Programmable EM Sensor Array for Golden-Model Free Run-time Trojan
Detection and Localization
http://arxiv.org/abs/2401.12193v1
Text Embedding Inversion Attacks on Multilingual Language Models
http://arxiv.org/abs/2401.12192v1
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing
Replay Attack Vulnerabilities on Consumer IoT Devices
http://arxiv.org/abs/2401.12184v1
Centralization in Block Building and Proposer-Builder Separation
http://arxiv.org/abs/2401.12120v1
Monitoring the Future of Smart Contracts
http://arxiv.org/abs/2401.12093v1
SEDAC: A CVAE-Based Data Augmentation Method for Security Bug Report
Identification
http://arxiv.org/abs/2401.12060v1
NEUROSEC: FPGA-Based Neuromorphic Audio Security
http://arxiv.org/abs/2401.12055v1
Lightweight Protection for Privacy in Offloaded Speech Understanding
http://arxiv.org/abs/2401.11983v1
Effective Intrusion Detection in Heterogeneous Internet-of-Things
Networks via Ensemble Knowledge Distillation-based Federated Learning
http://arxiv.org/abs/2401.11968v1
A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless
Image Steganography
http://arxiv.org/abs/2401.11946v1
Benchmarking Large Multimodal Models against Common Corruptions
http://arxiv.org/abs/2401.11943v1
Secure Multi-hop Telemetry Broadcasts for UAV Swarm Communication
http://arxiv.org/abs/2401.11915v1
PsySafe: A Comprehensive Framework for Psychological-based Attack,
Defense, and Evaluation of Multi-agent System Safety
http://arxiv.org/abs/2401.11880v1
Privacy-Preserving Data Fusion for Traffic State Estimation: A Vertical
Federated Learning Approach
http://arxiv.org/abs/2401.11836v1
GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient
Inversion Attacks?
http://arxiv.org/abs/2401.11748v1
zkLogin: Privacy-Preserving Blockchain Authentication with Existing
Credentials
http://arxiv.org/abs/2401.11735v1
Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey
and the Open Libraries Behind Them
http://arxiv.org/abs/2401.11723v1
SyzRetrospector: A Large-Scale Retrospective Study of Syzbot
http://arxiv.org/abs/2401.11642v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>