Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#131 サイバーarxiv (2024-09-12)

13 Sep 2024

Description

本日紹介した論文の一覧 LoRID: Low-Rank Iterative Diffusion for Adversarial Purification http://arxiv.org/abs/2409.08255v1 LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems http://arxiv.org/abs/2409.08234v1 Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding http://arxiv.org/abs/2409.08221v1 A Secure Standard for NFT Fractionalization http://arxiv.org/abs/2409.08190v1 A Study on Asynchronous Vote-based Blockchains http://arxiv.org/abs/2409.08161v1 Towards a graph-based foundation model for network traffic analysis http://arxiv.org/abs/2409.08111v1 Securing Large Language Models: Addressing Bias, Misinformation, and Prompt Attacks http://arxiv.org/abs/2409.08087v1 Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking http://arxiv.org/abs/2409.08045v1 Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow http://arxiv.org/abs/2409.07926v1 Building a Cybersecurity Risk Metamodel for Improved Method and Tool Integration http://arxiv.org/abs/2409.07906v1 BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding http://arxiv.org/abs/2409.07889v1 Collaboration Encouraging Quantum Secret Sharing Scheme with Seal Property http://arxiv.org/abs/2409.07863v1 A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography http://arxiv.org/abs/2409.07852v1 A Spatiotemporal Stealthy Backdoor Attack against Cooperative Multi-Agent Deep Reinforcement Learning http://arxiv.org/abs/2409.07775v1 Efficient Privacy-Preserving KAN Inference Using Homomorphic Encryption http://arxiv.org/abs/2409.07751v1 LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking http://arxiv.org/abs/2409.07743v1 Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection http://arxiv.org/abs/2409.07717v1 Harnessing TI Feeds for Exploitation Detection http://arxiv.org/abs/2409.07709v1 A Deep Dive Into How Open-Source Project Maintainers Review and Resolve Bug Bounty Reports http://arxiv.org/abs/2409.07670v1 A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features http://arxiv.org/abs/2409.07669v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.