本日紹介した論文の一覧 Recovering the Pre-Fine-Tuning Weights of Generative Models http://arxiv.org/abs/2402.10208v1 A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets http://arxiv.org/abs/2402.10145v1 Transaction Capacity, Security and Latency in Blockchains http://arxiv.org/abs/2402.10138v1 FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning http://arxiv.org/abs/2402.10082v1 How Much Does Each Datapoint Leak Your Privacy? Quantifying the Per-datum Membership Leakage http://arxiv.org/abs/2402.10065v1 On the Domain Generalizability of RF Fingerprints Through Multifractal Dimension Representation http://arxiv.org/abs/2402.10044v1 Systematic Literature Review of EM-SCA Attacks on Encryption http://arxiv.org/abs/2402.10030v1 Privacy Attacks in Decentralized Learning http://arxiv.org/abs/2402.10001v1 TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in the Wild http://arxiv.org/abs/2402.09973v1 A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions in Odd Sizes http://arxiv.org/abs/2402.09937v1 JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing http://arxiv.org/abs/2402.09845v1 Enhancing Cybersecurity Resilience in Finance with Deep Learning for Advanced Threat Detection http://arxiv.org/abs/2402.09820v1 An advanced data fabric architecture leveraging homomorphic encryption and federated learning http://arxiv.org/abs/2402.09795v1 Federated Analytics-Empowered Frequent Pattern Mining for Decentralized Web 3.0 Applications http://arxiv.org/abs/2402.09736v1 AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns http://arxiv.org/abs/2402.09728v1 DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service http://arxiv.org/abs/2402.09715v1 Preserving Data Privacy for ML-driven Applications in Open Radio Access Networks http://arxiv.org/abs/2402.09710v1 HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor http://arxiv.org/abs/2402.09701v1 PAL: Proxy-Guided Black-Box Attack on Large Language Models http://arxiv.org/abs/2402.09674v1 Characterizing the Modification Space of Signature IDS Rules http://arxiv.org/abs/2402.09644v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast