本日紹介した論文の一覧
Graph of Effort: Quantifying Risk of AI Usage for Vulnerability
Assessment
http://arxiv.org/abs/2503.16392v1
Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for the
Food and Agriculture Sector
http://arxiv.org/abs/2503.16292v1
Securing Satellite Communications: Real-Time Video Encryption Scheme on
Satellite Payloads
http://arxiv.org/abs/2503.16287v1
Investigating The Implications of Cyberattacks Against Precision
Agricultural Equipment
http://arxiv.org/abs/2503.16283v1
From Head to Tail: Efficient Black-box Model Inversion Attack via
Long-tailed Learning
http://arxiv.org/abs/2503.16266v1
AI Agents in Cryptoland: Practical Attacks and No Silver Bullet
http://arxiv.org/abs/2503.16248v1
Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated
Learning: A Step Towards Responsible AI
http://arxiv.org/abs/2503.16233v1
Doing More With Less: Mismatch-Based Risk-Limiting Audits
http://arxiv.org/abs/2503.16104v1
Fast Homomorphic Linear Algebra with BLAS
http://arxiv.org/abs/2503.16080v1
Temporal-Spatial Attention Network (TSAN) for DoS Attack Detection in
Network Traffic
http://arxiv.org/abs/2503.16047v1
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language
Models
http://arxiv.org/abs/2503.16023v1
Digital Asset Data Lakehouse. The concept based on a blockchain research
center
http://arxiv.org/abs/2503.15968v1
Are We There Yet? A Study of Decentralized Identity Applications
http://arxiv.org/abs/2503.15964v1
ALLMod: Exploring $\underline{\mathbf{A}}$rea-Efficiency of
$\underline{\mathbf{L}}$UT-based $\underline{\mathbf{L}}$arge Number
$\underline{\mathbf{Mod}}$ular Reduction via Hybrid Workloads
http://arxiv.org/abs/2503.15916v1
Using Data Redundancy Techniques to Detect and Correct Errors in Logical
Data
http://arxiv.org/abs/2503.15881v1
DroidTTP: Mapping Android Applications with TTP for Cyber Threat
Intelligence
http://arxiv.org/abs/2503.15866v1
Detecting LLM-Written Peer Reviews
http://arxiv.org/abs/2503.15772v1
AutoRedTeamer: Autonomous Red Teaming with Lifelong Attack Integration
http://arxiv.org/abs/2503.15754v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>