Quantum Private Membership Aggregation
http://arxiv.org/abs/2401.16390v1
Empirical and Theoretical Analysis of Liquid Staking Protocols
http://arxiv.org/abs/2401.16353v1
Quantum-safe Encryption: A New Method to Reduce Complexity and/or
Improve Security Level
http://arxiv.org/abs/2401.16302v1
SECOMP: Formally Secure Compilation of Compartmentalized C Programs
http://arxiv.org/abs/2401.16277v1
Cross-silo Federated Learning with Record-level Personalized
Differential Privacy
http://arxiv.org/abs/2401.16251v1
DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic
Software Diversity
http://arxiv.org/abs/2401.16234v1
Cross-Database Liveness Detection: Insights from Comparative Biometric
Analysis
http://arxiv.org/abs/2401.16232v1
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing
LLMs' Vulnerability Reasoning
http://arxiv.org/abs/2401.16185v1
A Privacy-preserving key transmission protocol to distribute QRNG keys
using zk-SNARKs
http://arxiv.org/abs/2401.16170v1
Neural Network Training on Encrypted Data with TFHE
http://arxiv.org/abs/2401.16136v1
http://arxiv.org/abs/2401.16116v1
Federated unsupervised random forest for privacy-preserving patient
stratification
http://arxiv.org/abs/2401.16094v1
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep
Learning Locational Detection
http://arxiv.org/abs/2401.16001v1
HEQuant: Marrying Homomorphic Encryption and Quantization for
Communication-Efficient Private Inference
http://arxiv.org/abs/2401.15970v1
INSTILLER: Towards Efficient and Realistic RTL Fuzzing
http://arxiv.org/abs/2401.15967v1
Scalable Federated Unlearning via Isolated and Coded Sharding
http://arxiv.org/abs/2401.15957v1
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing
http://arxiv.org/abs/2401.15956v1
Blockchain-enabled Trustworthy Federated Unlearning
http://arxiv.org/abs/2401.15917v1
Mean Estimation with User-Level Privacy for Spatio-Temporal IoT Datasets
http://arxiv.org/abs/2401.15906v1
TransTroj: Transferable Backdoor Attacks to Pre-trained Models via
Embedding Indistinguishability
http://arxiv.org/abs/2401.15883v1
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis
of EDR Performance in Real-World Environments
http://arxiv.org/abs/2401.15878v1
Quantum Circuit Reconstruction from Power Side-Channel Attacks on
Quantum Computer Controllers
http://arxiv.org/abs/2401.15869v1
The Spectre of Surveillance and Censorship in Future Internet
Architectures
http://arxiv.org/abs/2401.15828v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>