Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#215 サイバーarxiv (2025-06-10)

11 Jun 2025

Description

本日紹介した論文の一覧 Navigating Cookie Consent Violations Across the Globe http://arxiv.org/abs/2506.08996v1 Do Concept Replacement Techniques Really Erase Unacceptable Concepts? http://arxiv.org/abs/2506.08991v1 Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels http://arxiv.org/abs/2506.08922v1 Quantifying Mix Network Privacy Erosion with Generative Models http://arxiv.org/abs/2506.08918v1 SmartAttack: Air-Gap Attack via Smartwatches http://arxiv.org/abs/2506.08866v1 ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference http://arxiv.org/abs/2506.08838v1 Lightweight Electronic Signatures and Reliable Access Control Included in Sensor Networks to Prevent Cyber Attacks from Modifying Patient Data http://arxiv.org/abs/2506.08828v1 Lightweight and High-Throughput Secure Logging for Internet of Things and Cold Cloud Continuum http://arxiv.org/abs/2506.08781v1 On the Ethics of Using LLMs for Offensive Security http://arxiv.org/abs/2506.08693v1 WGLE:Backdoor-free and Multi-bit Black-box Watermarking for Graph Neural Networks http://arxiv.org/abs/2506.08602v1 One Patch to Rule Them All: Transforming Static Patches into Dynamic Attacks in the Physical World http://arxiv.org/abs/2506.08482v1 ABC-FHE : A Resource-Efficient Accelerator Enabling Bootstrappable Parameters for Client-Side Fully Homomorphic Encryption http://arxiv.org/abs/2506.08461v1 GPS Spoofing Attacks on AI-based Navigation Systems with Obstacle Avoidance in UAV http://arxiv.org/abs/2506.08445v1 Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings http://arxiv.org/abs/2506.08435v1 Network Threat Detection: Addressing Class Imbalanced Data with Deep Forest http://arxiv.org/abs/2506.08383v1 Differentially Private Relational Learning with Entity-level Privacy Guarantees http://arxiv.org/abs/2506.08347v1 Your Agent Can Defend Itself against Backdoor Attacks http://arxiv.org/abs/2506.08336v1 Distortion Search, A Web Search Privacy Heuristic http://arxiv.org/abs/2506.08330v1 How Good LLM-Generated Password Policies Are? http://arxiv.org/abs/2506.08320v1 Private Evolution Converges http://arxiv.org/abs/2506.08312v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.