Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#26 サイバーarxiv (2024-02-15)

16 Feb 2024

Description

本日紹介した論文の一覧 Recovering the Pre-Fine-Tuning Weights of Generative Models http://arxiv.org/abs/2402.10208v1 A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets http://arxiv.org/abs/2402.10145v1 Transaction Capacity, Security and Latency in Blockchains http://arxiv.org/abs/2402.10138v1 FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning http://arxiv.org/abs/2402.10082v1 How Much Does Each Datapoint Leak Your Privacy? Quantifying the Per-datum Membership Leakage http://arxiv.org/abs/2402.10065v1 On the Domain Generalizability of RF Fingerprints Through Multifractal Dimension Representation http://arxiv.org/abs/2402.10044v1 Systematic Literature Review of EM-SCA Attacks on Encryption http://arxiv.org/abs/2402.10030v1 Privacy Attacks in Decentralized Learning http://arxiv.org/abs/2402.10001v1 TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in the Wild http://arxiv.org/abs/2402.09973v1 A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions in Odd Sizes http://arxiv.org/abs/2402.09937v1 JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing http://arxiv.org/abs/2402.09845v1 Enhancing Cybersecurity Resilience in Finance with Deep Learning for Advanced Threat Detection http://arxiv.org/abs/2402.09820v1 An advanced data fabric architecture leveraging homomorphic encryption and federated learning http://arxiv.org/abs/2402.09795v1 Federated Analytics-Empowered Frequent Pattern Mining for Decentralized Web 3.0 Applications http://arxiv.org/abs/2402.09736v1 AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns http://arxiv.org/abs/2402.09728v1 DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service http://arxiv.org/abs/2402.09715v1 Preserving Data Privacy for ML-driven Applications in Open Radio Access Networks http://arxiv.org/abs/2402.09710v1 HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor http://arxiv.org/abs/2402.09701v1 PAL: Proxy-Guided Black-Box Attack on Large Language Models http://arxiv.org/abs/2402.09674v1 Characterizing the Modification Space of Signature IDS Rules http://arxiv.org/abs/2402.09644v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.