sNVMe-oF: Secure and Efficient Disaggregated Storage
http://arxiv.org/abs/2510.18756v1
HarmNet: A Framework for Adaptive Multi-Turn Jailbreak Attacks on Large
Language Models
http://arxiv.org/abs/2510.18728v1
International Students and Scams: At Risk Abroad
http://arxiv.org/abs/2510.18715v1
Exploring Membership Inference Vulnerabilities in Clinical Large
Language Models
http://arxiv.org/abs/2510.18674v1
Differentially Private E-Values
http://arxiv.org/abs/2510.18654v1
Quantifying Security for Networked Control Systems: A Review
http://arxiv.org/abs/2510.18645v1
Qatsi: Stateless Secret Generation via Hierarchical Memory-Hard Key
Derivation
http://arxiv.org/abs/2510.18614v1
DRsam: Detection of Fault-Based Microarchitectural Side-Channel Attacks
in RISC-V Using Statistical Preprocessing and Association Rule Mining
http://arxiv.org/abs/2510.18612v1
Evaluating Large Language Models in detecting Secrets in Android Apps
http://arxiv.org/abs/2510.18601v1
CLASP: Cost-Optimized LLM-based Agentic System for Phishing Detection
http://arxiv.org/abs/2510.18585v1
Forward to Hell? On the Potentials of Misusing Transparent DNS
Forwarders in Reflective Amplification Attacks
http://arxiv.org/abs/2510.18572v1
Privacy-Preserving Healthcare Data in IoT: A Synergistic Approach with
Deep Learning and Blockchain
http://arxiv.org/abs/2510.18568v1
The Trust Paradox in LLM-Based Multi-Agent Systems: When Collaboration
Becomes a Security Vulnerability
http://arxiv.org/abs/2510.18563v1
Deep Q-Learning Assisted Bandwidth Reservation for Multi-Operator
Time-Sensitive Vehicular Networking
http://arxiv.org/abs/2510.18553v1
Pay Attention to the Triggers: Constructing Backdoors That Survive
Distillation
http://arxiv.org/abs/2510.18541v1
Prompting the Priorities: A First Look at Evaluating LLMs for
Vulnerability Triage and Prioritization
http://arxiv.org/abs/2510.18508v1
A Degree Bound for the c-Boomerang Uniformity
http://arxiv.org/abs/2510.18506v1
One Size Fits All? A Modular Adaptive Sanitization Kit (MASK) for
Customizable Privacy-Preserving Phone Scam Detection
http://arxiv.org/abs/2510.18493v1
The Attribution Story of WhisperGate: An Academic Perspective
http://arxiv.org/abs/2510.18484v1
PP3D: An In-Browser Vision-Based Defense Against Web Behavior
Manipulation Attacks
http://arxiv.org/abs/2510.18465v1
Real-World Usability of Vulnerability Proof-of-Concepts: A Comprehensive
Study
http://arxiv.org/abs/2510.18448v1
DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and
LLM Reasoning
http://arxiv.org/abs/2510.18438v1
Censorship Chokepoints: New Battlegrounds for Regional Surveillance,
Censorship and Influence on the Internet
http://arxiv.org/abs/2510.18394v1
Uniformity Testing under User-Level Local Privacy
http://arxiv.org/abs/2510.18379v1
Position: LLM Watermarking Should Align Stakeholders' Incentives for
Practical Adoption
http://arxiv.org/abs/2510.18333v1
CryptoGuard: Lightweight Hybrid Detection and Response to Host-based
Cryptojackers in Linux Cloud Environments
http://arxiv.org/abs/2510.18324v1
ACTG-ARL: Differentially Private Conditional Text Generation with
RL-Boosted Control
http://arxiv.org/abs/2510.18232v1
RESCUE: Retrieval Augmented Secure Code Generation
http://arxiv.org/abs/2510.18204v1
TaintSentinel: Path-Level Randomness Vulnerability Detection for
Ethereum Smart Contracts
http://arxiv.org/abs/2510.18192v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日