本日紹介した論文の一覧
Navigating Cookie Consent Violations Across the Globe
http://arxiv.org/abs/2506.08996v1
Do Concept Replacement Techniques Really Erase Unacceptable Concepts?
http://arxiv.org/abs/2506.08991v1
Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt
Strike Masquerading Command and Control Channels
http://arxiv.org/abs/2506.08922v1
Quantifying Mix Network Privacy Erosion with Generative Models
http://arxiv.org/abs/2506.08918v1
SmartAttack: Air-Gap Attack via Smartwatches
http://arxiv.org/abs/2506.08866v1
ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint
Inference
http://arxiv.org/abs/2506.08838v1
Lightweight Electronic Signatures and Reliable Access Control Included
in Sensor Networks to Prevent Cyber Attacks from Modifying Patient Data
http://arxiv.org/abs/2506.08828v1
Lightweight and High-Throughput Secure Logging for Internet of Things
and Cold Cloud Continuum
http://arxiv.org/abs/2506.08781v1
On the Ethics of Using LLMs for Offensive Security
http://arxiv.org/abs/2506.08693v1
WGLE:Backdoor-free and Multi-bit Black-box Watermarking for Graph Neural
Networks
http://arxiv.org/abs/2506.08602v1
One Patch to Rule Them All: Transforming Static Patches into Dynamic
Attacks in the Physical World
http://arxiv.org/abs/2506.08482v1
ABC-FHE : A Resource-Efficient Accelerator Enabling Bootstrappable
Parameters for Client-Side Fully Homomorphic Encryption
http://arxiv.org/abs/2506.08461v1
GPS Spoofing Attacks on AI-based Navigation Systems with Obstacle
Avoidance in UAV
http://arxiv.org/abs/2506.08445v1
Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL
Settings
http://arxiv.org/abs/2506.08435v1
Network Threat Detection: Addressing Class Imbalanced Data with Deep
Forest
http://arxiv.org/abs/2506.08383v1
Differentially Private Relational Learning with Entity-level Privacy
Guarantees
http://arxiv.org/abs/2506.08347v1
Your Agent Can Defend Itself against Backdoor Attacks
http://arxiv.org/abs/2506.08336v1
Distortion Search, A Web Search Privacy Heuristic
http://arxiv.org/abs/2506.08330v1
How Good LLM-Generated Password Policies Are?
http://arxiv.org/abs/2506.08320v1
Private Evolution Converges
http://arxiv.org/abs/2506.08312v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>