Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#280 サイバーarxiv (2025-10-14)

15 Oct 2025

Description

本日紹介した論文の一覧 Hash chaining degrades security at Facebook http://arxiv.org/abs/2510.12665v1 PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused Graph Neural Networks http://arxiv.org/abs/2510.12652v1 Noisy Neighbor: Exploiting RDMA for Resource Exhaustion Attacks in Containerized Clouds http://arxiv.org/abs/2510.12629v1 Multi-Copy Security in Unclonable Cryptography http://arxiv.org/abs/2510.12626v1 Proof of Cloud: Data Center Execution Assurance for Confidential VMs http://arxiv.org/abs/2510.12469v1 Evaluating and Mitigating LLM-as-a-judge Bias in Communication Systems http://arxiv.org/abs/2510.12462v1 Attack-Specialized Deep Learning with Ensemble Fusion for Network Anomaly Detection http://arxiv.org/abs/2510.12455v1 Formal Models and Convergence Analysis for Context-Aware Security Verification http://arxiv.org/abs/2510.12440v1 Targeted Pooled Latent-Space Steganalysis Applied to Generative Steganography, with a Fix http://arxiv.org/abs/2510.12414v1 IP-Augmented Multi-Modal Malicious URL Detection Via Token-Contrastive Representation Enhancement and Multi-Granularity Fusion http://arxiv.org/abs/2510.12395v1 Traveling Salesman-Based Token Ordering Improves Stability in Homomorphically Encrypted Language Models http://arxiv.org/abs/2510.12343v1 DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection http://arxiv.org/abs/2510.12310v1 PromptLocate: Localizing Prompt Injection Attacks http://arxiv.org/abs/2510.12252v1 HackWorld: Evaluating Computer-Use Agents on Exploiting Web Application Vulnerabilities http://arxiv.org/abs/2510.12200v1 Leaking Queries On Secure Stream Processing Systems http://arxiv.org/abs/2510.12172v1 VeilAudit: Breaking the Deadlock Between Privacy and Accountability Across Blockchains http://arxiv.org/abs/2510.12153v1 Fairness-Constrained Optimization Attack in Federated Learning http://arxiv.org/abs/2510.12143v1 Locket: Robust Feature-Locking Technique for Language Models http://arxiv.org/abs/2510.12117v1 Elevating Medical Image Security: A Cryptographic Framework Integrating Hyperchaotic Map and GRU http://arxiv.org/abs/2510.12084v1 Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3 http://arxiv.org/abs/2510.12062v1 Over-Threshold Multiparty Private Set Intersection for Collaborative Network Intrusion Detection http://arxiv.org/abs/2510.12045v1 Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications http://arxiv.org/abs/2510.12031v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.