Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#188 サイバーarxiv (2025-04-22)

23 Apr 2025

Description

本日紹介した論文の一覧 Automated Static Vulnerability Detection via a Holistic Neuro-symbolic Approach http://arxiv.org/abs/2504.16057v1 How Private is Your Attention? Bridging Privacy with In-Context Learning http://arxiv.org/abs/2504.16000v1 Structural Properties of Non-Linear Cellular Automata: Permutivity, Surjectivity and Reversibility http://arxiv.org/abs/2504.15949v1 Adversarial Observations in Weather Forecasting http://arxiv.org/abs/2504.15942v1 Cryptoanalysis of a public key exchange based on circulant matrix over digital semiring http://arxiv.org/abs/2504.15880v1 Quantifying Source Speaker Leakage in One-to-One Voice Conversion http://arxiv.org/abs/2504.15822v1 EFFACT: A Highly Efficient Full-Stack FHE Acceleration Platform http://arxiv.org/abs/2504.15817v1 RRC Signaling Storm Detection in O-RAN http://arxiv.org/abs/2504.15738v1 Trusted Compute Units: A Framework for Chained Verifiable Computations http://arxiv.org/abs/2504.15717v1 A Time Series Analysis of Malware Uploads to Programming Language Ecosystems http://arxiv.org/abs/2504.15695v1 Trustworthy Decentralized Autonomous Machines: A New Paradigm in Automation Economy http://arxiv.org/abs/2504.15676v1 TrojanDam: Detection-Free Backdoor Defense in Federated Learning through Proactive Model Robustification utilizing OOD Data http://arxiv.org/abs/2504.15674v1 A Study On Mixup-inspired Augmentation Methods For Software Vulnerability Detection http://arxiv.org/abs/2504.15632v1 Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey http://arxiv.org/abs/2504.15622v1 Yet Another Diminishing Spark: Low-level Cyberattacks in the Israel-Gaza Conflict http://arxiv.org/abs/2504.15592v1 A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment http://arxiv.org/abs/2504.15585v1 On the Price of Differential Privacy for Hierarchical Clustering http://arxiv.org/abs/2504.15580v1 DecETT: Accurate App Fingerprinting Under Encrypted Tunnels via Dual Decouple-based Semantic Enhancement http://arxiv.org/abs/2504.15565v1 T2VShield: Model-Agnostic Jailbreak Defense for Text-to-Video Models http://arxiv.org/abs/2504.15512v1 Guillotine: Hypervisors for Isolating Malicious AIs http://arxiv.org/abs/2504.15499v1 Scalable APT Malware Classification via Parallel Feature Extraction and GPU-Accelerated Learning http://arxiv.org/abs/2504.15497v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.