Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#260 サイバーarxiv (2025-09-08)

09 Sep 2025

Description

本日紹介した論文の一覧 Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and Opportunities http://arxiv.org/abs/2509.06921v1 An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection http://arxiv.org/abs/2509.06920v1 Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification http://arxiv.org/abs/2509.06902v1 EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language Models http://arxiv.org/abs/2509.06838v1 Imitative Membership Inference Attack http://arxiv.org/abs/2509.06796v1 Image Encryption Scheme Based on Hyper-Chaotic Map and Self-Adaptive Diffusion http://arxiv.org/abs/2509.06754v1 When Secure Isn't: Assessing the Security of Machine Learning Model Sharing http://arxiv.org/abs/2509.06703v1 Network-level Censorship Attacks in the InterPlanetary File System http://arxiv.org/abs/2509.06626v1 A Secure Sequencer and Data Availability Committee for Rollups (Extended Version) http://arxiv.org/abs/2509.06614v1 LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop? http://arxiv.org/abs/2509.06595v1 Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem http://arxiv.org/abs/2509.06572v1 A Simple Data Exfiltration Game http://arxiv.org/abs/2509.06571v1 Marginal sets in semigroups and semirings http://arxiv.org/abs/2509.06562v1 Contrastive Self-Supervised Network Intrusion Detection using Augmented Negative Pairs http://arxiv.org/abs/2509.06550v1 Super-Quadratic Quantum Speed-ups and Guessing Many Likely Keys http://arxiv.org/abs/2509.06549v1 Signal-Based Malware Classification Using 1D CNNs http://arxiv.org/abs/2509.06548v1 Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V Processors http://arxiv.org/abs/2509.06509v1 When Code Crosses Borders: A Security-Centric Evaluation of LLM-based Code Translation http://arxiv.org/abs/2509.06504v1 NeuroDeX: Unlocking Diverse Support in Decompiling Deep Neural Network Executables http://arxiv.org/abs/2509.06402v1 From Perception to Protection: A Developer-Centered Study of Security and Privacy Threats in Extended Reality (XR) http://arxiv.org/abs/2509.06368v1 Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks? http://arxiv.org/abs/2509.06350v1 Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic Shift http://arxiv.org/abs/2509.06338v1 Multi View Slot Attention Using Paraphrased Texts For Face Anti-Spoofing http://arxiv.org/abs/2509.06336v1 AttestLLM: Efficient Attestation Framework for Billion-scale On-device LLMs http://arxiv.org/abs/2509.06326v1 Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack http://arxiv.org/abs/2509.06318v1 PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss Random Variable Optimization http://arxiv.org/abs/2509.06264v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.