
Sign up to save your podcasts
Or


Strategic Deployment of Honeypots in Blockchain-based IoT Systems
Application Layer Cyber Deception without Developer Interaction
Rethinking the Vulnerabilities of Face Recognition Systems:From a
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning
Generative AI and Large Language Models for Cyber Security: All Insights
Nearest is Not Dearest: Towards Practical Defense against
How to Train a Backdoor-Robust Model on a Poisoned Dataset without
Gamification of IT for training in information systems management
Uncertainty quantification by block bootstrap for differentially private
Blockchain-based AI Methods for Managing Industrial IoT: Recent
Fully Randomized Pointers
Phishing Email Detection Using Inputs From Artificial Intelligence
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuStrategic Deployment of Honeypots in Blockchain-based IoT Systems
Application Layer Cyber Deception without Developer Interaction
Rethinking the Vulnerabilities of Face Recognition Systems:From a
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning
Generative AI and Large Language Models for Cyber Security: All Insights
Nearest is Not Dearest: Towards Practical Defense against
How to Train a Backdoor-Robust Model on a Poisoned Dataset without
Gamification of IT for training in information systems management
Uncertainty quantification by block bootstrap for differentially private
Blockchain-based AI Methods for Managing Industrial IoT: Recent
Fully Randomized Pointers
Phishing Email Detection Using Inputs From Artificial Intelligence
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>