Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#192 サイバーarxiv (2025-04-29)

30 Apr 2025

Description

本日紹介した論文の一覧 ACE: A Security Architecture for LLM-Integrated App Systems http://arxiv.org/abs/2504.20984v1 Conformal-DP: Differential Privacy on Riemannian Manifolds via Conformal Transformation http://arxiv.org/abs/2504.20941v1 DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable Memory and Differential Information Flow Tracking assisted Processor Fuzzing http://arxiv.org/abs/2504.20934v1 Bipartite Randomized Response Mechanism for Local Differential Privacy http://arxiv.org/abs/2504.20926v1 GiBy: A Giant-Step Baby-Step Classifier For Anomaly Detection In Industrial Control Systems http://arxiv.org/abs/2504.20906v1 Dual Explanations via Subgraph Matching for Malware Detection http://arxiv.org/abs/2504.20904v1 New Capacity Bounds for PIR on Graph and Multigraph-Based Replicated Storage http://arxiv.org/abs/2504.20888v1 Quantifying the Noise of Structural Perturbations on Graph Adversarial Attacks http://arxiv.org/abs/2504.20869v1 Mitigating the Structural Bias in Graph Adversarial Defenses http://arxiv.org/abs/2504.20848v1 DP-SMOTE: Integrating Differential Privacy and Oversampling Technique to Preserve Privacy in Smart Homes http://arxiv.org/abs/2504.20827v1 Secure Coding with AI, From Creation to Inspection http://arxiv.org/abs/2504.20814v1 Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications http://arxiv.org/abs/2504.20801v1 did:self A registry-less DID method http://arxiv.org/abs/2504.20767v1 Enhancing Vulnerability Reports with Automated and Augmented Description Summarization http://arxiv.org/abs/2504.20726v1 Building Trust in Healthcare with Privacy Techniques: Blockchain in the Cloud http://arxiv.org/abs/2504.20700v1 DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic Signal http://arxiv.org/abs/2504.20689v1 Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks http://arxiv.org/abs/2504.20681v1 Protocol Dialects as Formal Patterns: A Composable Theory of Lingos -- Technical report http://arxiv.org/abs/2504.20637v1 A Novel Cipher for Enhancing MAVLink Security: Design, Security Analysis, and Performance Evaluation Using a Drone Testbed http://arxiv.org/abs/2504.20626v1 The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models http://arxiv.org/abs/2504.20612v1 ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models http://arxiv.org/abs/2504.20570v1 VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs http://arxiv.org/abs/2504.20569v1 Mutual Information Minimization for Side-Channel Attack Resistance via Optimal Noise Injection http://arxiv.org/abs/2504.20556v1 Efficient patient-centric EMR sharing block tree http://arxiv.org/abs/2504.20544v1 Starfish: Rebalancing Multi-Party Off-Chain Payment Channels http://arxiv.org/abs/2504.20536v1 TriniMark: A Robust Generative Speech Watermarking Method for Trinity-Level Attribution http://arxiv.org/abs/2504.20532v1 Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM Reasoning via Adaptive Token Compression http://arxiv.org/abs/2504.20493v1 Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes http://arxiv.org/abs/2504.20485v1 Robustness via Referencing: D

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.