本日紹介した論文の一覧 The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain https://arxiv.org/abs/2512.01974v1 Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration https://arxiv.org/abs/2512.01893v1 Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications https://arxiv.org/abs/2512.01891v1 JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images https://arxiv.org/abs/2512.01845v1 A Privacy-Preserving Information-Sharing Protocol for Federated Authentication https://arxiv.org/abs/2512.01832v1 AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data https://arxiv.org/abs/2512.01727v1 Demystifying Feature Engineering in Malware Analysis of API Call Sequences https://arxiv.org/abs/2512.01666v1 Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework https://arxiv.org/abs/2512.01651v1 On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing https://arxiv.org/abs/2512.01604v1 Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN https://arxiv.org/abs/2512.01596v1 WhiteLie: A Robust System for Spoofing User Data in Android Platforms https://arxiv.org/abs/2512.01595v1 Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA https://arxiv.org/abs/2512.01594v1 Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams https://arxiv.org/abs/2512.01577v1 IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements https://arxiv.org/abs/2512.01574v1 Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits https://arxiv.org/abs/2512.01437v1 BackportBench: A Multilingual Benchmark for Automated Backporting of Patches https://arxiv.org/abs/2512.01396v1 INFERMAL: Inferential analysis of maliciously registered domains https://arxiv.org/abs/2512.01391v1 A Wolf in Sheep's Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search https://arxiv.org/abs/2512.01353v1 EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations https://arxiv.org/abs/2512.01335v1 Securing Large Language Models (LLMs) from Prompt Injection Attacks https://arxiv.org/abs/2512.01326v1 Systems Security Foundations for Agentic Computing https://arxiv.org/abs/2512.01295v1 Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation https://arxiv.org/abs/2512.01255v1 Benchmarking and Understanding Safety Risks in AI Character Platforms https://arxiv.org/abs/2512.01247v1 CTF Archive: Capture, Curate, Learn Forever https://arxiv.org/abs/2512.01233v1 DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks https://arxiv.org/abs/2512.01185v1 Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework https://arxiv.org/abs/2512.01164v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast