We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 100

[ total of 142 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-142 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 7 May 2024 (continued, showing last 22 of 47 entries)

[101]  arXiv:2405.02790 [pdf, other]
Title: Confidential and Protected Disease Classifier using Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[102]  arXiv:2405.02696 [pdf, other]
Title: DiffuseTrace: A Transparent and Flexible Watermarking Scheme for Latent Diffusion Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2405.02665 [pdf, ps, other]
Title: Metric Differential Privacy at the User-Level
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2405.02646 [pdf, other]
Title: Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
Comments: 11 pages, 3 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2405.02629 [pdf, other]
Title: SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2405.02615 [pdf, other]
Title: TetraBFT: Reducing Latency of Unauthenticated, Responsive BFT Consensus
Comments: The full version of the PODC 2024 paper
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2405.02548 [pdf, other]
Title: CNN-LSTM and Transfer Learning Models for Malware Classification based on Opcodes and API Calls
Journal-ref: Bensaoud, A., & Kalita, J. (2024). CNN-LSTM and transfer learning models for malware classification based on opcodes and API calls. Knowledge-Based Systems, 111543
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[108]  arXiv:2405.02544 [pdf, ps, other]
Title: A Novel Endorsement Protocol to Secure BFT-Based Consensus in Permissionless Blockchain
Comments: Accepted at IEEE Wireless Communications and Networking Conference (WCNC), 2024
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2405.02499 [pdf, other]
Title: DRAMScope: Uncovering DRAM Microarchitecture and Characteristics by Issuing Memory Commands
Comments: To appear at the 51st IEEE/ACM International Symposium on Computer Architecture (ISCA)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[110]  arXiv:2405.02466 [pdf, ps, other]
Title: ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models
Comments: This is the author's pre-print version of the work. It is posted here for your personal use. Not for redistribution
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[111]  arXiv:2405.02437 [pdf, other]
Title: FastLloyd: Federated, Accurate, Secure, and Tunable $k$-Means Clustering with Differential Privacy
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2405.02435 [pdf, other]
Title: Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia
Comments: Accepted by IEEE/IFIP International Conference on Dependable Systems and Networks, Industry Track, 2024
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[113]  arXiv:2405.02365 [pdf, other]
Title: Adaptive and robust watermark against model extraction attack
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2405.02346 [pdf, other]
Title: Temporal assessment of malicious behaviors: application to turnout field data monitoring
Comments: To be published in the International Conference on Control, Automation and Diagnosis (ICCAD24)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[115]  arXiv:2405.02344 [pdf, other]
Title: Backdoor-based Explainable AI Benchmark for High Fidelity Evaluation of Attribution Methods
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[116]  arXiv:2405.02341 [pdf, other]
Title: Improved Communication-Privacy Trade-offs in $L_2$ Mean Estimation under Streaming Differential Privacy
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117]  arXiv:2405.02302 [pdf, other]
Title: The Democratization of Wealth Management: Hedged Mutual Fund Blockchain Protocol
Authors: Ravi Kashyap
Subjects: Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); Portfolio Management (q-fin.PM); Risk Management (q-fin.RM); Trading and Market Microstructure (q-fin.TR)
[118]  arXiv:2405.03316 (cross-list from cs.LG) [pdf, other]
Title: Provably Unlearnable Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[119]  arXiv:2405.03183 (cross-list from cs.DC) [pdf, other]
Title: Impact of EIP-4844 on Ethereum: Consensus Security, Ethereum Usage, Rollup Transaction Dynamics, and Blob Gas Fee Markets
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[120]  arXiv:2405.03064 (cross-list from cs.LG) [pdf, other]
Title: RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation
Comments: Accepted by ICML 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[121]  arXiv:2405.02476 (cross-list from cs.ET) [pdf, other]
Title: SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[122]  arXiv:2405.02431 (cross-list from cs.DC) [pdf, other]
Title: Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles
Comments: 14 pages, 8 figures, Accepted to DSN 2024
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Mon, 6 May 2024 (showing first 3 of 20 entries)

[123]  arXiv:2405.02238 [pdf, other]
Title: Secure and Efficient General Matrix Multiplication On Cloud Using Homomorphic Encryption
Comments: 10 pages, 7 figures. 4 tables
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2405.02147 [pdf, other]
Title: Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network
Comments: 16 pages, 7 figures, to appear at ACM CCS 2024
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2405.02106 [pdf, ps, other]
Title: Got Root? A Linux Priv-Esc Benchmark
Comments: arXiv admin note: text overlap with arXiv:2310.11409
Subjects: Cryptography and Security (cs.CR)
[ total of 142 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-142 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)