An Adversarial Approach to Evaluating the Robustness of Event
Identification Models
http://arxiv.org/abs/2402.12338v1
Query-Based Adversarial Prompt Generation
http://arxiv.org/abs/2402.12329v1
An Interview Study on Third-Party Cyber Threat Hunting Processes in the
U.S. Department of Homeland Security
http://arxiv.org/abs/2402.12252v1
The Fundamental Limits of Least-Privilege Learning
http://arxiv.org/abs/2402.12235v1
CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement
Learning for LLM-based Mutation
http://arxiv.org/abs/2402.12222v1
Amplifying Training Data Exposure through Fine-Tuning with
Pseudo-Labeled Memberships
http://arxiv.org/abs/2402.12189v1
Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep
Learning via Adversarial Training
http://arxiv.org/abs/2402.12187v1
Defending Against Weight-Poisoning Backdoor Attacks for
Parameter-Efficient Fine-Tuning
http://arxiv.org/abs/2402.12168v1
SCARF: Securing Chips with a Robust Framework against Fabrication-time
Hardware Trojans
http://arxiv.org/abs/2402.12162v1
Federated Bayesian Network Ensembles
http://arxiv.org/abs/2402.12142v1
Groot: Adversarial Testing for Generative Text-to-Image Models with
Tree-based Semantic Transformation
http://arxiv.org/abs/2402.12100v1
Attack Tree Generation via Process Mining
http://arxiv.org/abs/2402.12040v1
Acquiring Clean Language Models from Backdoor Poisoned Datasets by
Downscaling Frequency Space
http://arxiv.org/abs/2402.12026v1
Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on
Chain of Thought
http://arxiv.org/abs/2402.12023v1
Privacy-Preserving Low-Rank Adaptation for Latent Diffusion Models
http://arxiv.org/abs/2402.11989v1
Stealing the Invisible: Unveiling Pre-Trained CNN Models through
Adversarial Examples and Timing Side-Channels
http://arxiv.org/abs/2402.11953v1
AICAttack: Adversarial Image Captioning Attack with Attention-Based
Optimization
http://arxiv.org/abs/2402.11940v1
Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced
Tracking and Security Features
http://arxiv.org/abs/2402.11829v1
An Empirical Evaluation of LLMs for Solving Offensive Security
Challenges
http://arxiv.org/abs/2402.11814v1
SPML: A DSL for Defending Language Models Against Prompt Attacks
http://arxiv.org/abs/2402.11755v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>