Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and
Opportunities
http://arxiv.org/abs/2509.06921v1
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and
Detection
http://arxiv.org/abs/2509.06920v1
Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers
from LLMs via Claim Verification
http://arxiv.org/abs/2509.06902v1
EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language
Models
http://arxiv.org/abs/2509.06838v1
Imitative Membership Inference Attack
http://arxiv.org/abs/2509.06796v1
Image Encryption Scheme Based on Hyper-Chaotic Map and Self-Adaptive
Diffusion
http://arxiv.org/abs/2509.06754v1
When Secure Isn't: Assessing the Security of Machine Learning Model
Sharing
http://arxiv.org/abs/2509.06703v1
Network-level Censorship Attacks in the InterPlanetary File System
http://arxiv.org/abs/2509.06626v1
A Secure Sequencer and Data Availability Committee for Rollups (Extended
Version)
http://arxiv.org/abs/2509.06614v1
LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop?
http://arxiv.org/abs/2509.06595v1
Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on
the MCP Ecosystem
http://arxiv.org/abs/2509.06572v1
A Simple Data Exfiltration Game
http://arxiv.org/abs/2509.06571v1
Marginal sets in semigroups and semirings
http://arxiv.org/abs/2509.06562v1
Contrastive Self-Supervised Network Intrusion Detection using Augmented
Negative Pairs
http://arxiv.org/abs/2509.06550v1
Super-Quadratic Quantum Speed-ups and Guessing Many Likely Keys
http://arxiv.org/abs/2509.06549v1
Signal-Based Malware Classification Using 1D CNNs
http://arxiv.org/abs/2509.06548v1
Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V
Processors
http://arxiv.org/abs/2509.06509v1
When Code Crosses Borders: A Security-Centric Evaluation of LLM-based
Code Translation
http://arxiv.org/abs/2509.06504v1
NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network
Executables
http://arxiv.org/abs/2509.06402v1
From Perception to Protection: A Developer-Centered Study of Security
and Privacy Threats in Extended Reality (XR)
http://arxiv.org/abs/2509.06368v1
Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak
Attacks?
http://arxiv.org/abs/2509.06350v1
Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic
Shift
http://arxiv.org/abs/2509.06338v1
Multi View Slot Attention Using Paraphrased Texts For Face Anti-Spoofing
http://arxiv.org/abs/2509.06336v1
AttestLLM: Efficient Attestation Framework for Billion-scale On-device
LLMs
http://arxiv.org/abs/2509.06326v1
Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack
http://arxiv.org/abs/2509.06318v1
PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss
Random Variable Optimization
http://arxiv.org/abs/2509.06264v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>