We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 112

[ total of 144 entries: 1-112 | 113-144 ]
[ showing 112 entries per page: fewer | more | all ]

Mon, 29 Apr 2024 (continued, showing last 32 of 34 entries)

[113]  arXiv:2404.17225 [pdf, other]
Title: Enhancing Privacy and Security of Autonomous UAV Navigation
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Robotics (cs.RO)
[114]  arXiv:2404.17196 [pdf, other]
Title: Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[115]  arXiv:2404.16894 [pdf, other]
Title: On TinyML and Cybersecurity: Electric Vehicle Charging Infrastructure Use Case
Comments: Submitted to IEEE Access; Code is available at GitHub link: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[116]  arXiv:2404.16891 [pdf, other]
Title: Attacks on Third-Party APIs of Large Language Models
Comments: ICLR 2024 Workshop on Secure and Trustworthy Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY)
[117]  arXiv:2404.16873 [pdf, other]
Title: AdvPrompter: Fast Adaptive Adversarial Prompting for LLMs
Comments: 32 pages, 9 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[118]  arXiv:2404.16872 [pdf, ps, other]
Title: Mitigating Data Sharing in Public Cloud using Blockchain
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2404.16870 [pdf, ps, other]
Title: LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[120]  arXiv:2404.16865 [pdf, other]
Title: Improving Privacy-Preserving Techniques for Smart Grid using Lattice-based Cryptography
Comments: 103 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2404.16860 [pdf, ps, other]
Title: To what extent are multiple pendulum systems viable in pseudo-random number generation?
Authors: Matthew Sigit
Comments: 21 Pages
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2404.16857 [pdf, ps, other]
Title: Implementation of Entropically Secure Encryption: Securing Personal Health Data
Comments: 4 pages
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2404.16856 [pdf, ps, other]
Title: HookChain: A new perspective for Bypassing EDR Solutions
Comments: 46 pages, 22 figures, HookChain, Bypass EDR, Evading EDR, IAT Hook, Halo's Gate
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Operating Systems (cs.OS)
[124]  arXiv:2404.16854 [pdf, other]
Title: Dynamic Vulnerability Criticality Calculator for Industrial Control Systems
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2404.16853 [pdf, other]
Title: Expectation Entropy as a Password Strength Metric
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2404.16851 [pdf, other]
Title: EdgeLeakage: Membership Information Leakage in Distributed Edge Intelligence Systems
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2404.16850 [pdf, other]
Title: Membership Information Leakage in Federated Contrastive Learning
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2404.16849 [pdf, ps, other]
Title: Smart Grids Secured By Dynamic Watermarking: How Secure?
Comments: Accepted for publication in Fluct. Noise Lett
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[129]  arXiv:2404.16848 [pdf, ps, other]
Title: Cyber Security issues and Blockchain-Deep Learning based solutions for UAV and Internet of Drones (FANETs)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[130]  arXiv:2404.16847 [pdf, other]
Title: State-of-the-Art Approaches to Enhancing Privacy Preservation of Machine Learning Datasets: A Survey
Authors: Chaoyu Zhang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[131]  arXiv:2404.16846 [pdf, other]
Title: Securing Bluetooth Low Energy: A Literature Review
Authors: Zhe Wang
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2404.16843 [pdf, other]
Title: Enhancing Data Security through Rainbow Antimagic Graph Coloring for Secret-Share Distribution and Reconstruction
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2404.16842 [pdf, ps, other]
Title: Cybersecurity Threat Analysis And Attack Simulations For Unmanned Aerial Vehicle Networks
Comments: MSc thesis
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2404.16841 [pdf, other]
Title: Machine Unlearning in Large Language Models
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2404.16840 [pdf, ps, other]
Title: Biometrics Employing Neural Network
Authors: Sajjad Bhuiyan
Comments: 14 Pages, 10 figures, Survey Paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[136]  arXiv:2404.16839 [pdf, ps, other]
Title: Immersed in Reality Secured by Design -- A Comprehensive Analysis of Security Measures in AR/VR Environments
Comments: Cybersecurity. Augmented Reality on, Virtual Reality Implementation errors, Data security and efficiency
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[137]  arXiv:2404.16838 [pdf, other]
Title: Predicting SSH keys in Open SSH Memory dumps
Comments: The report contains 148 pages, 22 figures, 17 tables and 34 listings. The GitHub of the project can be accessed here: this https URL This work is part of an ongoing effort for publication
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[138]  arXiv:2404.16837 [pdf, ps, other]
Title: The Security Performance Analysis of Blockchain System Based on Post-Quantum Cryptography -- A Case Study of Cryptocurrency Exchanges
Authors: Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[139]  arXiv:2404.17332 (cross-list from cs.SE) [pdf, other]
Title: Managing Security Evidence in Safety-Critical Organizations
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[140]  arXiv:2404.17142 (cross-list from quant-ph) [pdf, other]
Title: Automated Quantum Circuit Generation for Computing Inverse Hash Functions
Comments: 12 pages, 9 figures, 1 table
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[141]  arXiv:2404.17110 (cross-list from cs.SE) [pdf, other]
Title: Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT
Comments: Accepted in the 4th International Workshop on Software Security co-located with the 28th International Conference on Evaluation and Assessment in Software Engineering (EASE) 2024
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[142]  arXiv:2404.17079 (cross-list from quant-ph) [pdf, other]
Title: Improving device-independent weak coin flipping protocols
Comments: 25 pages, 7 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[143]  arXiv:2404.16967 (cross-list from cs.LG) [pdf, other]
Title: ML2SC: Deploying Machine Learning Models as Smart Contracts on the Blockchain
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[144]  arXiv:2404.16915 (cross-list from cs.SE) [pdf, other]
Title: Servicifying zk-SNARKs Execution for Verifiable Off-chain Computations
Comments: 2 pages, 3 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[ total of 144 entries: 1-112 | 113-144 ]
[ showing 112 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)