The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain
https://arxiv.org/abs/2512.01974v1
Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration
https://arxiv.org/abs/2512.01893v1
Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications
https://arxiv.org/abs/2512.01891v1
JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images
https://arxiv.org/abs/2512.01845v1
A Privacy-Preserving Information-Sharing Protocol for Federated Authentication
https://arxiv.org/abs/2512.01832v1
AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data
https://arxiv.org/abs/2512.01727v1
Demystifying Feature Engineering in Malware Analysis of API Call Sequences
https://arxiv.org/abs/2512.01666v1
Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework
https://arxiv.org/abs/2512.01651v1
On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing
https://arxiv.org/abs/2512.01604v1
Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN
https://arxiv.org/abs/2512.01596v1
WhiteLie: A Robust System for Spoofing User Data in Android Platforms
https://arxiv.org/abs/2512.01595v1
Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA
https://arxiv.org/abs/2512.01594v1
Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams
https://arxiv.org/abs/2512.01577v1
IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements
https://arxiv.org/abs/2512.01574v1
Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits
https://arxiv.org/abs/2512.01437v1
BackportBench: A Multilingual Benchmark for Automated Backporting of Patches
https://arxiv.org/abs/2512.01396v1
INFERMAL: Inferential analysis of maliciously registered domains
https://arxiv.org/abs/2512.01391v1
A Wolf in Sheep's Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
https://arxiv.org/abs/2512.01353v1
EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
https://arxiv.org/abs/2512.01335v1
Securing Large Language Models (LLMs) from Prompt Injection Attacks
https://arxiv.org/abs/2512.01326v1
Systems Security Foundations for Agentic Computing
https://arxiv.org/abs/2512.01295v1
Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
https://arxiv.org/abs/2512.01255v1
Benchmarking and Understanding Safety Risks in AI Character Platforms
https://arxiv.org/abs/2512.01247v1
CTF Archive: Capture, Curate, Learn Forever
https://arxiv.org/abs/2512.01233v1
DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
https://arxiv.org/abs/2512.01185v1
Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
https://arxiv.org/abs/2512.01164v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>