Training-Free Watermarking for Autoregressive Image Generation
http://arxiv.org/abs/2505.14673v1
TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website
Fingerprinting
http://arxiv.org/abs/2505.14616v1
sudoLLM : On Multi-role Alignment of Language Models
http://arxiv.org/abs/2505.14607v1
Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded
Intrusion Detection on the Edge
http://arxiv.org/abs/2505.14592v1
Towards Verifiability of Total Value Locked (TVL) in Decentralized
Finance
http://arxiv.org/abs/2505.14565v1
Trustworthy Reputation Games and Applications to Proof-of-Reputation
Blockchains
http://arxiv.org/abs/2505.14551v1
Can Large Language Models Really Recognize Your Name?
http://arxiv.org/abs/2505.14549v1
Lessons from Defending Gemini Against Indirect Prompt Injections
http://arxiv.org/abs/2505.14534v1
MicroCrypt Assumptions with Quantum Input Sampling and
Pseudodeterminism: Constructions and Separations
http://arxiv.org/abs/2505.14461v1
Is Your Prompt Safe? Investigating Prompt Injection Attacks Against
Open-Source LLMs
http://arxiv.org/abs/2505.14368v1
Effects of the Cyber Resilience Act (CRA) on Industrial Equipment
Manufacturing Companies
http://arxiv.org/abs/2505.14325v1
Vulnerability of Transfer-Learned Neural Networks to Data Reconstruction
Attacks in Small-Data Regime
http://arxiv.org/abs/2505.14323v1
Exploring Jailbreak Attacks on LLMs through Intent Concealment and
Diversion
http://arxiv.org/abs/2505.14316v1
Destabilizing Power Grid and Energy Market by Cyberattacks on Smart
Inverters
http://arxiv.org/abs/2505.14175v1
Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec
http://arxiv.org/abs/2505.14162v1
Invisible Entropy: Towards Safe and Efficient Low-Entropy LLM
Watermarking
http://arxiv.org/abs/2505.14112v1
AudioJailbreak: Jailbreak Attacks against End-to-End Large
Audio-Language Models
http://arxiv.org/abs/2505.14103v1
In Search of Lost Data: A Study of Flash Sanitization Practices
http://arxiv.org/abs/2505.14067v1
CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model
for Complex and Imbalanced Data
http://arxiv.org/abs/2505.14027v1
Zk-SNARK for String Match
http://arxiv.org/abs/2505.13964v1
Beyond Text: Unveiling Privacy Vulnerabilities in Multi-modal
Retrieval-Augmented Generation
http://arxiv.org/abs/2505.13957v1
D4+: Emergent Adversarial Driving Maneuvers with Approximate Functional
Optimization
http://arxiv.org/abs/2505.13942v1
The Hidden Dangers of Outdated Software: A Cyber Security Perspective
http://arxiv.org/abs/2505.13922v1
VulCPE: Context-Aware Cybersecurity Vulnerability Retrieval and
Management
http://arxiv.org/abs/2505.13895v1
PandaGuard: Systematic Evaluation of LLM Safety in the Era of
Jailbreaking Attacks
http://arxiv.org/abs/2505.13862v1
hChain 4.0: A Secure and Scalable Permissioned Blockchain for EHR
Management in Smart Healthcare
http://arxiv.org/abs/2505.13861v1
Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit
Obfuscation
http://arxiv.org/abs/2505.13848v1
Provable Execution in Real-Time Embedded Systems
http://arxiv.org/abs/2505.13842v1
Fragments to Facts: Partial-Information Fragment Inference from LLMs
http://arxiv.org/abs/2505.13819v1
QUT-DV25: A Dataset for Dynamic Analysis of Next-Gen Software Supply
Chain Attacks
http://arxiv.org/abs/2505.13804v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語