Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#251 サイバーarxiv (2025-08-18)

19 Aug 2025

Description

本日紹介した論文の一覧 AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation http://arxiv.org/abs/2508.13118v1 VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog http://arxiv.org/abs/2508.13092v1 MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies http://arxiv.org/abs/2508.13048v1 AuthenTree: A Scalable MPC-Based Distributed Trust Architecture for Chiplet-based Heterogeneous Systems http://arxiv.org/abs/2508.13033v1 The Application of Transformer-Based Models for Predicting Consequences of Cyber Attacks http://arxiv.org/abs/2508.13030v1 Prescriptive Zero Trust- Assessing the impact of zero trust on cyber attack prevention http://arxiv.org/abs/2508.12953v1 SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip http://arxiv.org/abs/2508.12910v1 FuSaR: A Fuzzification-Based Method for LRM Safety-Reasoning Balance http://arxiv.org/abs/2508.12897v1 Supporting Socially Constrained Private Communications with SecureWhispers http://arxiv.org/abs/2508.12870v1 The covering radius of Butson Hadamard codes for the homogeneous metric http://arxiv.org/abs/2508.12859v1 Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds http://arxiv.org/abs/2508.12832v1 Unlearning Comparator: A Visual Analytics System for Comparative Evaluation of Machine Unlearning Methods http://arxiv.org/abs/2508.12730v1 MPOCryptoML: Multi-Pattern based Off-Chain Crypto Money Laundering Detection http://arxiv.org/abs/2508.12641v1 Consiglieres in the Shadow: Understanding the Use of Uncensored Large Language Models in Cybercrimes http://arxiv.org/abs/2508.12622v1 UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks http://arxiv.org/abs/2508.12597v1 Reducing False Positives with Active Behavioral Analysis for Cloud Security http://arxiv.org/abs/2508.12584v1 Cyber Risks to Next-Gen Brain-Computer Interfaces: Analysis and Recommendations http://arxiv.org/abs/2508.12571v1 Data-driven Trust Bootstrapping for Mobile Edge Computing-based Industrial IoT Services http://arxiv.org/abs/2508.12560v1 DEFENDCLI: {Command-Line} Driven Attack Provenance Examination http://arxiv.org/abs/2508.12553v1 The Hidden Cost of Correlation: Rethinking Privacy Leakage in Local Differential Privacy http://arxiv.org/abs/2508.12539v1 Systematic Analysis of MCP Security http://arxiv.org/abs/2508.12538v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.