本日紹介した論文の一覧
Automated Static Vulnerability Detection via a Holistic Neuro-symbolic
Approach
http://arxiv.org/abs/2504.16057v1
How Private is Your Attention? Bridging Privacy with In-Context Learning
http://arxiv.org/abs/2504.16000v1
Structural Properties of Non-Linear Cellular Automata: Permutivity,
Surjectivity and Reversibility
http://arxiv.org/abs/2504.15949v1
Adversarial Observations in Weather Forecasting
http://arxiv.org/abs/2504.15942v1
Cryptoanalysis of a public key exchange based on circulant matrix over
digital semiring
http://arxiv.org/abs/2504.15880v1
Quantifying Source Speaker Leakage in One-to-One Voice Conversion
http://arxiv.org/abs/2504.15822v1
EFFACT: A Highly Efficient Full-Stack FHE Acceleration Platform
http://arxiv.org/abs/2504.15817v1
RRC Signaling Storm Detection in O-RAN
http://arxiv.org/abs/2504.15738v1
Trusted Compute Units: A Framework for Chained Verifiable Computations
http://arxiv.org/abs/2504.15717v1
A Time Series Analysis of Malware Uploads to Programming Language
Ecosystems
http://arxiv.org/abs/2504.15695v1
Trustworthy Decentralized Autonomous Machines: A New Paradigm in
Automation Economy
http://arxiv.org/abs/2504.15676v1
TrojanDam: Detection-Free Backdoor Defense in Federated Learning through
Proactive Model Robustification utilizing OOD Data
http://arxiv.org/abs/2504.15674v1
A Study On Mixup-inspired Augmentation Methods For Software
Vulnerability Detection
http://arxiv.org/abs/2504.15632v1
Exploring the Role of Large Language Models in Cybersecurity: A
Systematic Survey
http://arxiv.org/abs/2504.15622v1
Yet Another Diminishing Spark: Low-level Cyberattacks in the Israel-Gaza
Conflict
http://arxiv.org/abs/2504.15592v1
A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training
and Deployment
http://arxiv.org/abs/2504.15585v1
On the Price of Differential Privacy for Hierarchical Clustering
http://arxiv.org/abs/2504.15580v1
DecETT: Accurate App Fingerprinting Under Encrypted Tunnels via Dual
Decouple-based Semantic Enhancement
http://arxiv.org/abs/2504.15565v1
T2VShield: Model-Agnostic Jailbreak Defense for Text-to-Video Models
http://arxiv.org/abs/2504.15512v1
Guillotine: Hypervisors for Isolating Malicious AIs
http://arxiv.org/abs/2504.15499v1
Scalable APT Malware Classification via Parallel Feature Extraction and
GPU-Accelerated Learning
http://arxiv.org/abs/2504.15497v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>