How to Verify Any (Reasonable) Distribution Property: Computationally
Sound Argument Systems for Distributions
http://arxiv.org/abs/2409.06594v1
Advancing Android Privacy Assessments with Automation
http://arxiv.org/abs/2409.06564v1
ChatGPT's Potential in Cryptography Misuse Detection: A Comparative
Analysis with Static Analysis Tools
http://arxiv.org/abs/2409.06561v1
Adversary Resilient Learned Bloom Filters
http://arxiv.org/abs/2409.06556v1
DroneXNFT: An NFT-Driven Framework for Secure Autonomous UAV Operations
and Flight Data Management
http://arxiv.org/abs/2409.06507v1
Ransomware Detection Using Machine Learning in the Linux Kernel
http://arxiv.org/abs/2409.06452v1
HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training
Data
http://arxiv.org/abs/2409.06446v1
A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving
Machine Learning Through Hybrid Homomorphic Encryption
http://arxiv.org/abs/2409.06422v1
The Impact of SBOM Generators on Vulnerability Assessment in Python: A
Comparison and a Novel Approach
http://arxiv.org/abs/2409.06390v1
SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and
Security Attacks
http://arxiv.org/abs/2409.06360v1
VoiceWukong: Benchmarking Deepfake Voice Detection
http://arxiv.org/abs/2409.06348v1
The Black-Box Simulation Barrier Persists in a Fully Quantum World
http://arxiv.org/abs/2409.06317v1
Catch Me if You Can: Detecting Unauthorized Data Use in Deep Learning
Models
http://arxiv.org/abs/2409.06280v1
Differential Degradation Vulnerabilities in Censorship Circumvention
Systems
http://arxiv.org/abs/2409.06247v1
BACKRUNNER: Mitigating Smart Contract Attacks in the Real World
http://arxiv.org/abs/2409.06213v1
Watching TV with the Second-Party: A First Look at Automatic Content
Recognition Tracking in Smart TVs
http://arxiv.org/abs/2409.06203v1
Responsible Blockchain: STEADI Principles and the Actor-Network
Theory-based Development Methodology (ANT-RDM)
http://arxiv.org/abs/2409.06179v1
On the Weaknesses of Backdoor-based Model Watermarking: An
Information-theoretic Perspective
http://arxiv.org/abs/2409.06130v1
Conditional Encryption with Applications to Secure Personalized Password
Typo Correction
http://arxiv.org/abs/2409.06128v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>