本日紹介した論文の一覧 Cybersecurity of Quantum Key Distribution Implementations http://arxiv.org/abs/2508.04669v1 Millions of inequivalent quadratic APN functions in eight variables http://arxiv.org/abs/2508.04644v1 4-Swap: Achieving Grief-Free and Bribery-Safe Atomic Swaps Using Four Transactions http://arxiv.org/abs/2508.04641v1 Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing Technologies http://arxiv.org/abs/2508.04583v1 Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems http://arxiv.org/abs/2508.04561v1 Privacy Risk Predictions Based on Fundamental Understanding of Personal Data and an Evolving Threat Landscape http://arxiv.org/abs/2508.04542v1 Bases of Riemann-Roch spaces associated with arbitrary elliptic curve divisors and their application in constructing various elliptic Codes families http://arxiv.org/abs/2508.04340v1 Per-element Secure Aggregation against Data Reconstruction Attacks in Federated Learning http://arxiv.org/abs/2508.04285v1 Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy http://arxiv.org/abs/2508.04281v1 SelectiveShield: Lightweight Hybrid Defense Against Gradient Leakage in Federated Learning http://arxiv.org/abs/2508.04265v1 DP-DocLDM: Differentially Private Document Image Generation using Latent Diffusion Models http://arxiv.org/abs/2508.04208v1 Eliciting and Analyzing Emergent Misalignment in State-of-the-Art Large Language Models http://arxiv.org/abs/2508.04196v1 BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time Series Forecasting http://arxiv.org/abs/2508.04189v1 Secure Development of a Hooking-Based Deception Framework Against Keylogging Techniques http://arxiv.org/abs/2508.04178v1 Evaluating Selective Encryption Against Gradient Inversion Attacks http://arxiv.org/abs/2508.04155v1 SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for Joint Federated Learning in Cross-Device Scenarios http://arxiv.org/abs/2508.04100v1 Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors http://arxiv.org/abs/2508.04094v1 Identity Theft in AI Conference Peer Review http://arxiv.org/abs/2508.04024v1 Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability http://arxiv.org/abs/2508.04000v1 Reputation-based partition scheme for IoT security http://arxiv.org/abs/2508.03981v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast