Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

サイバーarXiv

#89 サイバーarxiv (2024-06-18)

19 Jun 2024

Description

本日紹介した論文の一覧 A Characterization of Semi-Involutory MDS Matrices http://arxiv.org/abs/2406.12842v1 Adversarial Attacks on Multimodal Agents http://arxiv.org/abs/2406.12814v1 Supporting Human Raters with the Detection of Harmful Content using Large Language Models http://arxiv.org/abs/2406.12800v1 Extracting Training Data from Unconditional Diffusion Models http://arxiv.org/abs/2406.12752v1 What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions http://arxiv.org/abs/2406.12710v1 Attack and Defense of Deep Learning Models in the Field of Web Attack Detection http://arxiv.org/abs/2406.12605v1 UIFV: Data Reconstruction Attack in Vertical Federated Learning http://arxiv.org/abs/2406.12588v1 Analysing India's Cyber Warfare Readiness and Developing a Defence Strategy http://arxiv.org/abs/2406.12568v1 Next Generation of Phishing Attacks using AI powered Browsers http://arxiv.org/abs/2406.12547v1 Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation http://arxiv.org/abs/2406.12516v1 Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs http://arxiv.org/abs/2406.12513v1 MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representation http://arxiv.org/abs/2406.12415v1 A Cutting-Edge Deep Learning Method For Enhancing IoT Security http://arxiv.org/abs/2406.12400v1 DCS Chain: A Flexible Private Blockchain System http://arxiv.org/abs/2406.12376v1 Never Gonna Give You Up: Exploring Deprecated NULL Ciphers in Commercial VoWiFi Deployments http://arxiv.org/abs/2406.12348v1 Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing http://arxiv.org/abs/2406.12330v1 Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp http://arxiv.org/abs/2406.12299v1 CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models http://arxiv.org/abs/2406.12257v1 BadSampler: Harnessing the Power of Catastrophic Forgetting to Poison Byzantine-robust Federated Learning http://arxiv.org/abs/2406.12222v1 Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse http://arxiv.org/abs/2406.12161v1 Block Circulant Codes with Application to Decentralized Systems http://arxiv.org/abs/2406.12160v1 なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。]]

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.