本日紹介した論文の一覧 Anomaly Detection in Certificate Transparency Logs http://arxiv.org/abs/2405.05206v1 SINBAD: Saliency-informed detection of breakage caused by ad blocking http://arxiv.org/abs/2405.05196v1 Systematic Use of Random Self-Reducibility against Physical Attacks http://arxiv.org/abs/2405.05193v1 Air Gap: Protecting Privacy-Conscious Conversational Agents http://arxiv.org/abs/2405.05175v1 Gröbner Basis Cryptanalysis of Ciminion and Hydra http://arxiv.org/abs/2405.05040v1 HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture http://arxiv.org/abs/2405.05023v1 Adversarial Threats to Automatic Modulation Open Set Recognition in Wireless Networks http://arxiv.org/abs/2405.05022v1 A fuzzy reward and punishment scheme for vehicular ad hoc networks http://arxiv.org/abs/2405.04892v1 A trust management framework for vehicular ad hoc networks http://arxiv.org/abs/2405.04885v1 The Need Of Trustworthy Announcements To Achieve Driving Comfort http://arxiv.org/abs/2405.04878v1 Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities http://arxiv.org/abs/2405.04874v1 Systematic review, analysis, and characterisation of malicious industrial network traffic datasets for aiding Machine Learning algorithm performance testing http://arxiv.org/abs/2405.04866v1 Enhancing Data Integrity and Traceability in Industry Cyber Physical Systems (ICPS) through Blockchain Technology: A Comprehensive Approach http://arxiv.org/abs/2405.04837v1 Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution http://arxiv.org/abs/2405.04825v1 Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications http://arxiv.org/abs/2405.04824v1 Blockchains for Internet of Things: Fundamentals, Applications, and Challenges http://arxiv.org/abs/2405.04803v1 Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of Randomness is Needed? http://arxiv.org/abs/2405.04762v1 Large Language Models for Cyber Security: A Systematic Literature Review http://arxiv.org/abs/2405.04760v1 Honeyfile Camouflage: Hiding Fake Files in Plain Sight http://arxiv.org/abs/2405.04758v1 AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models http://arxiv.org/abs/2405.04753v1 Cryptanalysis of the SIMON Cypher Using Neo4j http://arxiv.org/abs/2405.04735v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
SpaceX Said to Pursue 2026 IPO
10 Dec 2025
Bloomberg Tech
Don’t Call It a Comeback
10 Dec 2025
Motley Fool Money
Japan Claims AGI, Pentagon Adopts Gemini, and MIT Designs New Medicines
10 Dec 2025
The Daily AI Show
Eric Larsen on the emergence and potential of AI in healthcare
10 Dec 2025
McKinsey on Healthcare
What it will take for AI to scale (energy, compute, talent)
10 Dec 2025
Azeem Azhar's Exponential View
Reducing Burnout and Boosting Revenue in ASCs
10 Dec 2025
Becker’s Healthcare -- Spine and Orthopedic Podcast