本日紹介した論文の一覧 Navigating Cookie Consent Violations Across the Globe http://arxiv.org/abs/2506.08996v1 Do Concept Replacement Techniques Really Erase Unacceptable Concepts? http://arxiv.org/abs/2506.08991v1 Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels http://arxiv.org/abs/2506.08922v1 Quantifying Mix Network Privacy Erosion with Generative Models http://arxiv.org/abs/2506.08918v1 SmartAttack: Air-Gap Attack via Smartwatches http://arxiv.org/abs/2506.08866v1 ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference http://arxiv.org/abs/2506.08838v1 Lightweight Electronic Signatures and Reliable Access Control Included in Sensor Networks to Prevent Cyber Attacks from Modifying Patient Data http://arxiv.org/abs/2506.08828v1 Lightweight and High-Throughput Secure Logging for Internet of Things and Cold Cloud Continuum http://arxiv.org/abs/2506.08781v1 On the Ethics of Using LLMs for Offensive Security http://arxiv.org/abs/2506.08693v1 WGLE:Backdoor-free and Multi-bit Black-box Watermarking for Graph Neural Networks http://arxiv.org/abs/2506.08602v1 One Patch to Rule Them All: Transforming Static Patches into Dynamic Attacks in the Physical World http://arxiv.org/abs/2506.08482v1 ABC-FHE : A Resource-Efficient Accelerator Enabling Bootstrappable Parameters for Client-Side Fully Homomorphic Encryption http://arxiv.org/abs/2506.08461v1 GPS Spoofing Attacks on AI-based Navigation Systems with Obstacle Avoidance in UAV http://arxiv.org/abs/2506.08445v1 Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings http://arxiv.org/abs/2506.08435v1 Network Threat Detection: Addressing Class Imbalanced Data with Deep Forest http://arxiv.org/abs/2506.08383v1 Differentially Private Relational Learning with Entity-level Privacy Guarantees http://arxiv.org/abs/2506.08347v1 Your Agent Can Defend Itself against Backdoor Attacks http://arxiv.org/abs/2506.08336v1 Distortion Search, A Web Search Privacy Heuristic http://arxiv.org/abs/2506.08330v1 How Good LLM-Generated Password Policies Are? http://arxiv.org/abs/2506.08320v1 Private Evolution Converges http://arxiv.org/abs/2506.08312v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast