本日紹介した論文の一覧 A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems http://arxiv.org/abs/2510.14906v1 Mapping Smarter, Not Harder: A Test-Time Reinforcement Learning Agent That Improves Without Labels or Model Updates http://arxiv.org/abs/2510.14900v1 Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning http://arxiv.org/abs/2510.14894v1 Provable Unlearning with Gradient Ascent on Two-Layer ReLU Neural Networks http://arxiv.org/abs/2510.14844v1 ColumnDisturb: Understanding Column-based Read Disturbance in Real DRAM Chips and Implications for Future Systems http://arxiv.org/abs/2510.14750v1 SLIE: A Secure and Lightweight Cryptosystem for Data Sharing in IoT Healthcare Services http://arxiv.org/abs/2510.14708v1 LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet? http://arxiv.org/abs/2510.14700v1 FibRace: a large-scale benchmark of client-side proving on mobile devices http://arxiv.org/abs/2510.14693v1 AEX-NStep: Probabilistic Interrupt Counting Attacks on Intel SGX http://arxiv.org/abs/2510.14675v1 TITAN: Graph-Executable Reasoning for Cyber Threat Intelligence http://arxiv.org/abs/2510.14670v1 Improving Cybercrime Detection and Digital Forensics Investigations with Artificial Intelligence http://arxiv.org/abs/2510.14638v1 Symbolic verification of Apple's Find My location-tracking protocol http://arxiv.org/abs/2510.14589v1 Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration http://arxiv.org/abs/2510.14522v1 Certifying optimal MEV strategies with Lean http://arxiv.org/abs/2510.14480v1 Stealthy Dual-Trigger Backdoors: Attacking Prompt Tuning in LM-Empowered Graph Foundation Models http://arxiv.org/abs/2510.14470v1 Match & Mend: Minimally Invasive Local Reassembly for Patching N-day Vulnerabilities in ARM Binaries http://arxiv.org/abs/2510.14384v1 Are My Optimized Prompts Compromised? Exploring Vulnerabilities of LLM-based Optimizers http://arxiv.org/abs/2510.14381v1 BinCtx: Multi-Modal Representation Learning for Robust Android App Behavior Detection http://arxiv.org/abs/2510.14344v1 Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy, and Security Studies http://arxiv.org/abs/2510.14312v1 Beyond a Single Perspective: Towards a Realistic Evaluation of Website Fingerprinting Attacks http://arxiv.org/abs/2510.14283v1 RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models http://arxiv.org/abs/2510.14233v1 An Information Asymmetry Game for Trigger-based DNN Model Watermarking http://arxiv.org/abs/2510.14218v1 Infrastructure Patterns in Toll Scam Domains: A Comprehensive Analysis of Cybercriminal Registration and Hosting Strategies http://arxiv.org/abs/2510.14198v1 Securing U.S. Critical Infrastructure: Lessons from Stuxnet and the Ukraine Power Grid Attacks http://arxiv.org/abs/2510.14185v1 Power Grid Cybersecurity: Policy Analysis White Paper http://arxiv.org/abs/2510.14171v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast