Improved Pseudorandom Codes from Permuted Puzzles
https://arxiv.org/abs/2512.08918v1
Decentralized Trust for Space AI: Blockchain-Based Federated Learning Across Multi-Vendor LEO Satellite Networks
https://arxiv.org/abs/2512.08882v1
Differentially Private Synthetic Data Generation Using Context-Aware GANs
https://arxiv.org/abs/2512.08869v1
Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety
https://arxiv.org/abs/2512.08862v1
NecoFuzz: Effective Fuzzing of Nested Virtualization via Fuzz-Harness Virtual Machines
https://arxiv.org/abs/2512.08858v1
Can the GPC standard eliminate consent banners in the EU?
https://arxiv.org/abs/2512.08856v1
PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration
https://arxiv.org/abs/2512.08809v1
Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
https://arxiv.org/abs/2512.08802v1
An Explainable AI Model for the Detecting Malicious Smart Contracts Based on EVM Opcode Based Features
https://arxiv.org/abs/2512.08782v1
An Efficient Secret Communication Scheme for the Bosonic Wiretap Channel
https://arxiv.org/abs/2512.08623v1
Integrating Public Input and Technical Expertise for Effective Cybersecurity Policy Formulation
https://arxiv.org/abs/2512.08575v1
Labeled Delegated PSI and its Applications in the Public Sector
https://arxiv.org/abs/2512.08558v1
LLM-based Vulnerable Code Augmentation: Generate or Refactor?
https://arxiv.org/abs/2512.08493v1
Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs
https://arxiv.org/abs/2512.08417v1
USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts
https://arxiv.org/abs/2512.08372v1
Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships
https://arxiv.org/abs/2512.08326v1
Developing a Strong CPS Defender: An Evolutionary Approach
https://arxiv.org/abs/2512.08320v1
Privacy-Preserving Identifier Checking in 5G
https://arxiv.org/abs/2512.08310v1
Secure Audio Embedding in Images using Nature-Inspired Optimization
https://arxiv.org/abs/2512.08299v1
Exposing and Defending Membership Leakage in Vulnerability Prediction Models
https://arxiv.org/abs/2512.08291v1
Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem
https://arxiv.org/abs/2512.08290v1
MIRAGE: Misleading Retrieval-Augmented Generation via Black-box and Query-agnostic Poisoning Attacks
https://arxiv.org/abs/2512.08289v1
Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
https://arxiv.org/abs/2512.08204v1
A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties
https://arxiv.org/abs/2512.08185v1
Security Analysis of Integer Learning with Errors with Rejection Sampling
https://arxiv.org/abs/2512.08172v1
Information-Dense Reasoning for Efficient and Auditable Security Alert Triage
https://arxiv.org/abs/2512.08169v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>