Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#245 サイバーarxiv (2025-08-06)

07 Aug 2025

Description

本日紹介した論文の一覧 Cybersecurity of Quantum Key Distribution Implementations http://arxiv.org/abs/2508.04669v1 Millions of inequivalent quadratic APN functions in eight variables http://arxiv.org/abs/2508.04644v1 4-Swap: Achieving Grief-Free and Bribery-Safe Atomic Swaps Using Four Transactions http://arxiv.org/abs/2508.04641v1 Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing Technologies http://arxiv.org/abs/2508.04583v1 Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems http://arxiv.org/abs/2508.04561v1 Privacy Risk Predictions Based on Fundamental Understanding of Personal Data and an Evolving Threat Landscape http://arxiv.org/abs/2508.04542v1 Bases of Riemann-Roch spaces associated with arbitrary elliptic curve divisors and their application in constructing various elliptic Codes families http://arxiv.org/abs/2508.04340v1 Per-element Secure Aggregation against Data Reconstruction Attacks in Federated Learning http://arxiv.org/abs/2508.04285v1 Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy http://arxiv.org/abs/2508.04281v1 SelectiveShield: Lightweight Hybrid Defense Against Gradient Leakage in Federated Learning http://arxiv.org/abs/2508.04265v1 DP-DocLDM: Differentially Private Document Image Generation using Latent Diffusion Models http://arxiv.org/abs/2508.04208v1 Eliciting and Analyzing Emergent Misalignment in State-of-the-Art Large Language Models http://arxiv.org/abs/2508.04196v1 BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time Series Forecasting http://arxiv.org/abs/2508.04189v1 Secure Development of a Hooking-Based Deception Framework Against Keylogging Techniques http://arxiv.org/abs/2508.04178v1 Evaluating Selective Encryption Against Gradient Inversion Attacks http://arxiv.org/abs/2508.04155v1 SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for Joint Federated Learning in Cross-Device Scenarios http://arxiv.org/abs/2508.04100v1 Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors http://arxiv.org/abs/2508.04094v1 Identity Theft in AI Conference Peer Review http://arxiv.org/abs/2508.04024v1 Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability http://arxiv.org/abs/2508.04000v1 Reputation-based partition scheme for IoT security http://arxiv.org/abs/2508.03981v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.