本日紹介した論文の一覧
Strategic Deployment of Honeypots in Blockchain-based IoT Systems
http://arxiv.org/abs/2405.12951v1
Application Layer Cyber Deception without Developer Interaction
http://arxiv.org/abs/2405.12852v1
Rethinking the Vulnerabilities of Face Recognition Systems:From a
Practical Perspective
http://arxiv.org/abs/2405.12786v1
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning
http://arxiv.org/abs/2405.12751v1
Generative AI and Large Language Models for Cyber Security: All Insights
You Need
http://arxiv.org/abs/2405.12750v1
Nearest is Not Dearest: Towards Practical Defense against
Quantization-conditioned Backdoor Attacks
http://arxiv.org/abs/2405.12725v1
How to Train a Backdoor-Robust Model on a Poisoned Dataset without
Auxiliary Data?
http://arxiv.org/abs/2405.12719v1
Gamification of IT for training in information systems management
http://arxiv.org/abs/2405.12561v1
Uncertainty quantification by block bootstrap for differentially private
stochastic gradient descent
http://arxiv.org/abs/2405.12553v1
Blockchain-based AI Methods for Managing Industrial IoT: Recent
Developments, Integration Challenges and Opportunities
http://arxiv.org/abs/2405.12550v1
Fully Randomized Pointers
http://arxiv.org/abs/2405.12513v1
Phishing Email Detection Using Inputs From Artificial Intelligence
http://arxiv.org/abs/2405.12494v1
Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public
Cloud (Extended Version)
http://arxiv.org/abs/2405.12469v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>