本日紹介した論文の一覧 AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation http://arxiv.org/abs/2508.13118v1 VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog http://arxiv.org/abs/2508.13092v1 MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies http://arxiv.org/abs/2508.13048v1 AuthenTree: A Scalable MPC-Based Distributed Trust Architecture for Chiplet-based Heterogeneous Systems http://arxiv.org/abs/2508.13033v1 The Application of Transformer-Based Models for Predicting Consequences of Cyber Attacks http://arxiv.org/abs/2508.13030v1 Prescriptive Zero Trust- Assessing the impact of zero trust on cyber attack prevention http://arxiv.org/abs/2508.12953v1 SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip http://arxiv.org/abs/2508.12910v1 FuSaR: A Fuzzification-Based Method for LRM Safety-Reasoning Balance http://arxiv.org/abs/2508.12897v1 Supporting Socially Constrained Private Communications with SecureWhispers http://arxiv.org/abs/2508.12870v1 The covering radius of Butson Hadamard codes for the homogeneous metric http://arxiv.org/abs/2508.12859v1 Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds http://arxiv.org/abs/2508.12832v1 Unlearning Comparator: A Visual Analytics System for Comparative Evaluation of Machine Unlearning Methods http://arxiv.org/abs/2508.12730v1 MPOCryptoML: Multi-Pattern based Off-Chain Crypto Money Laundering Detection http://arxiv.org/abs/2508.12641v1 Consiglieres in the Shadow: Understanding the Use of Uncensored Large Language Models in Cybercrimes http://arxiv.org/abs/2508.12622v1 UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks http://arxiv.org/abs/2508.12597v1 Reducing False Positives with Active Behavioral Analysis for Cloud Security http://arxiv.org/abs/2508.12584v1 Cyber Risks to Next-Gen Brain-Computer Interfaces: Analysis and Recommendations http://arxiv.org/abs/2508.12571v1 Data-driven Trust Bootstrapping for Mobile Edge Computing-based Industrial IoT Services http://arxiv.org/abs/2508.12560v1 DEFENDCLI: {Command-Line} Driven Attack Provenance Examination http://arxiv.org/abs/2508.12553v1 The Hidden Cost of Correlation: Rethinking Privacy Leakage in Local Differential Privacy http://arxiv.org/abs/2508.12539v1 Systematic Analysis of MCP Security http://arxiv.org/abs/2508.12538v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast