Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#293 サイバーarxiv (2025-11-06)

07 Nov 2025

Description

本日紹介した論文の一覧 Unclonable Cryptography in Linear Quantum Memory http://arxiv.org/abs/2511.04633v1 Confidential Computing for Cloud Security: Exploring Hardware based Encryption Using Trusted Execution Environments http://arxiv.org/abs/2511.04550v1 Large Language Models for Cyber Security http://arxiv.org/abs/2511.04508v1 Exploiting Data Structures for Bypassing and Crashing Anti-Malware Solutions via Telemetry Complexity Attacks http://arxiv.org/abs/2511.04472v1 Adversarially Robust and Interpretable Magecart Malware Detection http://arxiv.org/abs/2511.04440v1 Data Certification Strategies for Blockchain-based Traceability Systems http://arxiv.org/abs/2511.04409v1 Tight Analysis of a Grover-based Quantum Secret Sharing Scheme http://arxiv.org/abs/2511.04399v1 Differentially Private In-Context Learning with Nearest Neighbor Search http://arxiv.org/abs/2511.04332v1 A Parallel Region-Adaptive Differential Privacy Framework for Image Pixelization http://arxiv.org/abs/2511.04261v1 Space-Bounded Communication Complexity of Unitaries http://arxiv.org/abs/2511.04250v1 Black-Box Guardrail Reverse-engineering Attack http://arxiv.org/abs/2511.04215v1 Quantum Key Distribution via Charge Teleportation http://arxiv.org/abs/2511.04188v1 List Decoding of Folded Reed-Solomon Codes Over Galois Ring http://arxiv.org/abs/2511.04135v1 Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems http://arxiv.org/abs/2511.04114v1 LLM-Driven Adaptive Source-Sink Identification and False Positive Mitigation for Static Analysis http://arxiv.org/abs/2511.04023v1 OTS-PC: OTS-based Payment Channels for the Lightning Network http://arxiv.org/abs/2511.04021v1 Specification-Guided Vulnerability Detection with Large Language Models http://arxiv.org/abs/2511.04014v1 Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback http://arxiv.org/abs/2511.03995v1 Design and Detection of Covert Man-in-the-Middle Cyberattacks on Water Treatment Plants http://arxiv.org/abs/2511.03971v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.