
Sign up to save your podcasts
Or


Can We Trust the Unlabeled Target Data? Towards Backdoor Attack and
Securing an Application Layer Gateway: An Industrial Case Study
Blockchain-based Decentralized Time Lock Machines: Automated Reveal of
SoK: Analysis techniques for WebAssembly
The Role of Deep Learning in Advancing Proactive Cybersecurity Measures
Binary Linear Tree Commitment-based Ownership Protection for Distributed
STAKESURE: Proof of Stake Mechanisms with Strong Cryptoeconomic Safety
BEC: Bit-Level Static Analysis for Reliability against Soft Errors
Cross-Inlining Binary Function Similarity Detection
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
When eBPF Meets Machine Learning: On-the-fly OS Kernel
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuCan We Trust the Unlabeled Target Data? Towards Backdoor Attack and
Securing an Application Layer Gateway: An Industrial Case Study
Blockchain-based Decentralized Time Lock Machines: Automated Reveal of
SoK: Analysis techniques for WebAssembly
The Role of Deep Learning in Advancing Proactive Cybersecurity Measures
Binary Linear Tree Commitment-based Ownership Protection for Distributed
STAKESURE: Proof of Stake Mechanisms with Strong Cryptoeconomic Safety
BEC: Bit-Level Static Analysis for Reliability against Soft Errors
Cross-Inlining Binary Function Similarity Detection
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
When eBPF Meets Machine Learning: On-the-fly OS Kernel
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>