本日紹介した論文の一覧 Unraveling Ethereum's Mempool: The Impact of Fee Fairness, Transaction Prioritization, and Consensus Efficiency http://arxiv.org/abs/2506.07988v1 Exposing Hidden Backdoors in NFT Smart Contracts: A Static Security Analysis of Rug Pull Patterns http://arxiv.org/abs/2506.07974v1 Understanding the Error Sensitivity of Privacy-Aware Computing http://arxiv.org/abs/2506.07957v1 TokenBreak: Bypassing Text Classification Models Through Token Manipulation http://arxiv.org/abs/2506.07948v1 Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption http://arxiv.org/abs/2506.07894v1 SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark http://arxiv.org/abs/2506.07888v1 Evaluating explainable AI for deep learning-based network intrusion detection system alert classification http://arxiv.org/abs/2506.07882v1 Securing Unbounded Differential Privacy Against Timing Attacks http://arxiv.org/abs/2506.07868v1 Are Trees Really Green? A Detection Approach of IoT Malware Attacks http://arxiv.org/abs/2506.07836v1 User-space library rootkits revisited: Are user-space detection mechanisms futile? http://arxiv.org/abs/2506.07827v1 LLM Unlearning Should Be Form-Independent http://arxiv.org/abs/2506.07795v1 "I wasn't sure if this is indeed a security risk": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages http://arxiv.org/abs/2506.07728v1 Profiling Electric Vehicles via Early Charging Voltage Patterns http://arxiv.org/abs/2506.07714v1 Stark-Coleman Invariants and Quantum Lower Bounds: An Integrated Framework for Real Quadratic Fields http://arxiv.org/abs/2506.07640v1 TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems http://arxiv.org/abs/2506.07605v1 MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity http://arxiv.org/abs/2506.07586v1 Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain http://arxiv.org/abs/2506.07480v1 Pixel-Sensitive and Robust Steganography Based on Polar Codes http://arxiv.org/abs/2506.07404v1 Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness http://arxiv.org/abs/2506.07403v1 Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks Stemming from Alignment Failures http://arxiv.org/abs/2506.07402v1 From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks http://arxiv.org/abs/2506.07392v1 Enhanced Consistency Bi-directional GAN(CBiGAN) for Malware Anomaly Detection http://arxiv.org/abs/2506.07372v1 JavelinGuard: Low-Cost Transformer Architectures for LLM Security http://arxiv.org/abs/2506.07330v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast