本日紹介した論文の一覧 Aster: Fixing the Android TEE Ecosystem with Arm CCA http://arxiv.org/abs/2407.16694v1 RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent http://arxiv.org/abs/2407.16667v1 Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs http://arxiv.org/abs/2407.16576v1 Language-Based Security for Low-Level MPC http://arxiv.org/abs/2407.16504v1 CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs http://arxiv.org/abs/2407.16473v1 Side-Channel Analysis of OpenVINO-based Neural Network Models http://arxiv.org/abs/2407.16467v1 Improving the Computational Efficiency of Adaptive Audits of IRV Elections http://arxiv.org/abs/2407.16465v1 Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies http://arxiv.org/abs/2407.16410v1 Prisec II -- A Comprehensive Model for IoT Security: Cryptographic Algorithms and Cloud Integration http://arxiv.org/abs/2407.16395v1 Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection http://arxiv.org/abs/2407.16327v1 PrimeGuard: Safe and Helpful LLMs through Tuning-Free Routing http://arxiv.org/abs/2407.16318v1 Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning http://arxiv.org/abs/2407.16307v1 Hidden Web Caches Discovery http://arxiv.org/abs/2407.16303v1 Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding http://arxiv.org/abs/2407.16295v1 Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption http://arxiv.org/abs/2407.16274v1 Backdoor Attacks against Hybrid Classical-Quantum Neural Networks http://arxiv.org/abs/2407.16273v1 Systematically Searching for Identity-Related Information in the Internet with OSINT Tools http://arxiv.org/abs/2407.16251v1 Evaluation Scheme to Analyze Keystroke Dynamics Methods http://arxiv.org/abs/2407.16247v1 How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications http://arxiv.org/abs/2407.16238v1 Hooked: A Real-World Study on QR Code Phishing http://arxiv.org/abs/2407.16230v1 VidyaRANG: Conversational Learning Based Platform powered by Large Language Model http://arxiv.org/abs/2407.16209v1 Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models http://arxiv.org/abs/2407.16205v1 Securing The Future Of Healthcare: Building A Resilient Defense System For Patient Data Protection http://arxiv.org/abs/2407.16170v1 Representation Magnitude has a Liability to Privacy Vulnerability http://arxiv.org/abs/2407.16164v1 Users Feel Guilty: Measurement of Illegal Software Installation Guide Videos on YouTube for Malware Distribution http://arxiv.org/abs/2407.16132v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast