
Sign up to save your podcasts
Or


A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness,
DiffAudit: Auditing Privacy Practices of Online Services for Children
LLM Dataset Inference: Did you train on my dataset?
A Note on Vectorial Boolean Functions as Embeddings
Differentially Private Best-Arm Identification
Should my Blockchain Learn to Drive? A Study of Hyperledger Fabric
Unveiling the Safety of GPT-4o: An Empirical Study using Jailbreak
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding
Random Time-hopping Secure Ranging Strategy Against Distance-Reduction
Statistical Inference for Privatized Data with Unknown Sample Size
Siren -- Advancing Cybersecurity through Deception and Adaptive Analysis
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against
A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks
Time to Separate from StackOverflow and Match with ChatGPT for
Gameful Introduction to Cryptography for Dyslexic Students
Sequential Binary Classification for Intrusion Detection in Software
Shesha: Multi-head Microarchitectural Leakage Discovery in
Chain-of-Scrutiny: Detecting Backdoor Attacks for Large Language Models
Safety Alignment Should Be Made More Than Just a Few Tokens Deep
SETC: A Vulnerability Telemetry Collection Framework
Jailbreaking Quantum Computers
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuA Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness,
DiffAudit: Auditing Privacy Practices of Online Services for Children
LLM Dataset Inference: Did you train on my dataset?
A Note on Vectorial Boolean Functions as Embeddings
Differentially Private Best-Arm Identification
Should my Blockchain Learn to Drive? A Study of Hyperledger Fabric
Unveiling the Safety of GPT-4o: An Empirical Study using Jailbreak
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding
Random Time-hopping Secure Ranging Strategy Against Distance-Reduction
Statistical Inference for Privatized Data with Unknown Sample Size
Siren -- Advancing Cybersecurity through Deception and Adaptive Analysis
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against
A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks
Time to Separate from StackOverflow and Match with ChatGPT for
Gameful Introduction to Cryptography for Dyslexic Students
Sequential Binary Classification for Intrusion Detection in Software
Shesha: Multi-head Microarchitectural Leakage Discovery in
Chain-of-Scrutiny: Detecting Backdoor Attacks for Large Language Models
Safety Alignment Should Be Made More Than Just a Few Tokens Deep
SETC: A Vulnerability Telemetry Collection Framework
Jailbreaking Quantum Computers
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>