We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 113

[ total of 166 entries: 1-50 | 14-63 | 64-113 | 114-163 | 164-166 ]
[ showing 50 entries per page: fewer | more | all ]

Mon, 3 Jun 2024 (continued, showing last 32 of 40 entries)

[114]  arXiv:2405.20778 [pdf, other]
Title: Improved Generation of Adversarial Examples Against Safety-aligned LLMs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[115]  arXiv:2405.20777 [pdf, other]
Title: Black-Box Detection of Language Model Watermarks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116]  arXiv:2405.20776 [pdf, other]
Title: Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach
Comments: 13 pages, 25 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[117]  arXiv:2405.20775 [pdf, other]
Title: Cross-Modality Jailbreak and Mismatched Attacks on Medical Multimodal Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Multimedia (cs.MM)
[118]  arXiv:2405.20774 [pdf, other]
Title: Exploring Backdoor Attacks against Large Language Model-based Decision Making
Comments: 27 pages, including main paper, references, and appendix
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[119]  arXiv:2405.20773 [pdf, other]
Title: Visual-RolePlay: Universal Jailbreak Attack on MultiModal Large Language Models via Role-playing Image Characte
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[120]  arXiv:2405.20771 [pdf, other]
Title: Towards Black-Box Membership Inference Attack for Diffusion Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[121]  arXiv:2405.20769 [pdf, other]
Title: Avoiding Pitfalls for Privacy Accounting of Subsampled Mechanisms under Composition
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[122]  arXiv:2405.20762 [pdf, ps, other]
Title: Comparison of Access Control Approaches for Graph-Structured Data
Comments: Extended version of an accepted paper at the 21st International Conference on Security and Cryptography (SECRYPT), 2024
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2405.20727 [pdf, other]
Title: GANcrop: A Contrastive Defense Against Backdoor Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[124]  arXiv:2405.20713 [pdf, ps, other]
Title: Fast Evaluation of S-boxes with Garbled Circuits
Comments: 15 pages, published in IEEE Transactions on Information Forensics and Security vol. 19
Journal-ref: IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5530-5544, 2024.
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2405.20697 [pdf, other]
Title: A Lightweight Method for Defending Against UAF Vulnerabilities
Authors: Xun An
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2405.20681 [pdf, other]
Title: No Free Lunch Theorem for Privacy-Preserving LLM Inference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[127]  arXiv:2405.20641 [pdf, other]
Title: Query Provenance Analysis for Robust and Efficient Query-based Black-box Attack Defense
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2405.20611 [pdf, ps, other]
Title: Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Comments: 8 pages, 0 figures, IEEE 4th Cyber Awareness and Research Symposium 2024 (CARS'24)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[129]  arXiv:2405.20576 [pdf, other]
Title: Federated Graph Analytics with Differential Privacy
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2405.20561 [pdf, other]
Title: All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts
Comments: Accepted by USENIX Security 2024
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[131]  arXiv:2405.20521 [pdf, other]
Title: SoK: Public Blockchain Sharding
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2405.20485 [pdf, other]
Title: Phantom: General Trigger Attacks on Retrieval Augmented Language Generation
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[133]  arXiv:2405.20483 [pdf, other]
Title: Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2405.20446 [pdf, other]
Title: Is My Data in Your Retrieval Database? Membership Inference Attacks Against Retrieval Augmented Generation
Comments: 7 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[135]  arXiv:2405.20441 [pdf, other]
Title: SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC)
[136]  arXiv:2405.20413 [pdf, other]
Title: Jailbreaking Large Language Models Against Moderation Guardrails via Cipher Characters
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[137]  arXiv:2405.21018 (cross-list from cs.LG) [pdf, other]
Title: Improved Techniques for Optimization-Based Jailbreaking on Large Language Models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[138]  arXiv:2405.20902 (cross-list from cs.CL) [pdf, other]
Title: Preemptive Answer "Attacks" on Chain-of-Thought Reasoning
Comments: Accepted to ACL'24 (Findings). Camera-ready version
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[139]  arXiv:2405.20770 (cross-list from cs.CL) [pdf, other]
Title: Large Language Model Sentinel: Advancing Adversarial Robustness by LLM Agent
Authors: Guang Lin, Qibin Zhao
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[140]  arXiv:2405.20761 (cross-list from cs.LG) [pdf, other]
Title: Share Your Secrets for Privacy! Confidential Forecasting with Vertical Federated Learning
Comments: Submitted to the 27TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI 2024)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[141]  arXiv:2405.20539 (cross-list from cs.LG) [pdf, other]
Title: SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents
Comments: 23 pages, 14 figures, NeurIPS
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[142]  arXiv:2405.20503 (cross-list from cs.LG) [pdf, ps, other]
Title: Optimizing cnn-Bigru performance: Mish activation and comparative analysis with Relu
Journal-ref: International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.3, May 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[143]  arXiv:2405.20405 (cross-list from cs.DS) [pdf, other]
Title: Private Mean Estimation with Person-Level Differential Privacy
Comments: 67 pages, 3 figures
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Machine Learning (stat.ML)
[144]  arXiv:2405.20380 (cross-list from cs.AI) [pdf, other]
Title: Gradient Inversion of Federated Diffusion Models
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[145]  arXiv:2405.20355 (cross-list from cs.NE) [pdf, other]
Title: Enhancing Adversarial Robustness in SNNs with Sparse Gradients
Comments: accepted by ICML 2024
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Fri, 31 May 2024 (showing first 18 of 21 entries)

[146]  arXiv:2405.20291 [pdf, other]
Title: Unveiling and Mitigating Backdoor Vulnerabilities based on Unlearning Weight Changes and Backdoor Activeness
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[147]  arXiv:2405.20281 [pdf, other]
Title: Tight Characterizations for Preprocessing against Cryptographic Salting
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[148]  arXiv:2405.20099 [pdf, other]
Title: Defensive Prompt Patch: A Robust and Interpretable Defense of LLMs against Jailbreak Attacks
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:2405.20038 [pdf, other]
Title: Deep Reinforcement Learning for Intrusion Detection in IoT: A Survey
Journal-ref: 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM)
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2405.20027 [pdf, other]
Title: SEA Cache: A Performance-Efficient Countermeasure for Contention-based Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[151]  arXiv:2405.19971 [pdf, other]
Title: GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[152]  arXiv:2405.19954 [pdf, other]
Title: GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[153]  arXiv:2405.19948 [pdf, other]
Title: Scalable Test Generation to Trigger Rare Targets in High-Level Synthesizable IPs for Cloud FPGAs
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[154]  arXiv:2405.19871 [pdf, other]
Title: Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[155]  arXiv:2405.19851 [pdf, other]
Title: Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[156]  arXiv:2405.19762 [pdf, other]
Title: The Kosmosis Use-Case of Crypto Rug Pull Detection and Prevention
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[157]  arXiv:2405.19683 [pdf, other]
Title: Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[158]  arXiv:2405.19677 [pdf, other]
Title: Large Language Model Watermark Stealing With Mixed Integer Programming
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[159]  arXiv:2405.19598 [pdf, other]
Title: Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2405.19576 [pdf, other]
Title: Transforming Information Systems Management: A Reference Model for Digital Engineering Integration
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[161]  arXiv:2405.19524 [pdf, other]
Title: AI Risk Management Should Incorporate Both Safety and Security
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[162]  arXiv:2405.19360 [pdf, other]
Title: ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2405.19358 [pdf, other]
Title: Robustifying Safety-Aligned Large Language Models through Clean Data Curation
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 166 entries: 1-50 | 14-63 | 64-113 | 114-163 | 164-166 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)