本日紹介した論文の一覧 The Tail Tells All: Estimating Model-Level Membership Inference Vulnerability Without Reference Models http://arxiv.org/abs/2510.19773v1 Under Pressure: Security Analysis and Process Impacts of a Commercial Smart Air Compressor http://arxiv.org/abs/2510.19772v1 Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems http://arxiv.org/abs/2510.19761v1 Unfair Mistakes on Social Media: How Demographic Characteristics influence Authorship Attribution http://arxiv.org/abs/2510.19708v1 CircuitGuard: Mitigating LLM Memorization in RTL Code Generation Against IP Leakage http://arxiv.org/abs/2510.19676v1 FidelityGPT: Correcting Decompilation Distortions with Retrieval Augmented Generation http://arxiv.org/abs/2510.19615v1 Can You Trust What You See? Alpha Channel No-Box Attacks on Video Object Detection http://arxiv.org/abs/2510.19574v1 Privacy-Preserving Spiking Neural Networks: A Deep Dive into Encryption Parameter Optimisation http://arxiv.org/abs/2510.19537v1 Cross-Chain Sealed-Bid Auctions Using Confidential Compute Blockchains http://arxiv.org/abs/2510.19491v1 AegisMCP: Online Graph Intrusion Detection for Tool-Augmented LLMs on Edge Devices http://arxiv.org/abs/2510.19462v1 Transmitter Identification via Volterra Series Based Radio Frequency Fingerprint http://arxiv.org/abs/2510.19440v1 Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node Evaluation http://arxiv.org/abs/2510.19420v1 From See to Shield: ML-Assisted Fine-Grained Access Control for Visual Data http://arxiv.org/abs/2510.19418v1 Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects http://arxiv.org/abs/2510.19393v1 A Probabilistic Computing Approach to the Closest Vector Problem for Lattice-Based Factoring http://arxiv.org/abs/2510.19390v1 ConvXformer: Differentially Private Hybrid ConvNeXt-Transformer for Inertial Navigation http://arxiv.org/abs/2510.19352v1 Authorization of Knowledge-base Agents in an Intent-based Management Function http://arxiv.org/abs/2510.19324v1 Collaborative penetration testing suite for emerging generative AI algorithms http://arxiv.org/abs/2510.19303v1 An Adaptive Intelligent Thermal-Aware Routing Protocol for Wireless Body Area Networks http://arxiv.org/abs/2510.19300v1 Reliability and Resilience of AI-Driven Critical Network Infrastructure under Cyber-Physical Threats http://arxiv.org/abs/2510.19295v1 An Empirical Study of Bitwise Operators Intuitiveness through Performance Metrics http://arxiv.org/abs/2510.19281v1 LAPRAD: LLM-Assisted PRotocol Attack Discovery http://arxiv.org/abs/2510.19264v1 Defending Against Prompt Injection with DataFilter http://arxiv.org/abs/2510.19207v1 OpenGuardrails: An Open-Source Context-Aware AI Guardrails Platform http://arxiv.org/abs/2510.19169v1 HAMLOCK: HArdware-Model LOgically Combined attacK http://arxiv.org/abs/2510.19145v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast