Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#214 サイバーarxiv (2025-06-09)

10 Jun 2025

Description

本日紹介した論文の一覧 Unraveling Ethereum's Mempool: The Impact of Fee Fairness, Transaction Prioritization, and Consensus Efficiency http://arxiv.org/abs/2506.07988v1 Exposing Hidden Backdoors in NFT Smart Contracts: A Static Security Analysis of Rug Pull Patterns http://arxiv.org/abs/2506.07974v1 Understanding the Error Sensitivity of Privacy-Aware Computing http://arxiv.org/abs/2506.07957v1 TokenBreak: Bypassing Text Classification Models Through Token Manipulation http://arxiv.org/abs/2506.07948v1 Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption http://arxiv.org/abs/2506.07894v1 SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark http://arxiv.org/abs/2506.07888v1 Evaluating explainable AI for deep learning-based network intrusion detection system alert classification http://arxiv.org/abs/2506.07882v1 Securing Unbounded Differential Privacy Against Timing Attacks http://arxiv.org/abs/2506.07868v1 Are Trees Really Green? A Detection Approach of IoT Malware Attacks http://arxiv.org/abs/2506.07836v1 User-space library rootkits revisited: Are user-space detection mechanisms futile? http://arxiv.org/abs/2506.07827v1 LLM Unlearning Should Be Form-Independent http://arxiv.org/abs/2506.07795v1 "I wasn't sure if this is indeed a security risk": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages http://arxiv.org/abs/2506.07728v1 Profiling Electric Vehicles via Early Charging Voltage Patterns http://arxiv.org/abs/2506.07714v1 Stark-Coleman Invariants and Quantum Lower Bounds: An Integrated Framework for Real Quadratic Fields http://arxiv.org/abs/2506.07640v1 TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems http://arxiv.org/abs/2506.07605v1 MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity http://arxiv.org/abs/2506.07586v1 Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain http://arxiv.org/abs/2506.07480v1 Pixel-Sensitive and Robust Steganography Based on Polar Codes http://arxiv.org/abs/2506.07404v1 Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness http://arxiv.org/abs/2506.07403v1 Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks Stemming from Alignment Failures http://arxiv.org/abs/2506.07402v1 From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks http://arxiv.org/abs/2506.07392v1 Enhanced Consistency Bi-directional GAN(CBiGAN) for Malware Anomaly Detection http://arxiv.org/abs/2506.07372v1 JavelinGuard: Low-Cost Transformer Architectures for LLM Security http://arxiv.org/abs/2506.07330v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.