A Characterization of Semi-Involutory MDS Matrices
http://arxiv.org/abs/2406.12842v1
Adversarial Attacks on Multimodal Agents
http://arxiv.org/abs/2406.12814v1
Supporting Human Raters with the Detection of Harmful Content using
Large Language Models
http://arxiv.org/abs/2406.12800v1
Extracting Training Data from Unconditional Diffusion Models
http://arxiv.org/abs/2406.12752v1
What is in the Chrome Web Store? Investigating Security-Noteworthy
Browser Extensions
http://arxiv.org/abs/2406.12710v1
Attack and Defense of Deep Learning Models in the Field of Web Attack
Detection
http://arxiv.org/abs/2406.12605v1
UIFV: Data Reconstruction Attack in Vertical Federated Learning
http://arxiv.org/abs/2406.12588v1
Analysing India's Cyber Warfare Readiness and Developing a Defence
Strategy
http://arxiv.org/abs/2406.12568v1
Next Generation of Phishing Attacks using AI powered Browsers
http://arxiv.org/abs/2406.12547v1
Update Selective Parameters: Federated Machine Unlearning Based on Model
Explanation
http://arxiv.org/abs/2406.12516v1
Can We Trust Large Language Models Generated Code? A Framework for
In-Context Learning, Security Patterns, and Code Evaluations Across Diverse
LLMs
http://arxiv.org/abs/2406.12513v1
MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code
Representation
http://arxiv.org/abs/2406.12415v1
A Cutting-Edge Deep Learning Method For Enhancing IoT Security
http://arxiv.org/abs/2406.12400v1
DCS Chain: A Flexible Private Blockchain System
http://arxiv.org/abs/2406.12376v1
Never Gonna Give You Up: Exploring Deprecated NULL Ciphers in Commercial
VoWiFi Deployments
http://arxiv.org/abs/2406.12348v1
Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum
Sharing
http://arxiv.org/abs/2406.12330v1
Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an
xApp
http://arxiv.org/abs/2406.12299v1
CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large
Language Models
http://arxiv.org/abs/2406.12257v1
BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison
Byzantine-robust Federated Learning
http://arxiv.org/abs/2406.12222v1
Understanding Help-Seeking and Help-Giving on Social Media for
Image-Based Sexual Abuse
http://arxiv.org/abs/2406.12161v1
Block Circulant Codes with Application to Decentralized Systems
http://arxiv.org/abs/2406.12160v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>