本日紹介した論文の一覧 Towards a Functionally Complete and Parameterizable TFHE Processor http://arxiv.org/abs/2510.23483v1 SQOUT: A Risk-Based Threat Analysis Framework for Quantum Communication Systems http://arxiv.org/abs/2510.23462v1 Differential Privacy as a Perk: Federated Learning over Multiple-Access Fading Channels with a Multi-Antenna Base Station http://arxiv.org/abs/2510.23463v1 Authentication Against Insecure Bootstrapping for 5G Networks: Feasibility, Resiliency, and Transitional Solutions in Post-Quantum Era http://arxiv.org/abs/2510.23457v1 A Neuro-Symbolic Multi-Agent Approach to Legal-Cybersecurity Knowledge Integration http://arxiv.org/abs/2510.23443v1 Floating-Point Neural Network Verification at the Software Level http://arxiv.org/abs/2510.23389v1 Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks http://arxiv.org/abs/2510.23313v1 Privacy-Preserving Semantic Communication over Wiretap Channels with Learnable Differential Privacy http://arxiv.org/abs/2510.23274v1 Optimizing Optimism: Up to 6.5x Faster zkVM Validty Proofs via Sparse Derivation http://arxiv.org/abs/2510.23172v1 Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing http://arxiv.org/abs/2510.23101v1 Fast-MIA: Efficient and Scalable Membership Inference for LLMs http://arxiv.org/abs/2510.23074v1 zkSTAR: A zero knowledge system for time series attack detection enforcing regulatory compliance in critical infrastructure networks http://arxiv.org/abs/2510.23060v1 KAPG: Adaptive Password Guessing via Knowledge-Augmented Generation http://arxiv.org/abs/2510.23036v1 A high-capacity linguistic steganography based on entropy-driven rank-token mapping http://arxiv.org/abs/2510.23035v1 Efficient and Encrypted Inference using Binarized Neural Networks within In-Memory Computing Architectures http://arxiv.org/abs/2510.23034v1 A Multi-Store Privacy Measurement of Virtual Reality App Ecosystem http://arxiv.org/abs/2510.23024v1 Advancing Honeywords for Real-World Authentication Security http://arxiv.org/abs/2510.22971v1 CompressionAttack: Exploiting Prompt Compression as a New Attack Surface in LLM-Powered Agents http://arxiv.org/abs/2510.22963v1 QuantumShield: Multilayer Fortification for Quantum Federated Learning http://arxiv.org/abs/2510.22945v1 Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies http://arxiv.org/abs/2510.22944v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast