We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 111 entries: 1-102 | 103-111 ]
[ showing 102 entries per page: fewer | more | all ]

Tue, 16 Apr 2024

[1]  arXiv:2404.09895 [pdf, other]
Title: Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security
Comments: IEEE Symposium on Security and Privacy (IEEE SP), 2024
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2404.09802 [pdf, other]
Title: The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2404.09724 [pdf, other]
Title: Privacy-Preserving Federated Unlearning with Certified Client Removal
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2404.09681 [pdf, other]
Title: An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2404.09625 [pdf, other]
Title: Privacy-Preserving Intrusion Detection using Convolutional Neural Networks
Comments: Accepted at IEEE Conference on Artificial Intelligence (CAI) 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[6]  arXiv:2404.09599 [pdf, other]
Title: Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2404.09518 [pdf, ps, other]
Title: Bridging the Gap: Automated Analysis of Sancus
Comments: To appear at IEEE CSF 2024
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2404.09481 [pdf, other]
Title: SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9]  arXiv:2404.09450 [pdf, ps, other]
Title: Crooked indifferentiability of the Feistel Construction
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2404.09442 [pdf, other]
Title: Correcting Subverted Random Oracles
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2404.09430 [pdf, other]
Title: On the Efficiency of Privacy Attacks in Federated Learning
Comments: To appear on FedVision 2024. EPAFL (this https URL)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[12]  arXiv:2404.09404 [pdf, other]
Title: EQO: Exploring Ultra-Efficient Private Inference with Winograd-Based Protocol and Quantization Co-Optimization
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2404.09395 [pdf, ps, other]
Title: Data Analysis Methods Preliminaries for a Photon-based Hardware Random Number Generator
Comments: Presented at College of STEM SYmposium, Clayton State University
Subjects: Cryptography and Security (cs.CR); Instrumentation and Detectors (physics.ins-det)
[14]  arXiv:2404.09352 [pdf, other]
Title: Counteracting Concept Drift by Learning with Future Malware Predictions
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[15]  arXiv:2404.09288 [pdf, ps, other]
Title: New Class of Ciphers Using Hardware Entropy Source
Comments: 8 pages, 4 figures; ancillary file with a cipher - for cracking it we offer $1000, cf. this https URL
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2404.09286 [pdf, ps, other]
Title: Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
[17]  arXiv:2404.09265 [pdf, other]
Title: Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning
Comments: Accepted In Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT '24)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[18]  arXiv:2404.09214 [pdf, other]
Title: PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
Comments: in Proc. of NDSS, 2024
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2404.09095 [pdf, ps, other]
Title: Pirates: Anonymous Group Calls Over Fully Untrusted Infrastructure
Comments: To appear at ACIPS 2024
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2404.09093 [pdf, ps, other]
Title: Gophy: Novel Proof-of-Useful-Work blockchain architecture for High Energy Physics
Comments: This is just a draft. Might be subjected to changes in the future
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2404.09088 [pdf, other]
Title: Projective Systematic Authentication via Reed-Muller Codes
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2404.09066 [pdf, other]
Title: CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG); Programming Languages (cs.PL)
[23]  arXiv:2404.09058 [pdf, other]
Title: GView: A Versatile Assistant for Security Researchers
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[24]  arXiv:2404.09052 [pdf, other]
Title: Enhancing Security Awareness Through Gamified Approaches
Comments: 18 pages, 15 figures and 2 tables
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2404.09026 [pdf, ps, other]
Title: SQIAsignHD: SQIsignHD Adaptor Signature
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2404.09005 [pdf, other]
Title: Proof-of-Learning with Incentive Security
Comments: 22 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Emerging Technologies (cs.ET); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[27]  arXiv:2404.08987 [pdf, other]
Title: On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2404.08818 [pdf, other]
Title: Empowering Malware Detection Efficiency within Processing-in-Memory Architecture
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[29]  arXiv:2404.08808 [pdf, other]
Title: Enhancing IoT Malware Detection through Adaptive Model Parallelism and Resource Optimization
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[30]  arXiv:2404.08793 [pdf, other]
Title: JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models
Comments: Submitted to VIS 2024
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC)
[31]  arXiv:2404.08723 [pdf, ps, other]
Title: Identification of a replicable optical security element using laser speckle
Comments: 9 pages, 6 figures
Journal-ref: Optics & Laser Technology, 175, 110725 (2024)
Subjects: Cryptography and Security (cs.CR); Optics (physics.optics)
[32]  arXiv:2404.08716 [pdf, other]
Title: Securing Monolithic Kernels using Compartmentalization
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[33]  arXiv:2404.09836 (cross-list from cs.SE) [pdf, other]
Title: How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[34]  arXiv:2404.09816 (cross-list from cs.LG) [pdf, other]
Title: FedP3: Federated Personalized and Privacy-friendly Network Pruning under Model Heterogeneity
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[35]  arXiv:2404.09750 (cross-list from quant-ph) [pdf, other]
Title: Layered Uploading for Quantum Convolutional Neural Networks
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[36]  arXiv:2404.09722 (cross-list from cs.LG) [pdf, other]
Title: VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[37]  arXiv:2404.09536 (cross-list from cs.DC) [pdf, other]
Title: Beyond Noise: Privacy-Preserving Decentralized Learning with Virtual Nodes
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38]  arXiv:2404.09413 (cross-list from stat.ML) [pdf, other]
Title: On the Optimal Regret of Locally Private Linear Contextual Bandit
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2404.09391 (cross-list from cs.LG) [pdf, other]
Title: Privacy at a Price: Exploring its Dual Impact on AI Fairness
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[40]  arXiv:2404.09349 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness Limits via Scaling-Law and Human-Alignment Studies
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[41]  arXiv:2404.09315 (cross-list from math.GR) [pdf, ps, other]
Title: Binary bi-braces and applications to cryptography
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[42]  arXiv:2404.09165 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Multiple Linear Computation: A Flexible Communication-Computation Tradeoff
Comments: Accepted by IEEE ISIT 2024
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[43]  arXiv:2404.08847 (cross-list from cs.IR) [pdf, other]
Title: LazyDP: Co-Designing Algorithm-Software for Scalable Training of Differentially Private Recommendation Models
Journal-ref: Published at 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-29), 2024
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44]  arXiv:2404.08715 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Log-Location-Scale Regression Using Functional Mechanism
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
[45]  arXiv:2404.08690 (cross-list from cs.CL) [pdf, other]
Title: Towards Building a Robust Toxicity Predictor
Comments: ACL 2023 /
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2404.08642 (cross-list from cs.NI) [pdf, ps, other]
Title: Integrating Multi -WAN, VPN and IEEE 802.3ad for Advanced IPSEC
Authors: Stefan Ćertić
Comments: 13 pages, 2 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 15 Apr 2024

[47]  arXiv:2404.08631 [pdf, other]
Title: FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models
Comments: To appear in IEEE Symposium on Security and Privacy, 2024
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2404.08562 [pdf, other]
Title: Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[49]  arXiv:2404.08310 [pdf, other]
Title: Manifest V3 Unveiled: Navigating the New Era of Browser Extensions
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2404.08309 [pdf, other]
Title: Subtoxic Questions: Dive Into Attitude Change of LLM's Response in Jailbreak Attempts
Comments: 4 pages, 2 figures. This paper was submitted to The 7th Deep Learning Security and Privacy Workshop (DLSP 2024) and was accepted as extended abstract, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[51]  arXiv:2404.08306 [pdf, other]
Title: Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[52]  arXiv:2404.08250 [pdf, other]
Title: A Systematic Construction Approach for All $4\times 4$ Involutory MDS Matrices
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2404.08232 [pdf, other]
Title: Navigating Quantum Security Risks in Networked Environments: A Comprehensive Study of Quantum-Safe Network Protocols
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2404.08231 [pdf, other]
Title: Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2404.08165 [pdf, other]
Title: Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?
Comments: 24 pages, 21 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2404.08160 [pdf, other]
Title: A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2404.08144 [pdf, other]
Title: LLM Agents can Autonomously Exploit One-day Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[58]  arXiv:2404.08517 (cross-list from cs.SE) [pdf, other]
Title: Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2404.08273 (cross-list from cs.CV) [pdf, other]
Title: Struggle with Adversarial Defense? Try Diffusion
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[60]  arXiv:2404.08255 (cross-list from cs.CV) [pdf, other]
Title: Practical Region-level Attack against Segment Anything Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[61]  arXiv:2404.08224 (cross-list from cs.LG) [pdf, other]
Title: HCL-MTSAD: Hierarchical Contrastive Consistency Learning for Accurate Detection of Industrial Multivariate Time Series Anomalies
Comments: 11 pages, 4 figures, under review by IEEE Internet of Things Journal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[62]  arXiv:2404.08064 (cross-list from eess.AS) [pdf, ps, other]
Title: The Impact of Speech Anonymization on Pathology and Its Limits
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Fri, 12 Apr 2024

[63]  arXiv:2404.07892 [pdf, other]
Title: A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2404.07878 [pdf, other]
Title: LeapFrog: The Rowhammer Instruction Skip Attack
Comments: Accepted at Hardware.io 2024
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[65]  arXiv:2404.07863 [pdf, other]
Title: Backdoor Contrastive Learning via Bi-level Trigger Optimization
Comments: Accepted by ICLR 2024
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2404.07831 [pdf, ps, other]
Title: Protected QR Code-based Anti-counterfeit System for Pharmaceutical Manufacturing
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2404.07797 [pdf, other]
Title: Illicit Promotion on Twitter
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[68]  arXiv:2404.07675 [pdf, other]
Title: Opportunistic Sensor-Based Multi-Factor Authentication in and for the Internet of Things
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2404.07572 [pdf, other]
Title: Fragile Model Watermark for integrity protection: leveraging boundary volatility and sensitive sample-pairing
Comments: The article has been accepted by IEEE International Conference on Multimedia and Expo 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[70]  arXiv:2404.07557 [pdf, ps, other]
Title: Towards Secure and Reliable Heterogeneous Real-time Telemetry Communication in Autonomous UAV Swarms
Comments: 4 pages, 2 figures, submitted and accepted to iCCC24
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[71]  arXiv:2404.07527 [pdf, other]
Title: Security Modelling for Cyber-Physical Systems: A Systematic Literature Review
Comments: Preprint under submission
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2404.07464 [pdf, other]
Title: Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2404.07437 [pdf, other]
Title: Privacy preserving layer partitioning for Deep Neural Network models
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2404.07426 [pdf, other]
Title: RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation
Comments: Accepted to appear for publication in the ISQED 2024 Conference Proceedings (IEEE Xplore)
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2404.07366 [pdf, other]
Title: Differentially Private GANs for Generating Synthetic Indoor Location Data
Comments: Submitted to International Journal of Information Security
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Signal Processing (eess.SP)
[76]  arXiv:2404.07345 [pdf, other]
Title: Indoor Location Fingerprinting Privacy: A Comprehensive Survey
Comments: Submitted to ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[77]  arXiv:2404.07242 [pdf, other]
Title: Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[78]  arXiv:2404.07234 [pdf, other]
Title: Goal-guided Generative Prompt Injection Attack on Large Language Models
Comments: 22 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[79]  arXiv:2404.07765 (cross-list from cs.CL) [pdf, other]
Title: AnnoCTR: A Dataset for Detecting and Linking Entities, Tactics, and Techniques in Cyber Threat Reports
Comments: Accepted at LREC-COLING 2024. Corpus available at this https URL
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[80]  arXiv:2404.07667 (cross-list from cs.CV) [pdf, other]
Title: Dealing with Subject Similarity in Differential Morphing Attack Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[81]  arXiv:2404.07559 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Reinforcement Learning with Self-Play
Comments: 32 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Machine Learning (stat.ML)
[82]  arXiv:2404.07240 (cross-list from math.HO) [pdf, other]
Title: Interactions Between Brauer Configuration Algebras and Classical Cryptanalysis to Analyze Bach's Canons
Comments: 54 pages
Subjects: History and Overview (math.HO); Cryptography and Security (cs.CR)

Thu, 11 Apr 2024

[83]  arXiv:2404.07042 [pdf, ps, other]
Title: Remote Scheduler Contention Attacks
Authors: Stefan Gast, Jonas Juffinger, Lukas Maar, Christoph Royer, Andreas Kogler, Daniel Gruss (Graz University of Technology)
Comments: 22 pages, 6 figures, 3 tables, 2 listings, extended version of the FC 2024 submission which is going to appear in Springer LNCS 14744 or 14745
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2404.07022 [pdf, other]
Title: Non-Degenerate One-Time Pad and the integrity of perfectly secret messages
Authors: Alex Shafarenko
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2404.06819 [pdf, other]
Title: Enc2DB: A Hybrid and Adaptive Encrypted Query Processing Framework
Comments: 33 pages,33 figures, DASAFAA24
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[86]  arXiv:2404.06815 [pdf, ps, other]
Title: Security Assessment of the LG Cryptosystem
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2404.06729 [pdf, other]
Title: SoK: Trusting Self-Sovereign Identity
Comments: Accepted at PETS'24 Issue 3. DOI to be added
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2404.06721 [pdf, other]
Title: Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2404.06686 [pdf, other]
Title: Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy
Journal-ref: AAMAS 2024
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2404.06635 [pdf, other]
Title: Current Affairs: A Measurement Study of Deployment and Security Trends in EV Charging Infrastructure
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2404.06856 (cross-list from cs.SE) [pdf, other]
Title: Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Subjects: Software Engineering (cs.SE); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[92]  arXiv:2404.06737 (cross-list from cs.LG) [pdf, other]
Title: Disguised Copyright Infringement of Latent Diffusion Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[93]  arXiv:2404.06694 (cross-list from cs.LG) [pdf, other]
Title: How to Craft Backdoors with Unlabeled Data Alone?
Comments: Accepted at ICLR 2024 Workshop on Data Problems for Foundation Models (DPFM)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[94]  arXiv:2404.06666 (cross-list from cs.CV) [pdf, other]
Title: SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)

Wed, 10 Apr 2024 (showing first 8 of 17 entries)

[95]  arXiv:2404.06435 [pdf, other]
Title: Software-based Security Framework for Edge and Mobile IoT
Comments: 6 pages and 2 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[96]  arXiv:2404.06236 [pdf, other]
Title: Towards Robust Domain Generation Algorithm Classification
Comments: Accepted at ACM Asia Conference on Computer and Communications Security (ASIA CCS 2024)
Journal-ref: ACM Asia Conference on Computer and Communications Security (ASIA CCS 2024)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2404.06216 [pdf, other]
Title: Privacy-preserving Scanpath Comparison for Pervasive Eye Tracking
Comments: Proc. ACM Hum.-Comput. Interact. 8, ETRA (May 2024)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[98]  arXiv:2404.06127 [pdf, ps, other]
Title: FLEX: FLEXible Federated Learning Framework
Comments: Submitted to Information Fusion
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2404.06094 [pdf, ps, other]
Title: S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2404.06077 [pdf, other]
Title: Is Your AI Truly Yours? Leveraging Blockchain for Copyrights, Provenance, and Lineage
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[101]  arXiv:2404.06031 [pdf, other]
Title: FuSeBMC AI: Acceleration of Hybrid Approach through Machine Learning
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2404.05985 [pdf, ps, other]
Title: Boosting Digital Safeguards: Blending Cryptography and Steganography
Comments: This report pertains to the Capstone Project done by Group 3 of the Fall batch of 2023 students at Praxis Tech School, Kolkata, India. The reports consists of 36 pages and it includes 11 figures and 5 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 111 entries: 1-102 | 103-111 ]
[ showing 102 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)