本日紹介した論文の一覧
LOKI: Proactively Discovering Online Scam Websites by Mining Toxic
Search Queries
http://arxiv.org/abs/2509.12181v1
Poison to Detect: Detection of Targeted Overfitting in Federated
Learning
http://arxiv.org/abs/2509.11974v1
Time-Constrained Intelligent Adversaries for Automation Vulnerability
Testing: A Multi-Robot Patrol Case Study
http://arxiv.org/abs/2509.11971v1
zkToken: Empowering Holders to Limit Revocation Checks for Verifiable
Credentials
http://arxiv.org/abs/2509.11934v1
Efficient Byzantine-Robust Privacy-Preserving Federated Learning via
Dimension Compression
http://arxiv.org/abs/2509.11870v1
NeuroStrike: Neuron-Level Attacks on Aligned LLMs
http://arxiv.org/abs/2509.11864v1
A Practical Adversarial Attack against Sequence-based Deep Learning
Malware Classifiers
http://arxiv.org/abs/2509.11836v1
Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP
Address Sharing Scenarios
http://arxiv.org/abs/2509.11833v1
Anomaly Detection in Industrial Control Systems Based on Cross-Domain
Representation Learning
http://arxiv.org/abs/2509.11786v1
On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy
Constraints
http://arxiv.org/abs/2509.11761v1
Removal Attack and Defense on AI-generated Content Latent-based
Watermarking
http://arxiv.org/abs/2509.11745v1
A Holistic Approach to E-Commerce Innovation: Redefining Security and
User Experience
http://arxiv.org/abs/2509.11712v1
Time-Based State-Management of Hash-Based Signature CAs for
VPN-Authentication
http://arxiv.org/abs/2509.11695v1
An Unsupervised Learning Approach For A Reliable Profiling Of Cyber
Threat Actors Reported Globally Based On Complete Contextual Information Of
Cyber Attacks
http://arxiv.org/abs/2509.11683v1
Cyber Attack Mitigation Framework for Denial of Service (DoS) Attacks in
Fog Computing
http://arxiv.org/abs/2509.11668v1
Inducing Uncertainty for Test-Time Privacy
http://arxiv.org/abs/2509.11625v1
Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from
Cyber Threat Intelligence for Precise Threats Attribution
http://arxiv.org/abs/2509.11615v1
AMLNet: A Knowledge-Based Multi-Agent Framework to Generate and Detect
Realistic Money Laundering Transactions
http://arxiv.org/abs/2509.11595v1
ILA: Correctness via Type Checking for Fully Homomorphic Encryption
http://arxiv.org/abs/2509.11559v1
Dstack: A Zero Trust Framework for Confidential Containers
http://arxiv.org/abs/2509.11555v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>