We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 121 entries: 1-111 | 112-121 ]
[ showing 111 entries per page: fewer | more | all ]

Thu, 25 Apr 2024

[1]  arXiv:2404.15886 [pdf, other]
Title: Privacy-Preserving Billing for Local Energy Markets (Long Version)
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2404.15859 [pdf, other]
Title: Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement
Comments: 17 pages, 6 figures, presented and published at IFIP Summer School on Privacy and Identity Management 2023
Journal-ref: Privacy and Identity Management. Sharing in a Digital World. Privacy and Identity 2023. IFIP Advances in Information and Communication Technology, vol 695. Springer, Cham
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2404.15858 [pdf, other]
Title: CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN
Journal-ref: Emerging Information Security and Applications, 2024
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
[4]  arXiv:2404.15854 [pdf, other]
Title: CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning
Comments: Submitted to IEEE TDSC
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[5]  arXiv:2404.15735 [pdf, other]
Title: Replacing Cryptopuzzles with Useful Computation in Blockchain Proof-of-Work Protocols
Comments: Submitted to ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[6]  arXiv:2404.15686 [pdf, ps, other]
Title: Noise Variance Optimization in Differential Privacy: A Game-Theoretic Approach Through Per-Instance Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2404.15681 [pdf, other]
Title: Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[8]  arXiv:2404.15611 [pdf, other]
Title: PoisonedFL: Model Poisoning Attacks to Federated Learning via Multi-Round Consistency
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2404.15587 [pdf, other]
Title: Security Analysis of WiFi-based Sensing Systems: Threats from Perturbation Attacks
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2404.15582 [pdf, other]
Title: Armored Core of PKI: Remove Signing Keys for CA via Physically Unclonable Function
Comments: Initial version of the paper
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2404.15446 [pdf, other]
Title: OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[12]  arXiv:2404.15895 (cross-list from cs.CY) [pdf, other]
Title: Global Trends in Cryptocurrency Regulation: An Overview
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[13]  arXiv:2404.15834 (cross-list from cs.DC) [pdf, ps, other]
Title: FEDSTR: Money-In AI-Out | A Decentralized Marketplace for Federated Learning and LLM Training on the NOSTR Protocol
Comments: 19 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[14]  arXiv:2404.15746 (cross-list from stat.ML) [pdf, other]
Title: Collaborative Heterogeneous Causal Inference Beyond Meta-analysis
Comments: submitted to ICML
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[15]  arXiv:2404.15744 (cross-list from cs.LG) [pdf, other]
Title: A General Black-box Adversarial Attack on Graph-based Fake News Detectors
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[16]  arXiv:2404.15687 (cross-list from cs.SE) [pdf, other]
Title: Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Comments: This paper was accepted in the proceedings of the 33nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[17]  arXiv:2404.15656 (cross-list from cs.LG) [pdf, other]
Title: MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[18]  arXiv:2404.15598 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning with Only Positive Labels by Exploring Label Correlations
Comments: To be published in IEEE Transactions on Neural Networks and Learning Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[19]  arXiv:2404.15596 (cross-list from cs.SE) [pdf, other]
Title: VulEval: Towards Repository-Level Evaluation of Software Vulnerability Detection
Comments: 12 pages
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[20]  arXiv:2404.15409 (cross-list from cs.LG) [pdf, ps, other]
Title: Insufficient Statistics Perturbation: Stable Estimators for Private Least Squares
Comments: 42 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[21]  arXiv:2404.15344 (cross-list from eess.SP) [pdf, other]
Title: Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers
Comments: Accepted at the IEEE Wireless Communications and Networking Conference (WCNC) 2024
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Machine Learning (stat.ML)
[22]  arXiv:2404.15278 (cross-list from eess.SP) [pdf, other]
Title: Security-Sensitive Task Offloading in Integrated Satellite-Terrestrial Networks
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)

Wed, 24 Apr 2024

[23]  arXiv:2404.15042 [pdf, other]
Title: Leverage Variational Graph Representation For Model Poisoning on Federated Learning
Comments: 12 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[24]  arXiv:2404.15035 [pdf, ps, other]
Title: Near-Universally-Optimal Differentially Private Minimum Spanning Trees
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[25]  arXiv:2404.15000 [pdf, other]
Title: EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2404.14983 [pdf, other]
Title: Zero-Knowledge Location Privacy via Accurate Floating Point SNARKs
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2404.14942 [pdf, other]
Title: Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[28]  arXiv:2404.14870 [pdf, other]
Title: Super Mario in the Pernicious Kingdoms: Classifying glitches in old games
Comments: Presented at the 8th International Workshop on Games and Software Engineering (GAS), April 14 2024. Co-located with ICSE
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[29]  arXiv:2404.14720 [pdf, other]
Title: Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2404.14719 [pdf, other]
Title: Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graphs
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2404.14693 [pdf, other]
Title: Double Privacy Guard: Robust Traceable Adversarial Watermarking against Face Recognition
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[32]  arXiv:2404.14643 [pdf, other]
Title: Teaching Network Traffic Matrices in an Interactive Game Environment
Comments: 9 pages, 10 figures, 52 references; accepted to IEEE GrAPL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Graphics (cs.GR); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[33]  arXiv:2404.14580 [pdf, other]
Title: Demystifying Invariant Effectiveness for Securing Smart Contracts
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[34]  arXiv:2404.15143 (cross-list from cs.SD) [pdf, other]
Title: Every Breath You Don't Take: Deepfake Speech Detection Using Breath
Comments: Submitted to ACM journal -- Digital Threats: Research and Practice
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Multimedia (cs.MM); Audio and Speech Processing (eess.AS)
[35]  arXiv:2404.15081 (cross-list from cs.CV) [pdf, other]
Title: Perturbing Attention Gives You More Bang for the Buck: Subtle Imaging Perturbations That Efficiently Fool Customized Diffusion Models
Comments: Published at CVPR 2024
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[36]  arXiv:2404.14958 (cross-list from math.NA) [pdf, ps, other]
Title: Saving proof-of-work by hierarchical block structure
Subjects: Numerical Analysis (math.NA); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[37]  arXiv:2404.14795 (cross-list from cs.CL) [pdf, other]
Title: Talk Too Much: Poisoning Large Language Models under Token Limit
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38]  arXiv:2404.14746 (cross-list from cs.LG) [pdf, ps, other]
Title: A Customer Level Fraudulent Activity Detection Benchmark for Enhancing Machine Learning Model Research and Evaluation
Comments: 12 pages, 3 figures, 1 table
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[39]  arXiv:2404.14648 (cross-list from cs.CC) [pdf, other]
Title: Pseudorandom Permutations from Random Reversible Circuits
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Probability (math.PR)
[40]  arXiv:2404.14581 (cross-list from cs.CV) [pdf, other]
Title: The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[41]  arXiv:2404.14461 (cross-list from cs.CL) [pdf, other]
Title: Competition Report: Finding Universal Jailbreak Backdoors in Aligned LLMs
Comments: Competition Report
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Tue, 23 Apr 2024

[42]  arXiv:2404.14246 [pdf, other]
Title: Chain of trust: Unraveling the references among Common Criteria certified products
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2404.14244 [pdf, other]
Title: AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[44]  arXiv:2404.14138 [pdf, other]
Title: Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models
Comments: Under submission
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2404.14112 [pdf, other]
Title: Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy
Comments: Published in the Scientific Reports: this https URL
Journal-ref: Scientific Reports 14, 7849 (2024)
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2404.14106 [pdf, ps, other]
Title: DPTraj-PM: Differentially Private Trajectory Synthesis Using Prefix Tree and Markov Process
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2404.13998 [pdf, other]
Title: SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2404.13979 [pdf, other]
Title: Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution
Comments: 6 pages, 6 figures, Accepted at GLOBECOM 2023
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2404.13784 [pdf, other]
Title: Iteratively Prompting Multimodal LLMs to Reproduce Natural and AI-Generated Images
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computer Vision and Pattern Recognition (cs.CV)
[50]  arXiv:2404.13690 [pdf, other]
Title: Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing
Comments: 2023 IEEE International Conference on Big Data (BigData)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[51]  arXiv:2404.13575 [pdf, other]
Title: FedMPQ: Secure and Communication-Efficient Federated Learning with Multi-codebook Product Quantization
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[52]  arXiv:2404.13544 [pdf, other]
Title: Faster Post-Quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment
Comments: update the title
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2404.13535 [pdf, ps, other]
Title: DesTest: A Decentralised Testing Architecture for Improving Data Accuracy of Blockchain Oracle
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[54]  arXiv:2404.13518 [pdf, other]
Title: Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[55]  arXiv:2404.13477 [pdf, other]
Title: Leveraging Adversarial Detection to Enable Scalable and Low Overhead RowHammer Mitigations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[56]  arXiv:2404.13407 [pdf, other]
Title: A Framework for Managing Multifaceted Privacy Leakage While Optimizing Utility in Continuous LBS Interactions
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2404.13402 [pdf, other]
Title: Intrusion Detection at Scale with the Assistance of a Command-line Language Model
Comments: Accepted by IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), industry track
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[58]  arXiv:2404.13337 [pdf, other]
Title: Fuzzychain: An Equitable Consensus Mechanism for Blockchain Networks
Comments: 16 pages, 13 figures, 2 tables, this article was submitted to a JCR journal
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Logic in Computer Science (cs.LO)
[59]  arXiv:2404.13279 [pdf, other]
Title: Backdoor Attacks and Defenses on Semantic-Symbol Reconstruction in Semantic Communications
Comments: This paper has been accepted by IEEE ICC 2024
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV); Signal Processing (eess.SP)
[60]  arXiv:2404.13220 [pdf, ps, other]
Title: Security and Privacy Product Inclusion
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:2404.13208 [pdf, other]
Title: The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[62]  arXiv:2404.13161 [pdf, other]
Title: CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2404.13146 [pdf, other]
Title: DeepFake-O-Meter v2.0: An Open Platform for DeepFake Detection
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[64]  arXiv:2404.13125 [pdf, other]
Title: Towards Robust Real-Time Hardware-based Mobile Malware Detection using Multiple Instance Learning Formulation
Comments: Under peer review
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[65]  arXiv:2404.14389 (cross-list from cs.NI) [pdf, other]
Title: Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction
Comments: Accepted by IFIP/IEEE Networking 2024
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2404.14190 (cross-list from cs.NI) [pdf, other]
Title: Dismantling Common Internet Services for Ad-Malware Detection
Comments: 4 pages, 4 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[67]  arXiv:2404.14074 (cross-list from cs.DC) [pdf, other]
Title: Towards Proxy Staking Accounts Based on NFTs in Ethereum
Comments: To be presented at IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2024
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[68]  arXiv:2404.13968 (cross-list from cs.CL) [pdf, other]
Title: Protecting Your LLMs with Information Bottleneck
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[69]  arXiv:2404.13914 (cross-list from cs.SD) [pdf, other]
Title: Audio Anti-Spoofing Detection: A Survey
Comments: submitted to ACM Computing Surveys
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Multimedia (cs.MM); Audio and Speech Processing (eess.AS)
[70]  arXiv:2404.13860 (cross-list from cs.LG) [pdf, other]
Title: Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[71]  arXiv:2404.13752 (cross-list from cs.LG) [pdf, other]
Title: Towards General Conceptual Model Editing via Adversarial Representation Engineering
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[72]  arXiv:2404.13699 (cross-list from quant-ph) [pdf, ps, other]
Title: Exponential Quantum One-Wayness and EFI Pairs
Comments: 15 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[73]  arXiv:2404.13475 (cross-list from quant-ph) [pdf, other]
Title: PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud
Subjects: Quantum Physics (quant-ph); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[74]  arXiv:2404.13381 (cross-list from cs.LG) [pdf, other]
Title: DNA: Differentially private Neural Augmentation for contact tracing
Comments: Privacy Regulation and Protection in Machine Learning Workshop at ICLR 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Populations and Evolution (q-bio.PE)
[75]  arXiv:2404.13164 (cross-list from stat.CO) [pdf, other]
Title: Full-Information Estimation For Hierarchical Data
Subjects: Computation (stat.CO); Cryptography and Security (cs.CR)

Mon, 22 Apr 2024

[76]  arXiv:2404.12991 [pdf, other]
Title: RedactBuster: Entity Type Recognition from Redacted Documents
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2404.12916 [pdf, other]
Title: Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2404.12893 [pdf, other]
Title: The Power of Words: Generating PowerShell Attacks from Natural Language
Comments: 18th USENIX WOOT Conference on Offensive Technologies, GitHub Repo: this https URL
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[79]  arXiv:2404.12864 [pdf, other]
Title: Nyon Unchained: Forensic Analysis of Bosch's eBike Board Computers
Comments: In: Proceedings of the Digital Forensics Research Conference EU (DFRWS EU). 2024
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2404.12855 [pdf, ps, other]
Title: Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2404.12854 [pdf, other]
Title: Migrating Software Systems towards Post-Quantum-Cryptography -- A Systematic Literature Review
Comments: 2 figures, 12 tables, 22 pages
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2404.12852 [pdf, other]
Title: LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[83]  arXiv:2404.12837 [pdf, other]
Title: Towards a decentralized data privacy protocol for self-sovereignty in the digital world
Comments: To appear in the proceedings of RCIS 2024
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[84]  arXiv:2404.12808 [pdf, other]
Title: Systematic Evaluation of Forensic Data Acquisition using Smartphone Local Backup
Comments: In: Proceedings of the Digital Forensics Research Conference USA (DFRWS USA). 2023
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2404.12783 [pdf, other]
Title: A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2404.12778 [pdf, other]
Title: Defending against Data Poisoning Attacks in Federated Learning via User Elimination
Authors: Nick Galanis
Comments: To be submitted in AISEC 2024
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2404.12675 [pdf, other]
Title: ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2
Comments: 19 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2404.12512 [pdf, other]
Title: Proteus: Preserving Model Confidentiality during Graph Optimizations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[89]  arXiv:2404.12473 [pdf, other]
Title: Explainable Deep Learning Models for Dynamic and Online Malware Classification
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2404.12465 [pdf, other]
Title: Toward a Quantum Information System Cybersecurity Taxonomy and Testbed: Exploiting a Unique Opportunity for Early Impact
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2404.12983 (cross-list from cs.MA) [pdf, other]
Title: Private Agent-Based Modeling
Comments: Accepted at the 23rd International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2024)
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[92]  arXiv:2404.12874 (cross-list from eess.SP) [pdf, ps, other]
Title: Physical Layer Authentication Using Information Reconciliation
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[93]  arXiv:2404.12738 (cross-list from cs.NI) [pdf, other]
Title: DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches
Comments: Submitted to IEEE/ACM Transactions on Networking (ToN)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[94]  arXiv:2404.12730 (cross-list from cs.CV) [pdf, other]
Title: PATE-TripleGAN: Privacy-Preserving Image Synthesis with Gaussian Differential Privacy
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[95]  arXiv:2404.12680 (cross-list from cs.CV) [pdf, other]
Title: VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection
Comments: Accepted in 2024 18th International Conference on Automatic Face and Gesture Recognition (FG)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[96]  arXiv:2404.12679 (cross-list from cs.CV) [pdf, other]
Title: MLSD-GAN -- Generating Strong High Quality Face Morphing Attacks using Latent Semantic Disentanglement
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[97]  arXiv:2404.12666 (cross-list from cs.DC) [pdf, other]
Title: A Survey on Federated Analytics: Taxonomy, Enabling Techniques, Applications and Open Issues
Comments: This survey has been submitted to IEEE Communications Surveys & Tutorials
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[98]  arXiv:2404.12657 (cross-list from stat.AP) [pdf, other]
Title: Proposer selection in EIP-7251
Comments: 15 pages
Subjects: Applications (stat.AP); Cryptography and Security (cs.CR)
[99]  arXiv:2404.12647 (cross-list from quant-ph) [pdf, ps, other]
Title: Simple constructions of linear-depth t-designs and pseudorandom unitaries
Comments: Supersedes arXiv:2402.14803. In addition to the PRU result from arXiv:2402.14803, this paper contains new results on t-designs and adaptive pseudorandom isometries, and presents a unified construction of these different primitives
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[100]  arXiv:2404.12635 (cross-list from cs.CV) [pdf, other]
Title: AED-PADA:Improving Generalizability of Adversarial Example Detection via Principal Adversarial Domain Adaptation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[101]  arXiv:2404.12623 (cross-list from cs.LG) [pdf, other]
Title: End-to-End Verifiable Decentralized Federated Learning
Comments: 9 pages, 5 figures, This article has been accepted for presentation at the IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2024)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[102]  arXiv:2404.12530 (cross-list from cs.LG) [pdf, other]
Title: TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents
Comments: 22 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[103]  arXiv:2404.12507 (cross-list from quant-ph) [pdf, other]
Title: Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform
Comments: 9 pages, 5 figures, 1 table, submitted to 2024 IEEE International Conference on Quantum Computing & Engineering (QCE24)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Fri, 19 Apr 2024 (showing first 8 of 18 entries)

[104]  arXiv:2404.12300 [pdf, ps, other]
Title: Proactive Software Supply Chain Risk Management Framework (P-SSCRM) Version 1
Authors: Laurie Williams (North Carolina State University), Sammy Migues (Imbricate Security), Jamie Boote (Synopsys), Ben Hutchison (Synopsys)
Comments: 17 pages, 3 figures, 2 tables, will not be submitted to a conference
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2404.12208 [pdf, ps, other]
Title: The Explicit values of the UBCT, the LBCT and the DBCT of the inverse function
Comments: This manuscript was submitted to Finite Fields and Their Application on April 8, 2024. arXiv admin note: text overlap with arXiv:2309.01881
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[106]  arXiv:2404.12093 [pdf, ps, other]
Title: Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2404.12043 [pdf, other]
Title: Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report
Comments: 7 pages, 1 figure, to be published at ACM conference on Innovation and Technology in Computer Science Education (ITiCSE 2024)
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2404.12011 [pdf, other]
Title: Pseudo-random generators using linear feedback shift registers with output extraction
Authors: Holger Nobach
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2404.11977 [pdf, other]
Title: Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed
Comments: Preprint of Submitted Paper
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[110]  arXiv:2404.11815 [pdf, other]
Title: AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2404.12369 (cross-list from cs.LG) [pdf, other]
Title: KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 121 entries: 1-111 | 112-121 ]
[ showing 111 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)