本日紹介した論文の一覧 Hedge Funds on a Swamp: Analyzing Patterns, Vulnerabilities, and Defense Measures in Blockchain Bridges [Experiment, Analysis \& Benchmark] http://arxiv.org/abs/2507.06156v1 Fun with flags: How Compilers Break and Fix Constant-Time Code http://arxiv.org/abs/2507.06112v1 Taming Data Challenges in ML-based Security Tasks: Lessons from Integrating Generative AI http://arxiv.org/abs/2507.06092v1 Wrapless: The trustless lending protocol on top of Bitcoin http://arxiv.org/abs/2507.06064v1 CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations http://arxiv.org/abs/2507.06043v1 Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks http://arxiv.org/abs/2507.06039v1 The Impact of Event Data Partitioning on Privacy-aware Process Discovery http://arxiv.org/abs/2507.06008v1 Post-Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform http://arxiv.org/abs/2507.05875v1 LDP$^3$: An Extensible and Multi-Threaded Toolkit for Local Differential Privacy Protocols and Post-Processing Methods http://arxiv.org/abs/2507.05872v1 A Formal Refutation of the Blockchain Trilemma http://arxiv.org/abs/2507.05809v1 Automated Reasoning for Vulnerability Management by Design http://arxiv.org/abs/2507.05794v1 Asynchronous Event Error-Minimizing Noise for Safeguarding Event Dataset http://arxiv.org/abs/2507.05728v1 Polyadic encryption http://arxiv.org/abs/2507.05683v1 TuneShield: Mitigating Toxicity in Conversational AI while Fine-tuning on Untrusted Data http://arxiv.org/abs/2507.05660v1 DESIGN: Encrypted GNN Inference via Server-Side Input Graph Pruning http://arxiv.org/abs/2507.05649v1 How Not to Detect Prompt Injections with an LLM http://arxiv.org/abs/2507.05630v1 DATABench: Evaluating Dataset Auditing in Deep Learning from an Adversarial Perspective http://arxiv.org/abs/2507.05622v1 The Landscape of Memorization in LLMs: Mechanisms, Measurement, and Mitigation http://arxiv.org/abs/2507.05578v1 iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips http://arxiv.org/abs/2507.05576v1 AI Agent Smart Contract Exploit Generation http://arxiv.org/abs/2507.05558v1 Per-Row Activation Counting on Real Hardware: Demystifying Performance Overheads http://arxiv.org/abs/2507.05556v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast