
Sign up to save your podcasts
Or


Weakly-Private Information Retrieval From MDS-Coded Distributed Storage
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source
A Blockchain-based Model for Securing Data Pipeline in a Heterogeneous
Multiple Subset Problem as an encryption scheme for communication
Username Squatting on Online Social Networks: A Study on X
Cross-Domain AI for Early Attack Detection and Defense Against Malicious
Machine Learning for Healthcare-IoT Security: A Review and Risk
GPT in Sheep's Clothing: The Risk of Customized GPTs
Exact Homomorphic Encryption
Attack and Reset for Unlearning: Exploiting Adversarial Noise toward
The Quantum Cryptography Approach: Unleashing the Potential of Quantum
A GAN-based data poisoning framework against anomaly detection in
An Efficient and Scalable Auditing Scheme for Cloud Data Storage using
AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized
HasTEE+ : Confidential Cloud Computing and Analytics with Haskell
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuWeakly-Private Information Retrieval From MDS-Coded Distributed Storage
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source
A Blockchain-based Model for Securing Data Pipeline in a Heterogeneous
Multiple Subset Problem as an encryption scheme for communication
Username Squatting on Online Social Networks: A Study on X
Cross-Domain AI for Early Attack Detection and Defense Against Malicious
Machine Learning for Healthcare-IoT Security: A Review and Risk
GPT in Sheep's Clothing: The Risk of Customized GPTs
Exact Homomorphic Encryption
Attack and Reset for Unlearning: Exploiting Adversarial Noise toward
The Quantum Cryptography Approach: Unleashing the Potential of Quantum
A GAN-based data poisoning framework against anomaly detection in
An Efficient and Scalable Auditing Scheme for Cloud Data Storage using
AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized
HasTEE+ : Confidential Cloud Computing and Analytics with Haskell
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>