We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 119

[ total of 144 entries: 1-10 | ... | 90-99 | 100-109 | 110-119 | 120-129 | 130-139 | 140-144 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 4 Jun 2024 (continued, showing 10 of 36 entries)

[120]  arXiv:2406.00966 [pdf, other]
Title: Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2406.00938 [pdf, other]
Title: A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Symbolic Computation (cs.SC)
[122]  arXiv:2406.00918 [pdf, other]
Title: Assessing the Adversarial Security of Perceptual Hashing Algorithms
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[123]  arXiv:2406.00810 [pdf, other]
Title: Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol
Comments: 18 pages, 7 figures, 5 tables; This is the accepted version of ESCAR USA 2024
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2406.00802 [pdf, other]
Title: Weight Equalization Algorithm for Tree Parity Machines
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2406.00799 [pdf, other]
Title: Are you still on track!? Catching LLM Task Drift with Activations
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computers and Society (cs.CY)
[126]  arXiv:2406.00620 [pdf, other]
Title: Model-Driven Security Analysis of Self-Sovereign Identity Systems
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2406.00595 [pdf, other]
Title: Model-based Analysis of Mining Fairness in a Blockchain
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2406.00586 [pdf, other]
Title: VeriSplit: Secure and Practical Offloading of Machine Learning Inferences across IoT Devices
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[129]  arXiv:2406.00523 [pdf, other]
Title: Stealing Trust: Unveiling Vulnerabilities in Web3 Authentication
Subjects: Cryptography and Security (cs.CR)
[ total of 144 entries: 1-10 | ... | 90-99 | 100-109 | 110-119 | 120-129 | 130-139 | 140-144 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)