Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#103 サイバーarxiv (2024-07-18)

19 Jul 2024

Description

本日紹介した論文の一覧 Black-Box Opinion Manipulation Attacks to Retrieval-Augmented Generation of Large Language Models http://arxiv.org/abs/2407.13757v1 CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications http://arxiv.org/abs/2407.13742v1 Scalable Optimization for Locally Relevant Geo-Location Privacy http://arxiv.org/abs/2407.13725v1 Differential Privacy Mechanisms in Neural Tangent Kernel Regression http://arxiv.org/abs/2407.13621v1 SecScale: A Scalable and Secure Trusted Execution Environment for Servers http://arxiv.org/abs/2407.13572v1 PriPL-Tree: Accurate Range Query for Arbitrary Distribution under Local Differential Privacy http://arxiv.org/abs/2407.13532v1 A Security Assessment tool for Quantum Threat Analysis http://arxiv.org/abs/2407.13523v1 Three-State Information Hiding: Provably Secure Asymmetric Steganography http://arxiv.org/abs/2407.13499v1 Empirical Analysis of Sri Lankan Mobile Health Ecosystem: A Precursor to an Effective Stakeholder Engagement http://arxiv.org/abs/2407.13415v1 Time Synchronization of TESLA-enabled GNSS Receivers http://arxiv.org/abs/2407.13386v1 NeuroPlug: Plugging Side-Channel Leaks in NPUs using Space Filling Curves http://arxiv.org/abs/2407.13383v1 EarlyMalDetect: A Novel Approach for Early Windows Malware Detection Based on Sequences of API Calls http://arxiv.org/abs/2407.13355v1 A new approach to delegate signing rights to proxy signers using isogeny-based cryptography http://arxiv.org/abs/2407.13318v1 Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version) http://arxiv.org/abs/2407.13240v1 Quantum Key Distribution Routing Protocol in Quantum Networks: Overview and Challenges http://arxiv.org/abs/2407.13156v1 Preset-Voice Matching for Privacy Regulated Speech-to-Speech Translation Systems http://arxiv.org/abs/2407.13153v1 Using LLMs to Automate Threat Intelligence Analysis Workflows in Security Operation Centers http://arxiv.org/abs/2407.13093v1 Krait: A Backdoor Attack Against Graph Prompt Tuning http://arxiv.org/abs/2407.13068v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.