本日紹介した論文の一覧 How to Verify Any (Reasonable) Distribution Property: Computationally Sound Argument Systems for Distributions http://arxiv.org/abs/2409.06594v1 Advancing Android Privacy Assessments with Automation http://arxiv.org/abs/2409.06564v1 ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools http://arxiv.org/abs/2409.06561v1 Adversary Resilient Learned Bloom Filters http://arxiv.org/abs/2409.06556v1 DroneXNFT: An NFT-Driven Framework for Secure Autonomous UAV Operations and Flight Data Management http://arxiv.org/abs/2409.06507v1 Ransomware Detection Using Machine Learning in the Linux Kernel http://arxiv.org/abs/2409.06452v1 HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data http://arxiv.org/abs/2409.06446v1 A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption http://arxiv.org/abs/2409.06422v1 The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach http://arxiv.org/abs/2409.06390v1 SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks http://arxiv.org/abs/2409.06360v1 VoiceWukong: Benchmarking Deepfake Voice Detection http://arxiv.org/abs/2409.06348v1 The Black-Box Simulation Barrier Persists in a Fully Quantum World http://arxiv.org/abs/2409.06317v1 Catch Me if You Can: Detecting Unauthorized Data Use in Deep Learning Models http://arxiv.org/abs/2409.06280v1 Differential Degradation Vulnerabilities in Censorship Circumvention Systems http://arxiv.org/abs/2409.06247v1 BACKRUNNER: Mitigating Smart Contract Attacks in the Real World http://arxiv.org/abs/2409.06213v1 Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs http://arxiv.org/abs/2409.06203v1 Responsible Blockchain: STEADI Principles and the Actor-Network Theory-based Development Methodology (ANT-RDM) http://arxiv.org/abs/2409.06179v1 On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective http://arxiv.org/abs/2409.06130v1 Conditional Encryption with Applications to Secure Personalized Password Typo Correction http://arxiv.org/abs/2409.06128v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast