Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#206 サイバーarxiv (2025-05-22)

23 May 2025

Description

本日紹介した論文の一覧 Invisible Prompts, Visible Threats: Malicious Font Injection in External Resources for Large Language Models http://arxiv.org/abs/2505.16957v1 Backdoor Cleaning without External Guidance in MLLM Fine-tuning http://arxiv.org/abs/2505.16916v1 CAIN: Hijacking LLM-Humans Conversations via a Two-Stage Malicious System Prompt Generation and Refining Framework http://arxiv.org/abs/2505.16888v1 Unlearning Isn't Deletion: Investigating Reversibility of Machine Unlearning in LLMs http://arxiv.org/abs/2505.16831v1 CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of Large Language Models http://arxiv.org/abs/2505.16785v1 When Safety Detectors Aren't Enough: A Stealthy and Effective Jailbreak Attack on LLMs via Steganographic Techniques http://arxiv.org/abs/2505.16765v1 Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization http://arxiv.org/abs/2505.16737v1 Robust LLM Fingerprinting via Domain-Specific Watermarks http://arxiv.org/abs/2505.16723v1 BitHydra: Towards Bit-flip Inference Cost Attack against Large Language Models http://arxiv.org/abs/2505.16670v1 Unsupervised Network Anomaly Detection with Autoencoders and Traffic Images http://arxiv.org/abs/2505.16650v1 BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via Objective-Decoupled Optimization http://arxiv.org/abs/2505.16640v1 Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices http://arxiv.org/abs/2505.16614v1 Finetuning-Activated Backdoors in LLMs http://arxiv.org/abs/2505.16567v1 CTRAP: Embedding Collapse Trap to Safeguard Large Language Models from Harmful Fine-Tuning http://arxiv.org/abs/2505.16559v1 DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection http://arxiv.org/abs/2505.16530v1 Language-based Security and Time-inserting Supervisor http://arxiv.org/abs/2505.16503v1 Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation http://arxiv.org/abs/2505.16439v1 Consistent and Compatible Modelling of Cyber Intrusions and Incident Response Demonstrated in the Context of Malware Attacks on Critical Infrastructure http://arxiv.org/abs/2505.16398v1 Privacy-Aware Cyberterrorism Network Analysis using Graph Neural Networks and Federated Learning http://arxiv.org/abs/2505.16371v1 ReCopilot: Reverse Engineering Copilot in Binary Analysis http://arxiv.org/abs/2505.16366v1 SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models http://arxiv.org/abs/2505.16318v1 Poster: Towards an Automated Security Testing Framework for Industrial UEs http://arxiv.org/abs/2505.16300v1 All You Need is "Leet": Evading Hate-speech Detection AI http://arxiv.org/abs/2505.16263v1 Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models http://arxiv.org/abs/2505.16261v1 Verifying Differentially Private Median Estimation http://arxiv.org/abs/2505.16246v1 A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles http://arxiv.org/abs/2505.16215v1 VIVID: A Novel Approach to Remediation Prioritization in Static Application Security Testing (SAST) http://arxiv.org/abs/2505.16205v1 SafeKey: Amplifying Aha-Moment Insights for Safety Reasoning http://arxiv.org/abs/2505.16186v1 Outsourcing SAT-based Verification Computations in Network Security http://arxiv.org/abs/2505.16137v1 Exte

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.