Quantitative quantum soundness for all multipartite compiled nonlocal
games
http://arxiv.org/abs/2509.25145v1
Two-Dimensional XOR-Based Secret Sharing for Layered Multipath
Communication
http://arxiv.org/abs/2509.25113v1
Optimizing Privacy-Preserving Primitives to Support LLM-Scale
Applications
http://arxiv.org/abs/2509.25072v1
SecInfer: Preventing Prompt Injection via Inference-time Scaling
http://arxiv.org/abs/2509.24967v1
Secret Leader Election in Ethereum PoS: An Empirical Security Analysis
of Whisk and Homomorphic Sortition under DoS on the Leader and Censorship
Attacks
http://arxiv.org/abs/2509.24955v1
Of-SemWat: High-payload text embedding for semantic watermarking of
AI-generated images with arbitrary size
http://arxiv.org/abs/2509.24823v1
Active Authentication via Korean Keystrokes Under Varying LLM Assistance
and Cognitive Contexts
http://arxiv.org/abs/2509.24807v1
LISA Technical Report: An Agentic Framework for Smart Contract Auditing
http://arxiv.org/abs/2509.24698v1
PRIVMARK: Private Large Language Models Watermarking with MPC
http://arxiv.org/abs/2509.24624v1
Mapping Quantum Threats: An Engineering Inventory of Cryptographic
Dependencies
http://arxiv.org/abs/2509.24623v1
Agentic Specification Generator for Move Programs
http://arxiv.org/abs/2509.24515v1
Sanitize Your Responses: Mitigating Privacy Leakage in Large Language
Models
http://arxiv.org/abs/2509.24488v1
On the Limitations of Pseudorandom Unitaries
http://arxiv.org/abs/2509.24484v1
BugMagnifier: TON Transaction Simulator for Revealing Smart Contract
Vulnerabilities
http://arxiv.org/abs/2509.24444v1
Evaluating Relayed and Switched Quantum Key Distribution (QKD) Network
Architectures
http://arxiv.org/abs/2509.24440v1
Pseudorandom Unitaries in the Haar Random Oracle Model
http://arxiv.org/abs/2509.24432v1
GSPR: Aligning LLM Safeguards as Generalizable Safety Policy Reasoners
http://arxiv.org/abs/2509.24418v1
FuncPoison: Poisoning Function Library to Hijack Multi-agent Autonomous
Driving Systems
http://arxiv.org/abs/2509.24408v1
Watermarking Diffusion Language Models
http://arxiv.org/abs/2509.24368v1
When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation
http://arxiv.org/abs/2509.24272v1
VeriLLM: A Lightweight Framework for Publicly Verifiable Decentralized
Inference
http://arxiv.org/abs/2509.24257v1
Takedown: How It's Done in Modern Coding Agent Exploits
http://arxiv.org/abs/2509.24240v1
LLUAD: Low-Latency User-Anonymized DNS
http://arxiv.org/abs/2509.24174v1
Fundamental Limit of Discrete Distribution Estimation under
Utility-Optimized Local Differential Privacy
http://arxiv.org/abs/2509.24173v1
DNS in the Time of Curiosity: A Tale of Collaborative User Privacy
Protection
http://arxiv.org/abs/2509.24153v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>