We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 16

[ total of 169 entries: 1-25 | 17-41 | 42-66 | 67-91 | 92-116 | ... | 167-169 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 7 Jun 2024 (continued, showing last 8 of 24 entries)

[17]  arXiv:2406.04227 (cross-list from cs.LG) [pdf, other]
Title: R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[18]  arXiv:2406.04031 (cross-list from cs.CV) [pdf, other]
Title: Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[19]  arXiv:2406.03822 (cross-list from cs.SD) [pdf, other]
Title: SilentCipher: Deep Audio Watermarking
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[20]  arXiv:2406.03820 (cross-list from cs.NI) [pdf, other]
Title: A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions
Comments: This work has been accepted by IEEE Communications Surveys & Tutorials
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[21]  arXiv:2406.03684 (cross-list from cs.CV) [pdf, other]
Title: Principles of Designing Robust Remote Face Anti-Spoofing Systems
Comments: Under review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[22]  arXiv:2406.03620 (cross-list from cs.LG) [pdf, ps, other]
Title: Private Online Learning via Lazy Algorithms
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Optimization and Control (math.OC); Machine Learning (stat.ML)
[23]  arXiv:2406.03519 (cross-list from cs.LG) [pdf, other]
Title: Noise-Aware Algorithm for Heterogeneous Differentially Private Federated Learning
Comments: Proceedings of the 41 st International Conference on Machine Learning, Vienna, Austria. PMLR 235, 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[24]  arXiv:2406.03508 (cross-list from cs.LG) [pdf, other]
Title: Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Thu, 6 Jun 2024 (showing first 17 of 42 entries)

[25]  arXiv:2406.03423 [pdf, other]
Title: Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System
Comments: 21 pages and 8 figures. Code can be found at: this https URL
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[26]  arXiv:2406.03401 [pdf, ps, other]
Title: CROSSCON: Cross-platform Open Security Stack for Connected Devices
Authors: Bruno Crispo, Marco Roveri (Uni. Trento), Sandro Pinto, Tiago Gomes (Uni. Minho), Aljosa Pasic (ATOS), Akos Milankovich (S-LAB), David Puron, Ainara Garcia (Barbara IoT), Ziga Putrle (BeyondSemiconductor), Peter Ten (Uni Wuerzburg), Malvina Catalano (Cysec)
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2406.03322 [pdf, other]
Title: A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2406.03230 [pdf, ps, other]
Title: Defending Large Language Models Against Attacks With Residual Stream Activation Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[29]  arXiv:2406.03193 [pdf, other]
Title: Graph Neural Network Explanations are Fragile
Comments: 17 pages, 64 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30]  arXiv:2406.03187 [pdf, other]
Title: Ariadne: a Privacy-Preserving Communication Protocol
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2406.03186 [pdf, ps, other]
Title: Autonomous Adaptive Security Framework for 5G-Enabled IoT
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[32]  arXiv:2406.03182 [pdf, other]
Title: Reconstructing training data from document understanding models
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2406.03133 [pdf, other]
Title: The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Comments: Accepted to ACM CCS 2024
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2406.02836 [pdf, other]
Title: DREW : Towards Robust Data Provenance by Leveraging Error-Controlled Watermarking
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[35]  arXiv:2406.02768 [pdf, other]
Title: Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[36]  arXiv:2406.02744 [pdf, other]
Title: DPDR: Gradient Decomposition and Reconstruction for Differentially Private Deep Learning
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2406.02737 [pdf, other]
Title: CAMP: Compiler and Allocator-based Heap Memory Protection
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[38]  arXiv:2406.02654 [pdf, other]
Title: kNN Classification of Malware Data Dependency Graph Features
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[39]  arXiv:2406.02644 [pdf, ps, other]
Title: Differentially private exact recovery for stochastic block models
Comments: Accepted by ICML 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Data Structures and Algorithms (cs.DS)
[40]  arXiv:2406.02636 [pdf, other]
Title: Strengthening Network Intrusion Detection in IoT Environments with Self-Supervised Learning and Few Shot Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[41]  arXiv:2406.02633 [pdf, ps, other]
Title: Edit Distance Robust Watermarks for Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[ total of 169 entries: 1-25 | 17-41 | 42-66 | 67-91 | 92-116 | ... | 167-169 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)