Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using
Homomorphic Encryption
http://arxiv.org/abs/2503.04652v1
Mark Your LLM: Detecting the Misuse of Open-Source Large Language Models
via Watermarking
http://arxiv.org/abs/2503.04636v1
Fundamental Limits of Hierarchical Secure Aggregation with Cyclic User
Association
http://arxiv.org/abs/2503.04564v1
Cryptoanalysis of a tropical triad matrix semiring key exchange protocol
http://arxiv.org/abs/2503.04555v1
Lite-PoT: Practical Powers-of-Tau Setup Ceremony
http://arxiv.org/abs/2503.04549v1
Know Thy Judge: On the Robustness Meta-Evaluation of LLM Safety Judges
http://arxiv.org/abs/2503.04474v1
Runtime Backdoor Detection for Federated Learning via Representational
Dissimilarity Analysis
http://arxiv.org/abs/2503.04473v1
Privacy Preserving and Robust Aggregation for Cross-Silo Federated
Learning in Non-IID Settings
http://arxiv.org/abs/2503.04451v1
Temporal Analysis of NetFlow Datasets for Network Intrusion Detection
Systems
http://arxiv.org/abs/2503.04404v1
The Challenge of Identifying the Origin of Black-Box Large Language
Models
http://arxiv.org/abs/2503.04332v1
Approaches to Quantum Remote Memory Attestation
http://arxiv.org/abs/2503.04311v1
Malware Detection at the Edge with Lightweight LLMs: A Performance
Evaluation
http://arxiv.org/abs/2503.04302v1
No Silver Bullet: Towards Demonstrating Secure Software Development for
Danish Small and Medium Enterprises in a Business-to-Business Model
http://arxiv.org/abs/2503.04293v1
A Study on Malicious Browser Extensions in 2025
http://arxiv.org/abs/2503.04292v1
Got Ya! -- Sensors for Identity Management Specific Security Situational
Awareness
http://arxiv.org/abs/2503.04274v1
DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts
http://arxiv.org/abs/2503.04260v1
Qualitative In-Depth Analysis of GDPR Data Subject Access Requests and
Responses from Major Online Services
http://arxiv.org/abs/2503.04259v1
Unsupervised anomaly detection on cybersecurity data streams: a case
with BETH dataset
http://arxiv.org/abs/2503.04178v1
UniNet: A Unified Multi-granular Traffic Modeling Framework for Network
Security
http://arxiv.org/abs/2503.04174v1
LiteChain: A Lightweight Blockchain for Verifiable and Scalable
Federated Learning in Massive Edge Networks
http://arxiv.org/abs/2503.04140v1
Controlled privacy leakage propagation throughout overlapping grouped
learning
http://arxiv.org/abs/2503.04054v1
Robust Data Watermarking in Language Models by Injecting Fictitious
Knowledge
http://arxiv.org/abs/2503.04036v1
Deep Learning Aided Software Vulnerability Detection: A Survey
http://arxiv.org/abs/2503.04002v1
USBSnoop -- Revealing Device Activities via USB Congestions
http://arxiv.org/abs/2503.03980v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>