本日紹介した論文の一覧
Anomaly Detection in Certificate Transparency Logs
http://arxiv.org/abs/2405.05206v1
SINBAD: Saliency-informed detection of breakage caused by ad blocking
http://arxiv.org/abs/2405.05196v1
Systematic Use of Random Self-Reducibility against Physical Attacks
http://arxiv.org/abs/2405.05193v1
Air Gap: Protecting Privacy-Conscious Conversational Agents
http://arxiv.org/abs/2405.05175v1
Gröbner Basis Cryptanalysis of Ciminion and Hydra
http://arxiv.org/abs/2405.05040v1
HackCar: a test platform for attacks and defenses on a cost-contained
automotive architecture
http://arxiv.org/abs/2405.05023v1
Adversarial Threats to Automatic Modulation Open Set Recognition in
Wireless Networks
http://arxiv.org/abs/2405.05022v1
A fuzzy reward and punishment scheme for vehicular ad hoc networks
http://arxiv.org/abs/2405.04892v1
A trust management framework for vehicular ad hoc networks
http://arxiv.org/abs/2405.04885v1
The Need Of Trustworthy Announcements To Achieve Driving Comfort
http://arxiv.org/abs/2405.04878v1
Critical Infrastructure Protection: Generative AI, Challenges, and
Opportunities
http://arxiv.org/abs/2405.04874v1
Systematic review, analysis, and characterisation of malicious
industrial network traffic datasets for aiding Machine Learning algorithm
performance testing
http://arxiv.org/abs/2405.04866v1
Enhancing Data Integrity and Traceability in Industry Cyber Physical
Systems (ICPS) through Blockchain Technology: A Comprehensive Approach
http://arxiv.org/abs/2405.04837v1
Explanation as a Watermark: Towards Harmless and Multi-bit Model
Ownership Verification via Watermarking Feature Attribution
http://arxiv.org/abs/2405.04825v1
Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications
http://arxiv.org/abs/2405.04824v1
Blockchains for Internet of Things: Fundamentals, Applications, and
Challenges
http://arxiv.org/abs/2405.04803v1
Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of
Randomness is Needed?
http://arxiv.org/abs/2405.04762v1
Large Language Models for Cyber Security: A Systematic Literature Review
http://arxiv.org/abs/2405.04760v1
Honeyfile Camouflage: Hiding Fake Files in Plain Sight
http://arxiv.org/abs/2405.04758v1
AttacKG+:Boosting Attack Knowledge Graph Construction with Large
Language Models
http://arxiv.org/abs/2405.04753v1
Cryptanalysis of the SIMON Cypher Using Neo4j
http://arxiv.org/abs/2405.04735v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>