本日紹介した論文の一覧
Unraveling Ethereum's Mempool: The Impact of Fee Fairness, Transaction
Prioritization, and Consensus Efficiency
http://arxiv.org/abs/2506.07988v1
Exposing Hidden Backdoors in NFT Smart Contracts: A Static Security
Analysis of Rug Pull Patterns
http://arxiv.org/abs/2506.07974v1
Understanding the Error Sensitivity of Privacy-Aware Computing
http://arxiv.org/abs/2506.07957v1
TokenBreak: Bypassing Text Classification Models Through Token
Manipulation
http://arxiv.org/abs/2506.07948v1
Secure Distributed Learning for CAVs: Defending Against Gradient Leakage
with Leveled Homomorphic Encryption
http://arxiv.org/abs/2506.07894v1
SoK: Data Reconstruction Attacks Against Machine Learning Models:
Definition, Metrics, and Benchmark
http://arxiv.org/abs/2506.07888v1
Evaluating explainable AI for deep learning-based network intrusion
detection system alert classification
http://arxiv.org/abs/2506.07882v1
Securing Unbounded Differential Privacy Against Timing Attacks
http://arxiv.org/abs/2506.07868v1
Are Trees Really Green? A Detection Approach of IoT Malware Attacks
http://arxiv.org/abs/2506.07836v1
User-space library rootkits revisited: Are user-space detection
mechanisms futile?
http://arxiv.org/abs/2506.07827v1
LLM Unlearning Should Be Form-Independent
http://arxiv.org/abs/2506.07795v1
"I wasn't sure if this is indeed a security risk": Data-driven
Understanding of Security Issue Reporting in GitHub Repositories of Open
Source npm Packages
http://arxiv.org/abs/2506.07728v1
Profiling Electric Vehicles via Early Charging Voltage Patterns
http://arxiv.org/abs/2506.07714v1
Stark-Coleman Invariants and Quantum Lower Bounds: An Integrated
Framework for Real Quadratic Fields
http://arxiv.org/abs/2506.07640v1
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in
Federated Tree-Based Systems
http://arxiv.org/abs/2506.07605v1
MalGEN: A Generative Agent Framework for Modeling Malicious Software in
Cybersecurity
http://arxiv.org/abs/2506.07586v1
Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain
http://arxiv.org/abs/2506.07480v1
Pixel-Sensitive and Robust Steganography Based on Polar Codes
http://arxiv.org/abs/2506.07404v1
Enhancing Watermarking Quality for LLMs via Contextual Generation States
Awareness
http://arxiv.org/abs/2506.07403v1
Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks
Stemming from Alignment Failures
http://arxiv.org/abs/2506.07402v1
From Static to Adaptive Defense: Federated Multi-Agent Deep
Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in
UAV Swarm Networks
http://arxiv.org/abs/2506.07392v1
Enhanced Consistency Bi-directional GAN(CBiGAN) for Malware Anomaly
Detection
http://arxiv.org/abs/2506.07372v1
JavelinGuard: Low-Cost Transformer Architectures for LLM Security
http://arxiv.org/abs/2506.07330v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>