Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models
Versus Fine-Tuned Vision Transformers in Image-Based Security Applications
http://arxiv.org/abs/2403.17787v1
Secure Aggregation is Not Private Against Membership Inference Attacks
http://arxiv.org/abs/2403.17775v1
DataCook: Crafting Anti-Adversarial Examples for Healthcare Data
Copyright Protection
http://arxiv.org/abs/2403.17755v1
Optimization-based Prompt Injection Attack to LLM-as-a-Judge
http://arxiv.org/abs/2403.17710v1
Depending on yourself when you should: Mentoring LLM with RL agents to
become the master in cybersecurity games
http://arxiv.org/abs/2403.17674v1
http://arxiv.org/abs/2403.17673v1
Healthcare Data Governance, Privacy, and Security - A Conceptual
Framework
http://arxiv.org/abs/2403.17648v1
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the
Impact on Linux based IoT Systems
http://arxiv.org/abs/2403.17571v1
Provably Secure Disambiguating Neural Linguistic Steganography
http://arxiv.org/abs/2403.17524v1
FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart
Electrical Grids
http://arxiv.org/abs/2403.17494v1
Expectations Versus Reality: Evaluating Intrusion Detection Systems in
Practice
http://arxiv.org/abs/2403.17458v1
The Privacy Policy Permission Model: A Unified View of Privacy Policies
http://arxiv.org/abs/2403.17414v1
Characterizing Dependency Update Practice of NPM, PyPI and Cargo
Packages
http://arxiv.org/abs/2403.17382v1
The Solution of the Zodiac Killer's 340-Character Cipher
http://arxiv.org/abs/2403.17350v1
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of
Large Language Models
http://arxiv.org/abs/2403.17336v1
Two Birds with One Stone: Differential Privacy by Low-power SRAM Memory
http://arxiv.org/abs/2403.17303v1
Physical 3D Adversarial Attacks against Monocular Depth Estimation in
Autonomous Driving
http://arxiv.org/abs/2403.17301v1
Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure
Lookup Table Computation
http://arxiv.org/abs/2403.17296v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>