We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 59

[ total of 169 entries: 1-50 | 10-59 | 60-109 | 110-159 | 160-169 ]
[ showing 50 entries per page: fewer | more | all ]

Thu, 6 Jun 2024 (continued, showing last 7 of 42 entries)

[60]  arXiv:2406.02883 (cross-list from cs.LG) [pdf, other]
Title: Nonlinear Transformations Against Unlearnable Datasets
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[61]  arXiv:2406.02797 (cross-list from cs.LG) [pdf, other]
Title: Auditing Privacy Mechanisms via Label Inference Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[62]  arXiv:2406.02789 (cross-list from cs.DS) [pdf, other]
Title: Private Stochastic Convex Optimization with Heavy Tails: Near-Optimality from Simple Reductions
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[63]  arXiv:2406.02736 (cross-list from cs.LG) [pdf, other]
Title: Synthetic Data Outliers: Navigating Identity Disclosure
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[64]  arXiv:2406.02716 (cross-list from cs.LG) [pdf, ps, other]
Title: Optimal Rates for DP-SCO with a Single Epoch and Large Batches
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[65]  arXiv:2406.02577 (cross-list from cs.CL) [pdf, other]
Title: Are PPO-ed Language Models Hackable?
Comments: 8 pages, 4 figures
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2406.02575 (cross-list from cs.CL) [pdf, other]
Title: Cross-Modal Safety Alignment: Is textual unlearning all you need?
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 5 Jun 2024

[67]  arXiv:2406.02463 [pdf, other]
Title: Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2406.02316 [pdf, other]
Title: Fast and Secure Decentralized Optimistic Rollups Using Setchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Logic in Computer Science (cs.LO)
[69]  arXiv:2406.02172 [pdf, other]
Title: Layer-2 Arbitrage: An Empirical Analysis of Swap Dynamics and Price Disparities on Rollups
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2406.02156 [pdf, ps, other]
Title: Almost linear time differentially private release of synthetic graphs
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[71]  arXiv:2406.02140 [pdf, other]
Title: Optimality of Matrix Mechanism on $\ell_p^p$-metric
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2406.02023 [pdf, other]
Title: ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2406.02011 [pdf, other]
Title: A Risk Estimation Study of Native Code Vulnerabilities in Android Applications
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2406.02004 [pdf, ps, other]
Title: Efficiently Train ASR Models that Memorize Less and Perform Better with Per-core Clipping
Comments: Accepted to Interspeech'24
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[75]  arXiv:2406.01964 [pdf, other]
Title: Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis
Comments: Published in IEEE Symposium on Security and Privacy (SP) 2024
Journal-ref: in 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2024 pp. 231-231
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Human-Computer Interaction (cs.HC)
[76]  arXiv:2406.01946 [pdf, other]
Title: Bileve: Securing Text Provenance in Large Language Models Against Spoofing with Bi-level Signature
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[77]  arXiv:2406.01927 [pdf, other]
Title: Position-based Rogue Access Point Detection
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2406.01918 [pdf, other]
Title: Image steganography based on generative implicit neural representation
Comments: 33 pages, 15 figures and 5 tables
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2406.01882 [pdf, other]
Title: HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET); Software Engineering (cs.SE)
[80]  arXiv:2406.01872 [pdf, other]
Title: A Survey of Unikernel Security: Insights and Trends from a Quantitative Analysis
Authors: Alex Wollman (1), John Hastings (1) ((1) Dakota State University)
Comments: 8 pages, 3 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Operating Systems (cs.OS)
[81]  arXiv:2406.01842 [pdf, other]
Title: GraphWeaver: Billion-Scale Cybersecurity Incident Correlation
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[82]  arXiv:2406.01811 [pdf, other]
Title: A Game-Theoretic Approach to Privacy-Utility Tradeoff in Sharing Genomic Summary Statistics
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2406.01794 [pdf, other]
Title: It Takes Two: A Peer-Prediction Solution for Blockchain Verifier's Dilemma
Comments: 9 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[84]  arXiv:2406.01744 [pdf, ps, other]
Title: Crisis Communication in the Face of Data Breaches
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[85]  arXiv:2406.01708 [pdf, other]
Title: Model for Peanuts: Hijacking ML Models without Training Access is Possible
Comments: 17 pages, 14 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[86]  arXiv:2406.02481 (cross-list from cs.CL) [pdf, other]
Title: Hiding Text in Large Language Models: Introducing Unconditional Token Forcing Confusion
Comments: Work in progress. Code is available at this https URL
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[87]  arXiv:2406.02253 (cross-list from cs.CV) [pdf, other]
Title: PuFace: Defending against Facial Cloaking Attacks for Facial Recognition Models
Authors: Jing Wen
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[88]  arXiv:2406.02064 (cross-list from cs.LG) [pdf, other]
Title: Advancing Generalized Transfer Attack with Initialization Derived Bilevel Optimization and Dynamic Sequence Truncation
Comments: Accepted by IJCAI 2024. 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[89]  arXiv:2406.02027 (cross-list from cs.LG) [pdf, other]
Title: Inference Attacks in Machine Learning as a Service: A Taxonomy, Review, and Promising Directions
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[90]  arXiv:2406.01873 (cross-list from cs.CL) [pdf, other]
Title: CR-UTP: Certified Robustness against Universal Text Perturbations on Large Language Models
Comments: Accepted by ACL Findings 2024
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2406.01852 (cross-list from cs.NI) [pdf, other]
Title: Non-uniformity is All You Need: Efficient and Timely Encrypted Traffic Classification With ECHO
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[92]  arXiv:2406.01738 (cross-list from cs.HC) [pdf, other]
Title: Good Vibes! Towards Phone-to-User Authentication Through Wristwatch Vibrations
Comments: Submitted to MoMM 2024
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[93]  arXiv:2406.01603 (cross-list from cs.IR) [pdf, other]
Title: Privacy-preserving recommender system using the data collaboration analysis for distributed datasets
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Tue, 4 Jun 2024 (showing first 16 of 36 entries)

[94]  arXiv:2406.01518 [pdf, other]
Title: BISON: Blind Identification through Stateless scOpe-specific derivatioN
Comments: Paper artifacts (Source code, Firefox extension, etc) available at this https URL
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2406.01394 [pdf, other]
Title: PrivacyRestore: Privacy-Preserving Inference in Large Language Models via Privacy Removal and Restoration
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[96]  arXiv:2406.01364 [pdf, other]
Title: BELLS: A Framework Towards Future Proof Benchmarks for the Evaluation of LLM Safeguards
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[97]  arXiv:2406.01258 [pdf, other]
Title: SCALLER: Standard Cell Assembled and Local Layout Effect-based Ring Oscillators
Comments: Accepted IEEE ESL
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2406.01219 [pdf, other]
Title: Constraint-based Adversarial Example Synthesis
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[99]  arXiv:2406.01186 [pdf, other]
Title: SNPGuard: Remote Attestation of SEV-SNP VMs Using Open Source Tools
Comments: to appear at SysTEX'24
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2406.01158 [pdf, ps, other]
Title: Profile Reconstruction from Private Sketches
Authors: Hao Wu, Rasmus Pagh
Comments: ICML 2024
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[101]  arXiv:2406.01135 [pdf, other]
Title: The Danger Within: Insider Threat Modeling Using Business Process Models
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2406.01085 [pdf, other]
Title: FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2406.01080 [pdf, other]
Title: No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[104]  arXiv:2406.01022 [pdf, other]
Title: Poisoning Attacks and Defenses in Recommender Systems: A Survey
Comments: 22 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[105]  arXiv:2406.00966 [pdf, other]
Title: Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2406.00938 [pdf, other]
Title: A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Symbolic Computation (cs.SC)
[107]  arXiv:2406.00918 [pdf, other]
Title: Assessing the Adversarial Security of Perceptual Hashing Algorithms
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[108]  arXiv:2406.00810 [pdf, other]
Title: Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol
Comments: 18 pages, 7 figures, 5 tables; This is the accepted version of ESCAR USA 2024
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2406.00802 [pdf, other]
Title: Weight Equalization Algorithm for Tree Parity Machines
Subjects: Cryptography and Security (cs.CR)
[ total of 169 entries: 1-50 | 10-59 | 60-109 | 110-159 | 160-169 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)