本日紹介した論文の一覧 Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and Opportunities http://arxiv.org/abs/2509.06921v1 An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection http://arxiv.org/abs/2509.06920v1 Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification http://arxiv.org/abs/2509.06902v1 EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language Models http://arxiv.org/abs/2509.06838v1 Imitative Membership Inference Attack http://arxiv.org/abs/2509.06796v1 Image Encryption Scheme Based on Hyper-Chaotic Map and Self-Adaptive Diffusion http://arxiv.org/abs/2509.06754v1 When Secure Isn't: Assessing the Security of Machine Learning Model Sharing http://arxiv.org/abs/2509.06703v1 Network-level Censorship Attacks in the InterPlanetary File System http://arxiv.org/abs/2509.06626v1 A Secure Sequencer and Data Availability Committee for Rollups (Extended Version) http://arxiv.org/abs/2509.06614v1 LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop? http://arxiv.org/abs/2509.06595v1 Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem http://arxiv.org/abs/2509.06572v1 A Simple Data Exfiltration Game http://arxiv.org/abs/2509.06571v1 Marginal sets in semigroups and semirings http://arxiv.org/abs/2509.06562v1 Contrastive Self-Supervised Network Intrusion Detection using Augmented Negative Pairs http://arxiv.org/abs/2509.06550v1 Super-Quadratic Quantum Speed-ups and Guessing Many Likely Keys http://arxiv.org/abs/2509.06549v1 Signal-Based Malware Classification Using 1D CNNs http://arxiv.org/abs/2509.06548v1 Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V Processors http://arxiv.org/abs/2509.06509v1 When Code Crosses Borders: A Security-Centric Evaluation of LLM-based Code Translation http://arxiv.org/abs/2509.06504v1 NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network Executables http://arxiv.org/abs/2509.06402v1 From Perception to Protection: A Developer-Centered Study of Security and Privacy Threats in Extended Reality (XR) http://arxiv.org/abs/2509.06368v1 Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks? http://arxiv.org/abs/2509.06350v1 Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic Shift http://arxiv.org/abs/2509.06338v1 Multi View Slot Attention Using Paraphrased Texts For Face Anti-Spoofing http://arxiv.org/abs/2509.06336v1 AttestLLM: Efficient Attestation Framework for Billion-scale On-device LLMs http://arxiv.org/abs/2509.06326v1 Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack http://arxiv.org/abs/2509.06318v1 PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss Random Variable Optimization http://arxiv.org/abs/2509.06264v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast