本日紹介した論文の一覧 Hash chaining degrades security at Facebook http://arxiv.org/abs/2510.12665v1 PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused Graph Neural Networks http://arxiv.org/abs/2510.12652v1 Noisy Neighbor: Exploiting RDMA for Resource Exhaustion Attacks in Containerized Clouds http://arxiv.org/abs/2510.12629v1 Multi-Copy Security in Unclonable Cryptography http://arxiv.org/abs/2510.12626v1 Proof of Cloud: Data Center Execution Assurance for Confidential VMs http://arxiv.org/abs/2510.12469v1 Evaluating and Mitigating LLM-as-a-judge Bias in Communication Systems http://arxiv.org/abs/2510.12462v1 Attack-Specialized Deep Learning with Ensemble Fusion for Network Anomaly Detection http://arxiv.org/abs/2510.12455v1 Formal Models and Convergence Analysis for Context-Aware Security Verification http://arxiv.org/abs/2510.12440v1 Targeted Pooled Latent-Space Steganalysis Applied to Generative Steganography, with a Fix http://arxiv.org/abs/2510.12414v1 IP-Augmented Multi-Modal Malicious URL Detection Via Token-Contrastive Representation Enhancement and Multi-Granularity Fusion http://arxiv.org/abs/2510.12395v1 Traveling Salesman-Based Token Ordering Improves Stability in Homomorphically Encrypted Language Models http://arxiv.org/abs/2510.12343v1 DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection http://arxiv.org/abs/2510.12310v1 PromptLocate: Localizing Prompt Injection Attacks http://arxiv.org/abs/2510.12252v1 HackWorld: Evaluating Computer-Use Agents on Exploiting Web Application Vulnerabilities http://arxiv.org/abs/2510.12200v1 Leaking Queries On Secure Stream Processing Systems http://arxiv.org/abs/2510.12172v1 VeilAudit: Breaking the Deadlock Between Privacy and Accountability Across Blockchains http://arxiv.org/abs/2510.12153v1 Fairness-Constrained Optimization Attack in Federated Learning http://arxiv.org/abs/2510.12143v1 Locket: Robust Feature-Locking Technique for Language Models http://arxiv.org/abs/2510.12117v1 Elevating Medical Image Security: A Cryptographic Framework Integrating Hyperchaotic Map and GRU http://arxiv.org/abs/2510.12084v1 Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3 http://arxiv.org/abs/2510.12062v1 Over-Threshold Multiparty Private Set Intersection for Collaborative Network Intrusion Detection http://arxiv.org/abs/2510.12045v1 Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications http://arxiv.org/abs/2510.12031v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast