Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#264 サイバーarxiv (2025-09-15)

16 Sep 2025

Description

本日紹介した論文の一覧 LOKI: Proactively Discovering Online Scam Websites by Mining Toxic Search Queries http://arxiv.org/abs/2509.12181v1 Poison to Detect: Detection of Targeted Overfitting in Federated Learning http://arxiv.org/abs/2509.11974v1 Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study http://arxiv.org/abs/2509.11971v1 zkToken: Empowering Holders to Limit Revocation Checks for Verifiable Credentials http://arxiv.org/abs/2509.11934v1 Efficient Byzantine-Robust Privacy-Preserving Federated Learning via Dimension Compression http://arxiv.org/abs/2509.11870v1 NeuroStrike: Neuron-Level Attacks on Aligned LLMs http://arxiv.org/abs/2509.11864v1 A Practical Adversarial Attack against Sequence-based Deep Learning Malware Classifiers http://arxiv.org/abs/2509.11836v1 Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP Address Sharing Scenarios http://arxiv.org/abs/2509.11833v1 Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning http://arxiv.org/abs/2509.11786v1 On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy Constraints http://arxiv.org/abs/2509.11761v1 Removal Attack and Defense on AI-generated Content Latent-based Watermarking http://arxiv.org/abs/2509.11745v1 A Holistic Approach to E-Commerce Innovation: Redefining Security and User Experience http://arxiv.org/abs/2509.11712v1 Time-Based State-Management of Hash-Based Signature CAs for VPN-Authentication http://arxiv.org/abs/2509.11695v1 An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks http://arxiv.org/abs/2509.11683v1 Cyber Attack Mitigation Framework for Denial of Service (DoS) Attacks in Fog Computing http://arxiv.org/abs/2509.11668v1 Inducing Uncertainty for Test-Time Privacy http://arxiv.org/abs/2509.11625v1 Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution http://arxiv.org/abs/2509.11615v1 AMLNet: A Knowledge-Based Multi-Agent Framework to Generate and Detect Realistic Money Laundering Transactions http://arxiv.org/abs/2509.11595v1 ILA: Correctness via Type Checking for Fully Homomorphic Encryption http://arxiv.org/abs/2509.11559v1 Dstack: A Zero Trust Framework for Confidential Containers http://arxiv.org/abs/2509.11555v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.