Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#305 サイバーarxiv (2025-12-11)

12 Dec 2025

Description

本日紹介した論文の一覧 TriHaRd: Higher Resilience for TEE Trusted Time https://arxiv.org/abs/2512.10732v1 A Proof of Success and Reward Distribution Protocol for Multi-bridge Architecture in Cross-chain Communication https://arxiv.org/abs/2512.10667v1 Virtual camera detection: Catching video injection attacks in remote biometric systems https://arxiv.org/abs/2512.10653v1 TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection https://arxiv.org/abs/2512.10652v1 Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks https://arxiv.org/abs/2512.10637v1 Objectives and Design Principles in Offline Payments with Central Bank Digital Currency (CBDC) https://arxiv.org/abs/2512.10636v1 Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs https://arxiv.org/abs/2512.10600v1 LLM-Assisted AHP for Explainable Cyber Range Evaluation https://arxiv.org/abs/2512.10487v1 From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection https://arxiv.org/abs/2512.10485v1 Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques https://arxiv.org/abs/2512.10470v1 When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection https://arxiv.org/abs/2512.10449v1 Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems https://arxiv.org/abs/2512.10426v1 D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning https://arxiv.org/abs/2512.10372v1 Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks https://arxiv.org/abs/2512.10361v1 FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning https://arxiv.org/abs/2512.10296v1 Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs https://arxiv.org/abs/2512.10280v1 On Sybil Proofness in Competitive Combinatorial Exchanges https://arxiv.org/abs/2512.10203v1 Watermarks for Language Models via Probabilistic Automata https://arxiv.org/abs/2512.10185v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.