Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#27 サイバーarxiv (2024-02-19)

20 Feb 2024

Description

本日紹介した論文の一覧 An Adversarial Approach to Evaluating the Robustness of Event Identification Models http://arxiv.org/abs/2402.12338v1 Query-Based Adversarial Prompt Generation http://arxiv.org/abs/2402.12329v1 An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security http://arxiv.org/abs/2402.12252v1 The Fundamental Limits of Least-Privilege Learning http://arxiv.org/abs/2402.12235v1 CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation http://arxiv.org/abs/2402.12222v1 Amplifying Training Data Exposure through Fine-Tuning with Pseudo-Labeled Memberships http://arxiv.org/abs/2402.12189v1 Adversarial Feature Alignment: Balancing Robustness and Accuracy in Deep Learning via Adversarial Training http://arxiv.org/abs/2402.12187v1 Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning http://arxiv.org/abs/2402.12168v1 SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans http://arxiv.org/abs/2402.12162v1 Federated Bayesian Network Ensembles http://arxiv.org/abs/2402.12142v1 Groot: Adversarial Testing for Generative Text-to-Image Models with Tree-based Semantic Transformation http://arxiv.org/abs/2402.12100v1 Attack Tree Generation via Process Mining http://arxiv.org/abs/2402.12040v1 Acquiring Clean Language Models from Backdoor Poisoned Datasets by Downscaling Frequency Space http://arxiv.org/abs/2402.12026v1 Evaluation of ChatGPT's Smart Contract Auditing Capabilities Based on Chain of Thought http://arxiv.org/abs/2402.12023v1 Privacy-Preserving Low-Rank Adaptation for Latent Diffusion Models http://arxiv.org/abs/2402.11989v1 Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels http://arxiv.org/abs/2402.11953v1 AICAttack: Adversarial Image Captioning Attack with Attention-Based Optimization http://arxiv.org/abs/2402.11940v1 Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features http://arxiv.org/abs/2402.11829v1 An Empirical Evaluation of LLMs for Solving Offensive Security Challenges http://arxiv.org/abs/2402.11814v1 SPML: A DSL for Defending Language Models Against Prompt Attacks http://arxiv.org/abs/2402.11755v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.