A Taxonomy and Comparative Analysis of IPv4 ID Selection Correctness,
Security, and Performance
http://arxiv.org/abs/2406.06483v1
DiffAudit: Auditing Privacy Practices of Online Services for Children
and Adolescents
http://arxiv.org/abs/2406.06473v1
LLM Dataset Inference: Did you train on my dataset?
http://arxiv.org/abs/2406.06443v1
A Note on Vectorial Boolean Functions as Embeddings
http://arxiv.org/abs/2406.06429v1
Differentially Private Best-Arm Identification
http://arxiv.org/abs/2406.06408v1
Should my Blockchain Learn to Drive? A Study of Hyperledger Fabric
http://arxiv.org/abs/2406.06318v1
Unveiling the Safety of GPT-4o: An Empirical Study using Jailbreak
Attacks
http://arxiv.org/abs/2406.06302v1
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding
Vulnerabilities in PHP Web Applications
http://arxiv.org/abs/2406.06261v1
Random Time-hopping Secure Ranging Strategy Against Distance-Reduction
Attacks in UWB
http://arxiv.org/abs/2406.06252v1
Statistical Inference for Privatized Data with Unknown Sample Size
http://arxiv.org/abs/2406.06231v1
Siren -- Advancing Cybersecurity through Deception and Adaptive Analysis
http://arxiv.org/abs/2406.06225v1
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against
Personalized Federated Learning
http://arxiv.org/abs/2406.06207v1
A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks
http://arxiv.org/abs/2406.06186v1
Time to Separate from StackOverflow and Match with ChatGPT for
Encryption
http://arxiv.org/abs/2406.06164v1
Gameful Introduction to Cryptography for Dyslexic Students
http://arxiv.org/abs/2406.06153v1
Sequential Binary Classification for Intrusion Detection in Software
Defined Networks
http://arxiv.org/abs/2406.06099v1
Shesha: Multi-head Microarchitectural Leakage Discovery in
new-generation Intel Processors
http://arxiv.org/abs/2406.06034v1
Chain-of-Scrutiny: Detecting Backdoor Attacks for Large Language Models
http://arxiv.org/abs/2406.05948v1
Safety Alignment Should Be Made More Than Just a Few Tokens Deep
http://arxiv.org/abs/2406.05946v1
SETC: A Vulnerability Telemetry Collection Framework
http://arxiv.org/abs/2406.05942v1
Jailbreaking Quantum Computers
http://arxiv.org/abs/2406.05941v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>