We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 122 entries: 1-122 ]
[ showing up to 125 entries per page: fewer | more ]

Fri, 19 Apr 2024

[1]  arXiv:2404.12300 [pdf, ps, other]
Title: Proactive Software Supply Chain Risk Management Framework (P-SSCRM) Version 1
Authors: Laurie Williams (North Carolina State University), Sammy Migues (Imbricate Security), Jamie Boote (Synopsys), Ben Hutchison (Synopsys)
Comments: 17 pages, 3 figures, 2 tables, will not be submitted to a conference
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2404.12208 [pdf, ps, other]
Title: The Explicit values of the UBCT, the LBCT and the DBCT of the inverse function
Comments: This manuscript was submitted to Finite Fields and Their Application on April 8, 2024. arXiv admin note: text overlap with arXiv:2309.01881
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[3]  arXiv:2404.12093 [pdf, ps, other]
Title: Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2404.12043 [pdf, other]
Title: Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report
Comments: 7 pages, 1 figure, to be published at ACM conference on Innovation and Technology in Computer Science Education (ITiCSE 2024)
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2404.12011 [pdf, other]
Title: Pseudo-random generators using linear feedback shift registers with output extraction
Authors: Holger Nobach
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2404.11977 [pdf, other]
Title: Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed
Comments: Preprint of Submitted Paper
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[7]  arXiv:2404.11815 [pdf, other]
Title: AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2404.12369 (cross-list from cs.LG) [pdf, other]
Title: KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[9]  arXiv:2404.12186 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving UCB Decision Process Verification via zk-SNARKs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[10]  arXiv:2404.12135 (cross-list from cs.MA) [pdf, other]
Title: mABC: multi-Agent Blockchain-Inspired Collaboration for root cause analysis in micro-services architecture
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[11]  arXiv:2404.12125 (cross-list from cs.CY) [pdf, other]
Title: Intelligence Education made in Europe
Comments: 16 pages, 2 figures. No potential conflict of interest was reported by the authors
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[12]  arXiv:2404.12086 (cross-list from cs.CY) [pdf, other]
Title: Preserving Nature's Ledger: Blockchains in Biodiversity Conservation
Subjects: Computers and Society (cs.CY); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Emerging Technologies (cs.ET)
[13]  arXiv:2404.12075 (cross-list from cs.HC) [pdf, other]
Title: E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting
Comments: 23 pages, 2024 IEEE Symposium on Security and Privacy
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[14]  arXiv:2404.12014 (cross-list from cs.CL) [pdf, other]
Title: Enhance Robustness of Language Models Against Variation Attack through Graph Integration
Comments: 12 pages, 4 figures, accepted by COLING 2024
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[15]  arXiv:2404.11962 (cross-list from cs.AI) [pdf, other]
Title: ©Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model
Comments: 20 pages, 6 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[16]  arXiv:2404.11905 (cross-list from cs.LG) [pdf, other]
Title: FedMID: A Data-Free Method for Using Intermediate Outputs as a Defense Mechanism Against Poisoning Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2404.11763 (cross-list from cs.SE) [pdf, other]
Title: The Code the World Depends On: A First Look at Technology Makers' Open Source Software Dependencies
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[18]  arXiv:2404.11665 (cross-list from cs.LG) [pdf, other]
Title: Exploring DNN Robustness Against Adversarial Attacks Using Approximate Multipliers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Thu, 18 Apr 2024

[19]  arXiv:2404.11473 [pdf, ps, other]
Title: Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[20]  arXiv:2404.11410 [pdf, other]
Title: SERENE: A Collusion Resilient Replication-based Verification Framework
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[21]  arXiv:2404.11388 [pdf, ps, other]
Title: Enhancing Data Privacy In Wireless Sensor Networks: Investigating Techniques And Protocols To Protect Privacy Of Data Transmitted Over Wireless Sensor Networks In Critical Applications Of Healthcare And National Security
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[22]  arXiv:2404.11372 [pdf, other]
Title: S3PHER: Secure and Searchable System for Patient-driven HEalth data shaRing
Comments: 20 pages, 1 figure, 2 tables in the appendix
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2404.11338 [pdf, other]
Title: LLMs for Cyber Security: New Opportunities
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[24]  arXiv:2404.11325 [pdf, ps, other]
Title: On Learning Parities with Dependent Noise
Comments: This note draws heavily from arXiv:2404.03774
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[25]  arXiv:2404.11284 [pdf, other]
Title: Amplifying Main Memory-Based Timing Covert and Side Channels using Processing-in-Memory Operations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[26]  arXiv:2404.11281 [pdf, other]
Title: SoK: Decentralized Finance (DeFi) -- Fundamentals, Taxonomy and Risks
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2404.11189 [pdf, other]
Title: The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on Rollup Performance and Cost Efficiency
Comments: Work in progress, exploring zkSync Era. More EVM chains will be added in the final version
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2404.11121 [pdf, other]
Title: TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment
Comments: arXiv admin note: text overlap with arXiv:2310.07152 by other authors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29]  arXiv:2404.11107 [pdf, other]
Title: KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[30]  arXiv:2404.10800 [pdf, other]
Title: Advancing Network Intrusion Detection: Integrating Graph Neural Networks with Scattering Transform and Node2Vec for Enhanced Anomaly Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[31]  arXiv:2404.10796 [pdf, ps, other]
Title: Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective
Comments: Submitted to Computer & Security (Elsevier)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[32]  arXiv:2404.10792 [pdf, other]
Title: Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach
Comments: 15 pages, 4 figures, conference (ARC24)
Journal-ref: Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2024. Lecture Notes in Computer Science, vol 14553. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[33]  arXiv:2404.10790 [pdf, other]
Title: Multimodal Attack Detection for Action Recognition Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[34]  arXiv:2404.10789 [pdf, other]
Title: PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Comments: 9th IEEE European Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[35]  arXiv:2404.10788 [pdf, other]
Title: The Path To Autonomous Cyber Defense
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[36]  arXiv:2404.10782 [pdf, ps, other]
Title: Quantifying AI Vulnerabilities: A Synthesis of Complexity, Dynamical Systems, and Game Theory
Authors: B Kereopa-Yorke
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2404.10781 [pdf, ps, other]
Title: Authenticity in Authorship: The Writer's Integrity Framework for Verifying Human-Generated Text
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2404.10780 [pdf, ps, other]
Title: Phishing Website Detection Using a Combined Model of ANN and LSTM
Comments: Pages 9, Figures 5
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[39]  arXiv:2404.11467 (cross-list from cs.SE) [pdf, other]
Title: A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[40]  arXiv:2404.11450 (cross-list from cs.DB) [pdf, other]
Title: Real-Time Trajectory Synthesis with Local Differential Privacy
Comments: Accepted by ICDE 2024. Code is available at: this https URL
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[41]  arXiv:2404.11056 (cross-list from cs.LG) [pdf, other]
Title: LMEraser: Large Model Unlearning through Adaptive Prompt Tuning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[42]  arXiv:2404.10995 (cross-list from math.OC) [pdf, other]
Title: Clipped SGD Algorithms for Privacy Preserving Performative Prediction: Bias Amplification and Remedies
Comments: 22 pages, 11 figures
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43]  arXiv:2404.10988 (cross-list from cs.CY) [pdf, other]
Title: From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises
Comments: Published in ACM ITiCSE 2024 conference proceedings, see this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[44]  arXiv:2404.10957 (cross-list from cs.LG) [pdf, other]
Title: Personalized Federated Learning via Stacking
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 17 Apr 2024

[45]  arXiv:2404.10764 [pdf, other]
Title: Confidential Federated Computations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2404.10715 [pdf, other]
Title: Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2404.10659 [pdf, other]
Title: Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2404.10610 [pdf, other]
Title: Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2404.10602 [pdf, other]
Title: Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design
Comments: This paper has been accepted for publication by the 33rd International Symposium on High-Performance Parallel and Distributed Computing (HPDC) 2024. The copyright is with the ACM and the final version will be published by the ACM
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[50]  arXiv:2404.10543 [pdf, other]
Title: Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2404.10491 [pdf, other]
Title: BoLD: Fast and Cheap Dispute Resolution
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[52]  arXiv:2404.10404 [pdf, other]
Title: Sisu: Decentralized Trustless Bridge For Full Ethereum Node
Authors: Billy Pham, Huy Le
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2404.10187 [pdf, other]
Title: SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Comments: 20 pages, 1 figure, 8 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[54]  arXiv:2404.10092 [pdf, other]
Title: Integration of Federated Learning and Blockchain in Healthcare: A Tutorial
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2404.10012 [pdf, other]
Title: Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security
Comments: arXiv admin note: substantial text overlap with arXiv:2404.08808
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[56]  arXiv:2404.10255 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Training-as-a-Service for On-Device Intelligence: Concept, Architectural Scheme, and Open Problems
Comments: 7 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[57]  arXiv:2404.10201 (cross-list from cs.DS) [pdf, other]
Title: Private Vector Mean Estimation in the Shuffle Model: Optimal Rates Require Many Messages
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[58]  arXiv:2404.10095 (cross-list from cs.CY) [pdf, other]
Title: Synthetic Census Data Generation via Multidimensional Multiset Sum
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[59]  arXiv:2404.10029 (cross-list from math.OC) [pdf, ps, other]
Title: Federated Learning on Riemannian Manifolds with Differential Privacy
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2404.10026 (cross-list from eess.IV) [pdf, ps, other]
Title: Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection
Journal-ref: Journal of Information, Technology and Policy (2023): 1-12
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Tue, 16 Apr 2024

[61]  arXiv:2404.09895 [pdf, other]
Title: Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security
Comments: IEEE Symposium on Security and Privacy (IEEE SP), 2024
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2404.09802 [pdf, other]
Title: The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2404.09724 [pdf, other]
Title: Privacy-Preserving Federated Unlearning with Certified Client Removal
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2404.09681 [pdf, other]
Title: An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2404.09625 [pdf, other]
Title: Privacy-Preserving Intrusion Detection using Convolutional Neural Networks
Comments: Accepted at IEEE Conference on Artificial Intelligence (CAI) 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[66]  arXiv:2404.09599 [pdf, other]
Title: Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2404.09518 [pdf, ps, other]
Title: Bridging the Gap: Automated Analysis of Sancus
Comments: To appear at IEEE CSF 2024
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2404.09481 [pdf, other]
Title: SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69]  arXiv:2404.09450 [pdf, ps, other]
Title: Crooked indifferentiability of the Feistel Construction
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2404.09442 [pdf, other]
Title: Correcting Subverted Random Oracles
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2404.09430 [pdf, other]
Title: On the Efficiency of Privacy Attacks in Federated Learning
Comments: To appear on FedVision 2024. EPAFL (this https URL)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2404.09404 [pdf, other]
Title: EQO: Exploring Ultra-Efficient Private Inference with Winograd-Based Protocol and Quantization Co-Optimization
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2404.09395 [pdf, ps, other]
Title: Data Analysis Methods Preliminaries for a Photon-based Hardware Random Number Generator
Comments: Presented at College of STEM SYmposium, Clayton State University
Subjects: Cryptography and Security (cs.CR); Instrumentation and Detectors (physics.ins-det)
[74]  arXiv:2404.09352 [pdf, other]
Title: Counteracting Concept Drift by Learning with Future Malware Predictions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[75]  arXiv:2404.09288 [pdf, ps, other]
Title: New Class of Ciphers Using Hardware Entropy Source
Comments: 8 pages, 4 figures; ancillary file with a cipher - for cracking it we offer $1000, cf. this https URL
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2404.09286 [pdf, ps, other]
Title: Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
[77]  arXiv:2404.09265 [pdf, other]
Title: Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning
Comments: Accepted In Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT '24)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[78]  arXiv:2404.09214 [pdf, other]
Title: PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
Comments: in Proc. of NDSS, 2024
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2404.09095 [pdf, ps, other]
Title: Pirates: Anonymous Group Calls Over Fully Untrusted Infrastructure
Comments: To appear at ACIPS 2024
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2404.09093 [pdf, ps, other]
Title: Gophy: Novel Proof-of-Useful-Work blockchain architecture for High Energy Physics
Comments: This is just a draft. Might be subjected to changes in the future
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2404.09088 [pdf, other]
Title: Projective Systematic Authentication via Reed-Muller Codes
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2404.09066 [pdf, other]
Title: CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG); Programming Languages (cs.PL)
[83]  arXiv:2404.09058 [pdf, other]
Title: GView: A Versatile Assistant for Security Researchers
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[84]  arXiv:2404.09052 [pdf, other]
Title: Enhancing Security Awareness Through Gamified Approaches
Comments: 18 pages, 15 figures and 2 tables
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2404.09026 [pdf, ps, other]
Title: SQIAsignHD: SQIsignHD Adaptor Signature
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2404.09005 [pdf, other]
Title: Proof-of-Learning with Incentive Security
Comments: 22 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[87]  arXiv:2404.08987 [pdf, other]
Title: On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2404.08818 [pdf, other]
Title: Empowering Malware Detection Efficiency within Processing-in-Memory Architecture
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[89]  arXiv:2404.08808 [pdf, other]
Title: Enhancing IoT Malware Detection through Adaptive Model Parallelism and Resource Optimization
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[90]  arXiv:2404.08793 [pdf, other]
Title: JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models
Comments: Submitted to VIS 2024
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC)
[91]  arXiv:2404.08723 [pdf, ps, other]
Title: Identification of a replicable optical security element using laser speckle
Comments: 9 pages, 6 figures
Journal-ref: Optics & Laser Technology, 175, 110725 (2024)
Subjects: Cryptography and Security (cs.CR); Optics (physics.optics)
[92]  arXiv:2404.08716 [pdf, other]
Title: Securing Monolithic Kernels using Compartmentalization
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[93]  arXiv:2404.09836 (cross-list from cs.SE) [pdf, other]
Title: How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[94]  arXiv:2404.09816 (cross-list from cs.LG) [pdf, other]
Title: FedP3: Federated Personalized and Privacy-friendly Network Pruning under Model Heterogeneity
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[95]  arXiv:2404.09750 (cross-list from quant-ph) [pdf, other]
Title: Layered Uploading for Quantum Convolutional Neural Networks
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[96]  arXiv:2404.09722 (cross-list from cs.LG) [pdf, other]
Title: VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[97]  arXiv:2404.09536 (cross-list from cs.DC) [pdf, other]
Title: Beyond Noise: Privacy-Preserving Decentralized Learning with Virtual Nodes
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[98]  arXiv:2404.09413 (cross-list from stat.ML) [pdf, other]
Title: On the Optimal Regret of Locally Private Linear Contextual Bandit
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[99]  arXiv:2404.09391 (cross-list from cs.LG) [pdf, other]
Title: Privacy at a Price: Exploring its Dual Impact on AI Fairness
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[100]  arXiv:2404.09349 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness Limits via Scaling-Law and Human-Alignment Studies
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[101]  arXiv:2404.09315 (cross-list from math.GR) [pdf, ps, other]
Title: Binary bi-braces and applications to cryptography
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[102]  arXiv:2404.09165 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Multiple Linear Computation: A Flexible Communication-Computation Tradeoff
Comments: Accepted by IEEE ISIT 2024
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[103]  arXiv:2404.08847 (cross-list from cs.IR) [pdf, other]
Title: LazyDP: Co-Designing Algorithm-Software for Scalable Training of Differentially Private Recommendation Models
Journal-ref: Published at 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-29), 2024
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[104]  arXiv:2404.08715 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Log-Location-Scale Regression Using Functional Mechanism
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
[105]  arXiv:2404.08690 (cross-list from cs.CL) [pdf, other]
Title: Towards Building a Robust Toxicity Predictor
Comments: ACL 2023 /
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[106]  arXiv:2404.08642 (cross-list from cs.NI) [pdf, ps, other]
Title: Integrating Multi -WAN, VPN and IEEE 802.3ad for Advanced IPSEC
Authors: Stefan Ćertić
Comments: 13 pages, 2 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 15 Apr 2024

[107]  arXiv:2404.08631 [pdf, other]
Title: FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models
Comments: To appear in IEEE Symposium on Security and Privacy, 2024
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2404.08562 [pdf, other]
Title: Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[109]  arXiv:2404.08310 [pdf, other]
Title: Manifest V3 Unveiled: Navigating the New Era of Browser Extensions
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2404.08309 [pdf, other]
Title: Subtoxic Questions: Dive Into Attitude Change of LLM's Response in Jailbreak Attempts
Comments: 4 pages, 2 figures. This paper was submitted to The 7th Deep Learning Security and Privacy Workshop (DLSP 2024) and was accepted as extended abstract, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[111]  arXiv:2404.08306 [pdf, other]
Title: Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[112]  arXiv:2404.08250 [pdf, other]
Title: A Systematic Construction Approach for All $4\times 4$ Involutory MDS Matrices
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2404.08232 [pdf, other]
Title: Navigating Quantum Security Risks in Networked Environments: A Comprehensive Study of Quantum-Safe Network Protocols
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2404.08231 [pdf, other]
Title: Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2404.08165 [pdf, other]
Title: Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?
Comments: 24 pages, 21 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2404.08160 [pdf, other]
Title: A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2404.08144 [pdf, other]
Title: LLM Agents can Autonomously Exploit One-day Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[118]  arXiv:2404.08517 (cross-list from cs.SE) [pdf, other]
Title: Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119]  arXiv:2404.08273 (cross-list from cs.CV) [pdf, other]
Title: Struggle with Adversarial Defense? Try Diffusion
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[120]  arXiv:2404.08255 (cross-list from cs.CV) [pdf, other]
Title: Practical Region-level Attack against Segment Anything Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[121]  arXiv:2404.08224 (cross-list from cs.LG) [src]
Title: HCL-MTSAD: Hierarchical Contrastive Consistency Learning for Accurate Detection of Industrial Multivariate Time Series Anomalies
Comments: This paper is a manuscript that is still in the process of revision, including Table 1, Figure 2, problem definition in section III.B and method description proposed in section IV. In addition, the submitter has not been authorized by the first author and other co-authors to post the paper to arXiv
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[122]  arXiv:2404.08064 (cross-list from eess.AS) [pdf, ps, other]
Title: The Impact of Speech Anonymization on Pathology and Its Limits
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 122 entries: 1-122 ]
[ showing up to 125 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)