Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#129 サイバーarxiv (2024-09-10)

11 Sep 2024

Description

本日紹介した論文の一覧 How to Verify Any (Reasonable) Distribution Property: Computationally Sound Argument Systems for Distributions http://arxiv.org/abs/2409.06594v1 Advancing Android Privacy Assessments with Automation http://arxiv.org/abs/2409.06564v1 ChatGPT's Potential in Cryptography Misuse Detection: A Comparative Analysis with Static Analysis Tools http://arxiv.org/abs/2409.06561v1 Adversary Resilient Learned Bloom Filters http://arxiv.org/abs/2409.06556v1 DroneXNFT: An NFT-Driven Framework for Secure Autonomous UAV Operations and Flight Data Management http://arxiv.org/abs/2409.06507v1 Ransomware Detection Using Machine Learning in the Linux Kernel http://arxiv.org/abs/2409.06452v1 HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data http://arxiv.org/abs/2409.06446v1 A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption http://arxiv.org/abs/2409.06422v1 The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach http://arxiv.org/abs/2409.06390v1 SoK: Evaluating 5G Protocols Against Legacy and Emerging Privacy and Security Attacks http://arxiv.org/abs/2409.06360v1 VoiceWukong: Benchmarking Deepfake Voice Detection http://arxiv.org/abs/2409.06348v1 The Black-Box Simulation Barrier Persists in a Fully Quantum World http://arxiv.org/abs/2409.06317v1 Catch Me if You Can: Detecting Unauthorized Data Use in Deep Learning Models http://arxiv.org/abs/2409.06280v1 Differential Degradation Vulnerabilities in Censorship Circumvention Systems http://arxiv.org/abs/2409.06247v1 BACKRUNNER: Mitigating Smart Contract Attacks in the Real World http://arxiv.org/abs/2409.06213v1 Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs http://arxiv.org/abs/2409.06203v1 Responsible Blockchain: STEADI Principles and the Actor-Network Theory-based Development Methodology (ANT-RDM) http://arxiv.org/abs/2409.06179v1 On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective http://arxiv.org/abs/2409.06130v1 Conditional Encryption with Applications to Secure Personalized Password Typo Correction http://arxiv.org/abs/2409.06128v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.