LLMail-Inject: A Dataset from a Realistic Adaptive Prompt Injection
Challenge
http://arxiv.org/abs/2506.09956v1
Oracle-Based Multistep Strategy for Solving Polynomial Systems Over
Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher
http://arxiv.org/abs/2506.09950v1
On the Impossibility of a Perfect Hypervisor
http://arxiv.org/abs/2506.09825v1
Physical Layer-Based Device Fingerprinting for Wireless Security: From
Theory to Practice
http://arxiv.org/abs/2506.09807v1
Devil's Hand: Data Poisoning Attacks to Locally Private Graph Learning
Protocols
http://arxiv.org/abs/2506.09803v1
On the Virtues of Information Security in the UK Climate Movement
http://arxiv.org/abs/2506.09719v1
Mapping NVD Records to Their VFCs: How Hard is it?
http://arxiv.org/abs/2506.09702v1
BF-Max: an Efficient Bit Flipping Decoder with Predictable Decoding
Failure Rate
http://arxiv.org/abs/2506.09689v1
Empirical Quantification of Spurious Correlations in Malware Detection
http://arxiv.org/abs/2506.09662v1
Effective Red-Teaming of Policy-Adherent Agents
http://arxiv.org/abs/2506.09600v1
The Everyday Security of Living with Conflict
http://arxiv.org/abs/2506.09580v1
The Rabin cryptosystem over number fields
http://arxiv.org/abs/2506.09569v1
TooBadRL: Trigger Optimization to Boost Effectiveness of Backdoor
Attacks on Deep Reinforcement Learning
http://arxiv.org/abs/2506.09562v1
Identity and Access Management for the Computing Continuum
http://arxiv.org/abs/2506.09559v1
Beyond Personalization: Federated Recommendation with Calibration via
Low-rank Decomposition
http://arxiv.org/abs/2506.09525v1
The Secure Overview and Analysis OF 3GPP MAC CE
http://arxiv.org/abs/2506.09502v1
Covert Entanglement Generation over Bosonic Channels
http://arxiv.org/abs/2506.09474v1
Efficient Modular Multiplier over GF (2^m) for ECPM
http://arxiv.org/abs/2506.09464v1
Learning Obfuscations Of LLM Embedding Sequences: Stained Glass
Transform
http://arxiv.org/abs/2506.09452v1
LLMs Cannot Reliably Judge (Yet?): A Comprehensive Assessment on the
Robustness of LLM-as-a-Judge
http://arxiv.org/abs/2506.09443v1
Securing Open RAN: A Survey of Cryptographic Challenges and Emerging
Solutions for 5G
http://arxiv.org/abs/2506.09418v1
Epass: Efficient and Privacy-Preserving Asynchronous Payment on
Blockchain
http://arxiv.org/abs/2506.09387v1
ContextBuddy: AI-Enhanced Contextual Insights for Security Alert
Investigation (Applied to Intrusion Detection)
http://arxiv.org/abs/2506.09365v1
SAGE: Exploring the Boundaries of Unsafe Concept Domain with
Semantic-Augment Erasing
http://arxiv.org/abs/2506.09363v1
DAVSP: Safety Alignment for Large Vision-Language Models via Deep
Aligned Visual Safety Prompt
http://arxiv.org/abs/2506.09353v1
What is the Cost of Differential Privacy for Deep Learning-Based
Trajectory Generation?
http://arxiv.org/abs/2506.09312v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>