本日紹介した論文の一覧
Recovering the Pre-Fine-Tuning Weights of Generative Models
http://arxiv.org/abs/2402.10208v1
A chaotic maps-based privacy-preserving distributed deep learning for
incomplete and Non-IID datasets
http://arxiv.org/abs/2402.10145v1
Transaction Capacity, Security and Latency in Blockchains
http://arxiv.org/abs/2402.10138v1
FedRDF: A Robust and Dynamic Aggregation Function against Poisoning
Attacks in Federated Learning
http://arxiv.org/abs/2402.10082v1
How Much Does Each Datapoint Leak Your Privacy? Quantifying the
Per-datum Membership Leakage
http://arxiv.org/abs/2402.10065v1
On the Domain Generalizability of RF Fingerprints Through Multifractal
Dimension Representation
http://arxiv.org/abs/2402.10044v1
Systematic Literature Review of EM-SCA Attacks on Encryption
http://arxiv.org/abs/2402.10030v1
Privacy Attacks in Decentralized Learning
http://arxiv.org/abs/2402.10001v1
TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in
the Wild
http://arxiv.org/abs/2402.09973v1
A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions
in Odd Sizes
http://arxiv.org/abs/2402.09937v1
JustSTART: How to Find an RSA Authentication Bypass on Xilinx
UltraScale(+) with Fuzzing
http://arxiv.org/abs/2402.09845v1
Enhancing Cybersecurity Resilience in Finance with Deep Learning for
Advanced Threat Detection
http://arxiv.org/abs/2402.09820v1
An advanced data fabric architecture leveraging homomorphic encryption
and federated learning
http://arxiv.org/abs/2402.09795v1
Federated Analytics-Empowered Frequent Pattern Mining for Decentralized
Web 3.0 Applications
http://arxiv.org/abs/2402.09736v1
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns
http://arxiv.org/abs/2402.09728v1
DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated
Learning as a Service
http://arxiv.org/abs/2402.09715v1
Preserving Data Privacy for ML-driven Applications in Open Radio Access
Networks
http://arxiv.org/abs/2402.09710v1
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart
Trojan Attacks in COTS Processor
http://arxiv.org/abs/2402.09701v1
PAL: Proxy-Guided Black-Box Attack on Large Language Models
http://arxiv.org/abs/2402.09674v1
Characterizing the Modification Space of Signature IDS Rules
http://arxiv.org/abs/2402.09644v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>