本日紹介した論文の一覧 An Adversarial Approach to Evaluating the Robustness of Event Identification Models http://arxiv.org/abs/2402.12338v1 Query-Based Adversarial Prompt Generation http://arxiv.org/abs/2402.12329v1 An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security http://arxiv.org/abs/2402.12252v1 The Fundamental Limits of Least-Privilege Learning http://arxiv.org/abs/2402.12235v1 CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation http://arxiv.org/abs/2402.12222v1 Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships http://arxiv.org/abs/2402.12189v1 Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training http://arxiv.org/abs/2402.12187v1 Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning http://arxiv.org/abs/2402.12168v1 SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans http://arxiv.org/abs/2402.12162v1 Federated Bayesian Network Ensembles http://arxiv.org/abs/2402.12142v1 Groot: Adversarial Testing for Generative Text-to-Image Models with Tree-based Semantic Transformation http://arxiv.org/abs/2402.12100v1 Attack Tree Generation via Process Mining http://arxiv.org/abs/2402.12040v1 Acquiring Clean Language Models from Backdoor Poisoned Datasets by Downscaling Frequency Space http://arxiv.org/abs/2402.12026v1 Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on Chain of Thought http://arxiv.org/abs/2402.12023v1 Privacy-Preserving Low-Rank Adaptation for Latent Diffusion Models http://arxiv.org/abs/2402.11989v1 Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels http://arxiv.org/abs/2402.11953v1 AICAttack: Adversarial Image Captioning Attack with Attention-Based Optimization http://arxiv.org/abs/2402.11940v1 Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features http://arxiv.org/abs/2402.11829v1 An Empirical Evaluation of LLMs for Solving Offensive Security Challenges http://arxiv.org/abs/2402.11814v1 SPML: A DSL for Defending Language Models Against Prompt Attacks http://arxiv.org/abs/2402.11755v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast