We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 17

[ total of 137 entries: 1-25 | 18-42 | 43-67 | 68-92 | 93-117 | 118-137 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 3 Jun 2024 (continued, showing last 23 of 40 entries)

[18]  arXiv:2405.20727 [pdf, other]
Title: GANcrop: A Contrastive Defense Against Backdoor Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[19]  arXiv:2405.20713 [pdf, ps, other]
Title: Fast Evaluation of S-boxes with Garbled Circuits
Comments: 15 pages, published in IEEE Transactions on Information Forensics and Security vol. 19
Journal-ref: IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5530-5544, 2024.
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2405.20697 [pdf, other]
Title: A Lightweight Method for Defending Against UAF Vulnerabilities
Authors: Xun An
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2405.20681 [pdf, other]
Title: No Free Lunch Theorem for Privacy-Preserving LLM Inference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[22]  arXiv:2405.20641 [pdf, other]
Title: Query Provenance Analysis for Robust and Efficient Query-based Black-box Attack Defense
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2405.20611 [pdf, ps, other]
Title: Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Comments: 8 pages, 0 figures, IEEE 4th Cyber Awareness and Research Symposium 2024 (CARS'24)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[24]  arXiv:2405.20576 [pdf, other]
Title: Federated Graph Analytics with Differential Privacy
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2405.20561 [pdf, other]
Title: All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts
Comments: Accepted by USENIX Security 2024
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[26]  arXiv:2405.20521 [pdf, other]
Title: SoK: Public Blockchain Sharding
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2405.20485 [pdf, other]
Title: Phantom: General Trigger Attacks on Retrieval Augmented Language Generation
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[28]  arXiv:2405.20483 [pdf, other]
Title: Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2405.20446 [pdf, other]
Title: Is My Data in Your Retrieval Database? Membership Inference Attacks Against Retrieval Augmented Generation
Comments: 7 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[30]  arXiv:2405.20441 [pdf, other]
Title: SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC)
[31]  arXiv:2405.20413 [pdf, other]
Title: Jailbreaking Large Language Models Against Moderation Guardrails via Cipher Characters
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[32]  arXiv:2405.21018 (cross-list from cs.LG) [pdf, other]
Title: Improved Techniques for Optimization-Based Jailbreaking on Large Language Models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[33]  arXiv:2405.20902 (cross-list from cs.CL) [pdf, other]
Title: Preemptive Answer "Attacks" on Chain-of-Thought Reasoning
Comments: Accepted to ACL'24 (Findings). Camera-ready version
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[34]  arXiv:2405.20770 (cross-list from cs.CL) [pdf, other]
Title: Large Language Model Sentinel: Advancing Adversarial Robustness by LLM Agent
Authors: Guang Lin, Qibin Zhao
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[35]  arXiv:2405.20761 (cross-list from cs.LG) [pdf, other]
Title: Share Your Secrets for Privacy! Confidential Forecasting with Vertical Federated Learning
Comments: Submitted to the 27TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI 2024)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[36]  arXiv:2405.20539 (cross-list from cs.LG) [pdf, other]
Title: SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents
Comments: 23 pages, 14 figures, NeurIPS
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[37]  arXiv:2405.20503 (cross-list from cs.LG) [pdf, ps, other]
Title: Optimizing cnn-Bigru performance: Mish activation and comparative analysis with Relu
Journal-ref: International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.3, May 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[38]  arXiv:2405.20405 (cross-list from cs.DS) [pdf, other]
Title: Private Mean Estimation with Person-Level Differential Privacy
Comments: 67 pages, 3 figures
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Machine Learning (stat.ML)
[39]  arXiv:2405.20380 (cross-list from cs.AI) [pdf, other]
Title: Gradient Inversion of Federated Diffusion Models
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[40]  arXiv:2405.20355 (cross-list from cs.NE) [pdf, other]
Title: Enhancing Adversarial Robustness in SNNs with Sparse Gradients
Comments: accepted by ICML 2024
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Fri, 31 May 2024 (showing first 2 of 21 entries)

[41]  arXiv:2405.20291 [pdf, other]
Title: Unveiling and Mitigating Backdoor Vulnerabilities based on Unlearning Weight Changes and Backdoor Activeness
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[42]  arXiv:2405.20281 [pdf, other]
Title: Tight Characterizations for Preprocessing against Cryptographic Salting
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[ total of 137 entries: 1-25 | 18-42 | 43-67 | 68-92 | 93-117 | 118-137 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)