サイバーarXiv

#75 サイバーarxiv (2024-05-21)


Listen Later

本日紹介した論文の一覧

  • Strategic Deployment of Honeypots in Blockchain-based IoT Systems

    http://arxiv.org/abs/2405.12951v1

  • Application Layer Cyber Deception without Developer Interaction

    http://arxiv.org/abs/2405.12852v1

  • Rethinking the Vulnerabilities of Face Recognition Systems:From a

    Practical Perspective
    http://arxiv.org/abs/2405.12786v1

  • A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning

    http://arxiv.org/abs/2405.12751v1

  • Generative AI and Large Language Models for Cyber Security: All Insights

    You Need
    http://arxiv.org/abs/2405.12750v1

  • Nearest is Not Dearest: Towards Practical Defense against

    Quantization-conditioned Backdoor Attacks
    http://arxiv.org/abs/2405.12725v1

  • How to Train a Backdoor-Robust Model on a Poisoned Dataset without

    Auxiliary Data?
    http://arxiv.org/abs/2405.12719v1

  • Gamification of IT for training in information systems management

    http://arxiv.org/abs/2405.12561v1

  • Uncertainty quantification by block bootstrap for differentially private

    stochastic gradient descent
    http://arxiv.org/abs/2405.12553v1

  • Blockchain-based AI Methods for Managing Industrial IoT: Recent

    Developments, Integration Challenges and Opportunities
    http://arxiv.org/abs/2405.12550v1

  • Fully Randomized Pointers

    http://arxiv.org/abs/2405.12513v1

  • Phishing Email Detection Using Inputs From Artificial Intelligence

    http://arxiv.org/abs/2405.12494v1

  • Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public

    Cloud (Extended Version)
    http://arxiv.org/abs/2405.12469v1

    なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。

    ]]>
    ...more
    View all episodesView all episodes
    Download on the App Store

    サイバーarXivBy Kazu