Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#285 サイバーarxiv (2025-10-22)

23 Oct 2025

Description

本日紹介した論文の一覧 The Tail Tells All: Estimating Model-Level Membership Inference Vulnerability Without Reference Models http://arxiv.org/abs/2510.19773v1 Under Pressure: Security Analysis and Process Impacts of a Commercial Smart Air Compressor http://arxiv.org/abs/2510.19772v1 Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems http://arxiv.org/abs/2510.19761v1 Unfair Mistakes on Social Media: How Demographic Characteristics influence Authorship Attribution http://arxiv.org/abs/2510.19708v1 CircuitGuard: Mitigating LLM Memorization in RTL Code Generation Against IP Leakage http://arxiv.org/abs/2510.19676v1 FidelityGPT: Correcting Decompilation Distortions with Retrieval Augmented Generation http://arxiv.org/abs/2510.19615v1 Can You Trust What You See? Alpha Channel No-Box Attacks on Video Object Detection http://arxiv.org/abs/2510.19574v1 Privacy-Preserving Spiking Neural Networks: A Deep Dive into Encryption Parameter Optimisation http://arxiv.org/abs/2510.19537v1 Cross-Chain Sealed-Bid Auctions Using Confidential Compute Blockchains http://arxiv.org/abs/2510.19491v1 AegisMCP: Online Graph Intrusion Detection for Tool-Augmented LLMs on Edge Devices http://arxiv.org/abs/2510.19462v1 Transmitter Identification via Volterra Series Based Radio Frequency Fingerprint http://arxiv.org/abs/2510.19440v1 Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node Evaluation http://arxiv.org/abs/2510.19420v1 From See to Shield: ML-Assisted Fine-Grained Access Control for Visual Data http://arxiv.org/abs/2510.19418v1 Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects http://arxiv.org/abs/2510.19393v1 A Probabilistic Computing Approach to the Closest Vector Problem for Lattice-Based Factoring http://arxiv.org/abs/2510.19390v1 ConvXformer: Differentially Private Hybrid ConvNeXt-Transformer for Inertial Navigation http://arxiv.org/abs/2510.19352v1 Authorization of Knowledge-base Agents in an Intent-based Management Function http://arxiv.org/abs/2510.19324v1 Collaborative penetration testing suite for emerging generative AI algorithms http://arxiv.org/abs/2510.19303v1 An Adaptive Intelligent Thermal-Aware Routing Protocol for Wireless Body Area Networks http://arxiv.org/abs/2510.19300v1 Reliability and Resilience of AI-Driven Critical Network Infrastructure under Cyber-Physical Threats http://arxiv.org/abs/2510.19295v1 An Empirical Study of Bitwise Operators Intuitiveness through Performance Metrics http://arxiv.org/abs/2510.19281v1 LAPRAD: LLM-Assisted PRotocol Attack Discovery http://arxiv.org/abs/2510.19264v1 Defending Against Prompt Injection with DataFilter http://arxiv.org/abs/2510.19207v1 OpenGuardrails: An Open-Source Context-Aware AI Guardrails Platform http://arxiv.org/abs/2510.19169v1 HAMLOCK: HArdware-Model LOgically Combined attacK http://arxiv.org/abs/2510.19145v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.