fundamentals, Applications, and
Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of
Large Language Models for Cyber Security: A Systematic Literature Review
Honeyfile Camouflage: Hiding Fake Files in Plain Sight
AttacKG+:Boosting Attack Knowledge Graph Construction with Large
Cryptanalysis of the SIMON Cypher Using Neo4j
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>