本日紹介した論文の一覧
Towards a Functionally Complete and Parameterizable TFHE Processor
http://arxiv.org/abs/2510.23483v1
SQOUT: A Risk-Based Threat Analysis Framework for Quantum Communication
Systems
http://arxiv.org/abs/2510.23462v1
Differential Privacy as a Perk: Federated Learning over Multiple-Access
Fading Channels with a Multi-Antenna Base Station
http://arxiv.org/abs/2510.23463v1
Authentication Against Insecure Bootstrapping for 5G Networks:
Feasibility, Resiliency, and Transitional Solutions in Post-Quantum Era
http://arxiv.org/abs/2510.23457v1
A Neuro-Symbolic Multi-Agent Approach to Legal-Cybersecurity Knowledge
Integration
http://arxiv.org/abs/2510.23443v1
Floating-Point Neural Network Verification at the Software Level
http://arxiv.org/abs/2510.23389v1
Network Intrusion Detection: Evolution from Conventional Approaches to
LLM Collaboration and Emerging Risks
http://arxiv.org/abs/2510.23313v1
Privacy-Preserving Semantic Communication over Wiretap Channels with
Learnable Differential Privacy
http://arxiv.org/abs/2510.23274v1
Optimizing Optimism: Up to 6.5x Faster zkVM Validty Proofs via Sparse
Derivation
http://arxiv.org/abs/2510.23172v1
Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for
Directed Greybox Fuzzing
http://arxiv.org/abs/2510.23101v1
Fast-MIA: Efficient and Scalable Membership Inference for LLMs
http://arxiv.org/abs/2510.23074v1
zkSTAR: A zero knowledge system for time series attack detection
enforcing regulatory compliance in critical infrastructure networks
http://arxiv.org/abs/2510.23060v1
KAPG: Adaptive Password Guessing via Knowledge-Augmented Generation
http://arxiv.org/abs/2510.23036v1
A high-capacity linguistic steganography based on entropy-driven
rank-token mapping
http://arxiv.org/abs/2510.23035v1
Efficient and Encrypted Inference using Binarized Neural Networks within
In-Memory Computing Architectures
http://arxiv.org/abs/2510.23034v1
A Multi-Store Privacy Measurement of Virtual Reality App Ecosystem
http://arxiv.org/abs/2510.23024v1
Advancing Honeywords for Real-World Authentication Security
http://arxiv.org/abs/2510.22971v1
CompressionAttack: Exploiting Prompt Compression as a New Attack Surface
in LLM-Powered Agents
http://arxiv.org/abs/2510.22963v1
QuantumShield: Multilayer Fortification for Quantum Federated Learning
http://arxiv.org/abs/2510.22945v1
Is Your Prompt Poisoning Code? Defect Induction Rates and Security
Mitigation Strategies
http://arxiv.org/abs/2510.22944v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>