PrivAR: Real-Time Privacy Protection for Location-Based Augmented
Reality Applications
http://arxiv.org/abs/2508.02551v1
Nicknames for Group Signatures
http://arxiv.org/abs/2508.02543v1
Transportation Cyber Incident Awareness through Generative AI-Based
Incident Analysis and Retrieval-Augmented Question-Answering Systems
http://arxiv.org/abs/2508.02523v1
PoseGuard: Pose-Guided Generation with Safety Guardrails
http://arxiv.org/abs/2508.02476v1
Experimental Evaluation of Post-Quantum Homomorphic Encryption for
Privacy-Preserving V2X Communication
http://arxiv.org/abs/2508.02461v1
Thwart Me If You Can: An Empirical Analysis of Android Platform Armoring
Against Stalkerware
http://arxiv.org/abs/2508.02454v1
SoftPUF: a Software-Based Blockchain Framework using PUF and Machine
Learning
http://arxiv.org/abs/2508.02438v1
Analysis of Publicly Accessible Operational Technology and Associated
Risks
http://arxiv.org/abs/2508.02375v1
A Survey on Data Security in Large Language Models
http://arxiv.org/abs/2508.02312v1
Whispering Agents: An event-driven covert communication protocol for the
Internet of Agents
http://arxiv.org/abs/2508.02188v1
Near-Optimal Differentially Private Graph Algorithms via the
Multidimensional AboveThreshold Mechanism
http://arxiv.org/abs/2508.02182v1
Robust Detection of Planted Subgraphs in Semi-Random Models
http://arxiv.org/abs/2508.02158v1
The Dark Side of Upgrades: Uncovering Security Risks in Smart Contract
Upgrades
http://arxiv.org/abs/2508.02145v1
SUAD: Solid-Channel Ultrasound Injection Attack and Defense to Voice
Assistants
http://arxiv.org/abs/2508.02116v1
Coward: Toward Practical Proactive Federated Backdoor Defense via
Collision-based Watermark
http://arxiv.org/abs/2508.02115v1
FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing
http://arxiv.org/abs/2508.02092v1
PhishParrot: LLM-Driven Adaptive Crawling to Unveil Cloaked Phishing
Sites
http://arxiv.org/abs/2508.02035v1
A Comprehensive Analysis of Evolving Permission Usage in Android Apps:
Trends, Threats, and Ecosystem Insights
http://arxiv.org/abs/2508.02008v1
DIRF: A Framework for Digital Identity Protection and Clone Governance
in Agentic AI Systems
http://arxiv.org/abs/2508.01997v1
GPU in the Blind Spot: Overlooked Security Risks in Transportation
http://arxiv.org/abs/2508.01995v1
Generative AI-Empowered Secure Communications in Space-Air-Ground
Integrated Networks: A Survey and Tutorial
http://arxiv.org/abs/2508.01983v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>