本日紹介した論文の一覧 LOKI: Proactively Discovering Online Scam Websites by Mining Toxic Search Queries http://arxiv.org/abs/2509.12181v1 Poison to Detect: Detection of Targeted Overfitting in Federated Learning http://arxiv.org/abs/2509.11974v1 Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study http://arxiv.org/abs/2509.11971v1 zkToken: Empowering Holders to Limit Revocation Checks for Verifiable Credentials http://arxiv.org/abs/2509.11934v1 Efficient Byzantine-Robust Privacy-Preserving Federated Learning via Dimension Compression http://arxiv.org/abs/2509.11870v1 NeuroStrike: Neuron-Level Attacks on Aligned LLMs http://arxiv.org/abs/2509.11864v1 A Practical Adversarial Attack against Sequence-based Deep Learning Malware Classifiers http://arxiv.org/abs/2509.11836v1 Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP Address Sharing Scenarios http://arxiv.org/abs/2509.11833v1 Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning http://arxiv.org/abs/2509.11786v1 On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy Constraints http://arxiv.org/abs/2509.11761v1 Removal Attack and Defense on AI-generated Content Latent-based Watermarking http://arxiv.org/abs/2509.11745v1 A Holistic Approach to E-Commerce Innovation: Redefining Security and User Experience http://arxiv.org/abs/2509.11712v1 Time-Based State-Management of Hash-Based Signature CAs for VPN-Authentication http://arxiv.org/abs/2509.11695v1 An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks http://arxiv.org/abs/2509.11683v1 Cyber Attack Mitigation Framework for Denial of Service (DoS) Attacks in Fog Computing http://arxiv.org/abs/2509.11668v1 Inducing Uncertainty for Test-Time Privacy http://arxiv.org/abs/2509.11625v1 Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution http://arxiv.org/abs/2509.11615v1 AMLNet: A Knowledge-Based Multi-Agent Framework to Generate and Detect Realistic Money Laundering Transactions http://arxiv.org/abs/2509.11595v1 ILA: Correctness via Type Checking for Fully Homomorphic Encryption http://arxiv.org/abs/2509.11559v1 Dstack: A Zero Trust Framework for Confidential Containers http://arxiv.org/abs/2509.11555v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast