本日紹介した論文の一覧
Development and analysis of a secured VoIP system for surveillance
activities
http://arxiv.org/abs/2507.21038v1
Repairing vulnerabilities without invisible hands. A differentiated
replication study on LLMs
http://arxiv.org/abs/2507.20977v1
Characterizing the Sensitivity to Individual Bit Flips in Client-Side
Operations of the CKKS Scheme
http://arxiv.org/abs/2507.20891v1
Testbed and Software Architecture for Enhancing Security in Industrial
Private 5G Networks
http://arxiv.org/abs/2507.20873v1
An Open-source Implementation and Security Analysis of Triad's TEE
Trusted Time Protocol
http://arxiv.org/abs/2507.20851v1
Collusion Resistant DNS With Private Information Retrieval
http://arxiv.org/abs/2507.20806v1
Text2VLM: Adapting Text-Only Datasets to Evaluate Alignment Training in
Visual Language Models
http://arxiv.org/abs/2507.20704v1
Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on
Vertical Dataset
http://arxiv.org/abs/2507.20688v1
A Novel Post-Quantum Secure Digital Signature Scheme Based on Neural
Network
http://arxiv.org/abs/2507.20676v1
Program Analysis for High-Value Smart Contract Vulnerabilities:
Techniques and Insights
http://arxiv.org/abs/2507.20672v1
Hot-Swap MarkBoard: An Efficient Black-box Watermarking Approach for
Large-scale Model Distribution
http://arxiv.org/abs/2507.20650v1
MPC-EVM: Enabling MPC Execution by Smart Contracts In An Asynchronous
Manner
http://arxiv.org/abs/2507.20554v1
VDGraph: A Graph-Theoretic Approach to Unlock Insights from SBOM and SCA
Data
http://arxiv.org/abs/2507.20502v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>