Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#204 サイバーarxiv (2025-05-20)

21 May 2025

Description

本日紹介した論文の一覧 Training-Free Watermarking for Autoregressive Image Generation http://arxiv.org/abs/2505.14673v1 TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting http://arxiv.org/abs/2505.14616v1 sudoLLM : On Multi-role Alignment of Language Models http://arxiv.org/abs/2505.14607v1 Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the Edge http://arxiv.org/abs/2505.14592v1 Towards Verifiability of Total Value Locked (TVL) in Decentralized Finance http://arxiv.org/abs/2505.14565v1 Trustworthy Reputation Games and Applications to Proof-of-Reputation Blockchains http://arxiv.org/abs/2505.14551v1 Can Large Language Models Really Recognize Your Name? http://arxiv.org/abs/2505.14549v1 Lessons from Defending Gemini Against Indirect Prompt Injections http://arxiv.org/abs/2505.14534v1 MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations http://arxiv.org/abs/2505.14461v1 Is Your Prompt Safe? Investigating Prompt Injection Attacks Against Open-Source LLMs http://arxiv.org/abs/2505.14368v1 Effects of the Cyber Resilience Act (CRA) on Industrial Equipment Manufacturing Companies http://arxiv.org/abs/2505.14325v1 Vulnerability of Transfer-Learned Neural Networks to Data Reconstruction Attacks in Small-Data Regime http://arxiv.org/abs/2505.14323v1 Exploring Jailbreak Attacks on LLMs through Intent Concealment and Diversion http://arxiv.org/abs/2505.14316v1 Destabilizing Power Grid and Energy Market by Cyberattacks on Smart Inverters http://arxiv.org/abs/2505.14175v1 Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec http://arxiv.org/abs/2505.14162v1 Invisible Entropy: Towards Safe and Efficient Low-Entropy LLM Watermarking http://arxiv.org/abs/2505.14112v1 AudioJailbreak: Jailbreak Attacks against End-to-End Large Audio-Language Models http://arxiv.org/abs/2505.14103v1 In Search of Lost Data: A Study of Flash Sanitization Practices http://arxiv.org/abs/2505.14067v1 CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data http://arxiv.org/abs/2505.14027v1 Zk-SNARK for String Match http://arxiv.org/abs/2505.13964v1 Beyond Text: Unveiling Privacy Vulnerabilities in Multi-modal Retrieval-Augmented Generation http://arxiv.org/abs/2505.13957v1 D4+: Emergent Adversarial Driving Maneuvers with Approximate Functional Optimization http://arxiv.org/abs/2505.13942v1 The Hidden Dangers of Outdated Software: A Cyber Security Perspective http://arxiv.org/abs/2505.13922v1 VulCPE: Context-Aware Cybersecurity Vulnerability Retrieval and Management http://arxiv.org/abs/2505.13895v1 PandaGuard: Systematic Evaluation of LLM Safety in the Era of Jailbreaking Attacks http://arxiv.org/abs/2505.13862v1 hChain 4.0: A Secure and Scalable Permissioned Blockchain for EHR Management in Smart Healthcare http://arxiv.org/abs/2505.13861v1 Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit Obfuscation http://arxiv.org/abs/2505.13848v1 Provable Execution in Real-Time Embedded Systems http://arxiv.org/abs/2505.13842v1 Fragments to Facts: Partial-Information Fragment Inference from LLMs http://arxiv.org/abs/2505.13819v1 QUT-DV25: A Dataset for Dynamic Analysis of Next-Gen Software Supply Chain Attacks http://arxiv.org/abs/2505.13804v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.