本日紹介した論文の一覧
Hash chaining degrades security at Facebook
http://arxiv.org/abs/2510.12665v1
PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused
Graph Neural Networks
http://arxiv.org/abs/2510.12652v1
Noisy Neighbor: Exploiting RDMA for Resource Exhaustion Attacks in
Containerized Clouds
http://arxiv.org/abs/2510.12629v1
Multi-Copy Security in Unclonable Cryptography
http://arxiv.org/abs/2510.12626v1
Proof of Cloud: Data Center Execution Assurance for Confidential VMs
http://arxiv.org/abs/2510.12469v1
Evaluating and Mitigating LLM-as-a-judge Bias in Communication Systems
http://arxiv.org/abs/2510.12462v1
Attack-Specialized Deep Learning with Ensemble Fusion for Network
Anomaly Detection
http://arxiv.org/abs/2510.12455v1
Formal Models and Convergence Analysis for Context-Aware Security
Verification
http://arxiv.org/abs/2510.12440v1
Targeted Pooled Latent-Space Steganalysis Applied to Generative
Steganography, with a Fix
http://arxiv.org/abs/2510.12414v1
IP-Augmented Multi-Modal Malicious URL Detection Via Token-Contrastive
Representation Enhancement and Multi-Granularity Fusion
http://arxiv.org/abs/2510.12395v1
Traveling Salesman-Based Token Ordering Improves Stability in
Homomorphically Encrypted Language Models
http://arxiv.org/abs/2510.12343v1
DeepTrust: Multi-Step Classification through Dissimilar Adversarial
Representations for Robust Android Malware Detection
http://arxiv.org/abs/2510.12310v1
PromptLocate: Localizing Prompt Injection Attacks
http://arxiv.org/abs/2510.12252v1
HackWorld: Evaluating Computer-Use Agents on Exploiting Web Application
Vulnerabilities
http://arxiv.org/abs/2510.12200v1
Leaking Queries On Secure Stream Processing Systems
http://arxiv.org/abs/2510.12172v1
VeilAudit: Breaking the Deadlock Between Privacy and Accountability
Across Blockchains
http://arxiv.org/abs/2510.12153v1
Fairness-Constrained Optimization Attack in Federated Learning
http://arxiv.org/abs/2510.12143v1
Locket: Robust Feature-Locking Technique for Language Models
http://arxiv.org/abs/2510.12117v1
Elevating Medical Image Security: A Cryptographic Framework Integrating
Hyperchaotic Map and GRU
http://arxiv.org/abs/2510.12084v1
Adding All Flavors: A Hybrid Random Number Generator for dApps and Web3
http://arxiv.org/abs/2510.12062v1
Over-Threshold Multiparty Private Set Intersection for Collaborative
Network Intrusion Detection
http://arxiv.org/abs/2510.12045v1
Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce
Applications
http://arxiv.org/abs/2510.12031v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>