We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 15

[ total of 122 entries: 1-100 | 16-115 | 116-122 ]
[ showing 100 entries per page: fewer | more | all ]

Tue, 23 Apr 2024 (continued, showing last 19 of 34 entries)

[16]  arXiv:2404.13402 [pdf, other]
Title: Intrusion Detection at Scale with the Assistance of a Command-line Language Model
Comments: Accepted by IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), industry track
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[17]  arXiv:2404.13337 [pdf, other]
Title: Fuzzychain: An Equitable Consensus Mechanism for Blockchain Networks
Comments: 16 pages, 13 figures, 2 tables, this article was submitted to a JCR journal
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Logic in Computer Science (cs.LO)
[18]  arXiv:2404.13279 [pdf, other]
Title: Backdoor Attacks and Defenses on Semantic-Symbol Reconstruction in Semantic Communications
Comments: This paper has been accepted by IEEE ICC 2024
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV); Signal Processing (eess.SP)
[19]  arXiv:2404.13220 [pdf, ps, other]
Title: Security and Privacy Product Inclusion
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2404.13208 [pdf, other]
Title: The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[21]  arXiv:2404.13161 [pdf, other]
Title: CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2404.13146 [pdf, other]
Title: DeepFake-O-Meter v2.0: An Open Platform for DeepFake Detection
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[23]  arXiv:2404.13125 [pdf, other]
Title: Towards Robust Real-Time Hardware-based Mobile Malware Detection using Multiple Instance Learning Formulation
Comments: Under peer review
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2404.14389 (cross-list from cs.NI) [pdf, other]
Title: Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction
Comments: Accepted by IFIP/IEEE Networking 2024
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2404.14190 (cross-list from cs.NI) [pdf, other]
Title: Dismantling Common Internet Services for Ad-Malware Detection
Comments: 4 pages, 4 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[26]  arXiv:2404.14074 (cross-list from cs.DC) [pdf, other]
Title: Towards Proxy Staking Accounts Based on NFTs in Ethereum
Comments: To be presented at IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2024
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[27]  arXiv:2404.13968 (cross-list from cs.CL) [pdf, other]
Title: Protecting Your LLMs with Information Bottleneck
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[28]  arXiv:2404.13914 (cross-list from cs.SD) [pdf, other]
Title: Audio Anti-Spoofing Detection: A Survey
Comments: submitted to ACM Computing Surveys
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Multimedia (cs.MM); Audio and Speech Processing (eess.AS)
[29]  arXiv:2404.13860 (cross-list from cs.LG) [pdf, other]
Title: Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[30]  arXiv:2404.13752 (cross-list from cs.LG) [pdf, other]
Title: Towards General Conceptual Model Editing via Adversarial Representation Engineering
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[31]  arXiv:2404.13699 (cross-list from quant-ph) [pdf, ps, other]
Title: Exponential Quantum One-Wayness and EFI Pairs
Comments: 15 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[32]  arXiv:2404.13475 (cross-list from quant-ph) [pdf, other]
Title: PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud
Subjects: Quantum Physics (quant-ph); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[33]  arXiv:2404.13381 (cross-list from cs.LG) [pdf, other]
Title: DNA: Differentially private Neural Augmentation for contact tracing
Comments: Privacy Regulation and Protection in Machine Learning Workshop at ICLR 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Populations and Evolution (q-bio.PE)
[34]  arXiv:2404.13164 (cross-list from stat.CO) [pdf, other]
Title: Full-Information Estimation For Hierarchical Data
Subjects: Computation (stat.CO); Cryptography and Security (cs.CR)

Mon, 22 Apr 2024

[35]  arXiv:2404.12991 [pdf, other]
Title: RedactBuster: Entity Type Recognition from Redacted Documents
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2404.12916 [pdf, other]
Title: Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2404.12893 [pdf, other]
Title: The Power of Words: Generating PowerShell Attacks from Natural Language
Comments: 18th USENIX WOOT Conference on Offensive Technologies, GitHub Repo: this https URL
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[38]  arXiv:2404.12864 [pdf, other]
Title: Nyon Unchained: Forensic Analysis of Bosch's eBike Board Computers
Comments: In: Proceedings of the Digital Forensics Research Conference EU (DFRWS EU). 2024
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2404.12855 [pdf, ps, other]
Title: Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2404.12854 [pdf, other]
Title: Migrating Software Systems towards Post-Quantum-Cryptography -- A Systematic Literature Review
Comments: 2 figures, 12 tables, 22 pages
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2404.12852 [pdf, other]
Title: LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[42]  arXiv:2404.12837 [pdf, other]
Title: Towards a decentralized data privacy protocol for self-sovereignty in the digital world
Comments: To appear in the proceedings of RCIS 2024
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[43]  arXiv:2404.12808 [pdf, other]
Title: Systematic Evaluation of Forensic Data Acquisition using Smartphone Local Backup
Comments: In: Proceedings of the Digital Forensics Research Conference USA (DFRWS USA). 2023
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2404.12783 [pdf, other]
Title: A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2404.12778 [pdf, other]
Title: Defending against Data Poisoning Attacks in Federated Learning via User Elimination
Authors: Nick Galanis
Comments: To be submitted in AISEC 2024
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2404.12675 [pdf, other]
Title: ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2
Comments: 19 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2404.12512 [pdf, other]
Title: Proteus: Preserving Model Confidentiality during Graph Optimizations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2404.12473 [pdf, other]
Title: Explainable Deep Learning Models for Dynamic and Online Malware Classification
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2404.12465 [pdf, other]
Title: Toward a Quantum Information System Cybersecurity Taxonomy and Testbed: Exploiting a Unique Opportunity for Early Impact
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2404.12983 (cross-list from cs.MA) [pdf, other]
Title: Private Agent-Based Modeling
Comments: Accepted at the 23rd International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2024)
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[51]  arXiv:2404.12874 (cross-list from eess.SP) [pdf, ps, other]
Title: Physical Layer Authentication Using Information Reconciliation
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[52]  arXiv:2404.12738 (cross-list from cs.NI) [pdf, other]
Title: DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches
Comments: Submitted to IEEE/ACM Transactions on Networking (ToN)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[53]  arXiv:2404.12730 (cross-list from cs.CV) [pdf, other]
Title: PATE-TripleGAN: Privacy-Preserving Image Synthesis with Gaussian Differential Privacy
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54]  arXiv:2404.12680 (cross-list from cs.CV) [pdf, other]
Title: VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection
Comments: Accepted in 2024 18th International Conference on Automatic Face and Gesture Recognition (FG)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[55]  arXiv:2404.12679 (cross-list from cs.CV) [pdf, other]
Title: MLSD-GAN -- Generating Strong High Quality Face Morphing Attacks using Latent Semantic Disentanglement
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[56]  arXiv:2404.12666 (cross-list from cs.DC) [pdf, other]
Title: A Survey on Federated Analytics: Taxonomy, Enabling Techniques, Applications and Open Issues
Comments: This survey has been submitted to IEEE Communications Surveys & Tutorials
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[57]  arXiv:2404.12657 (cross-list from stat.AP) [pdf, other]
Title: Proposer selection in EIP-7251
Comments: 15 pages
Subjects: Applications (stat.AP); Cryptography and Security (cs.CR)
[58]  arXiv:2404.12647 (cross-list from quant-ph) [pdf, ps, other]
Title: Simple constructions of linear-depth t-designs and pseudorandom unitaries
Comments: Supersedes arXiv:2402.14803. In addition to the PRU result from arXiv:2402.14803, this paper contains new results on t-designs and adaptive pseudorandom isometries, and presents a unified construction of these different primitives
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[59]  arXiv:2404.12635 (cross-list from cs.CV) [pdf, other]
Title: AED-PADA:Improving Generalizability of Adversarial Example Detection via Principal Adversarial Domain Adaptation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2404.12623 (cross-list from cs.LG) [pdf, other]
Title: End-to-End Verifiable Decentralized Federated Learning
Comments: 9 pages, 5 figures, This article has been accepted for presentation at the IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2024)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[61]  arXiv:2404.12530 (cross-list from cs.LG) [pdf, other]
Title: TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents
Comments: 22 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[62]  arXiv:2404.12507 (cross-list from quant-ph) [pdf, other]
Title: Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform
Comments: 9 pages, 5 figures, 1 table, submitted to 2024 IEEE International Conference on Quantum Computing & Engineering (QCE24)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Fri, 19 Apr 2024

[63]  arXiv:2404.12300 [pdf, ps, other]
Title: Proactive Software Supply Chain Risk Management Framework (P-SSCRM) Version 1
Authors: Laurie Williams (North Carolina State University), Sammy Migues (Imbricate Security), Jamie Boote (Synopsys), Ben Hutchison (Synopsys)
Comments: 17 pages, 3 figures, 2 tables, will not be submitted to a conference
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2404.12208 [pdf, ps, other]
Title: The Explicit values of the UBCT, the LBCT and the DBCT of the inverse function
Comments: This manuscript was submitted to Finite Fields and Their Application on April 8, 2024. arXiv admin note: text overlap with arXiv:2309.01881
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[65]  arXiv:2404.12093 [pdf, ps, other]
Title: Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2404.12043 [pdf, other]
Title: Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report
Comments: 7 pages, 1 figure, to be published at ACM conference on Innovation and Technology in Computer Science Education (ITiCSE 2024)
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2404.12011 [pdf, other]
Title: Pseudo-random generators using linear feedback shift registers with output extraction
Authors: Holger Nobach
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2404.11977 [pdf, other]
Title: Corpus Christi: Establishing Replicability when Sharing the Bread is Not Allowed
Comments: Preprint of Submitted Paper
Subjects: Cryptography and Security (cs.CR); Digital Libraries (cs.DL)
[69]  arXiv:2404.11815 [pdf, other]
Title: AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2404.12369 (cross-list from cs.LG) [pdf, other]
Title: KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[71]  arXiv:2404.12186 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving UCB Decision Process Verification via zk-SNARKs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[72]  arXiv:2404.12135 (cross-list from cs.MA) [pdf, other]
Title: mABC: multi-Agent Blockchain-Inspired Collaboration for root cause analysis in micro-services architecture
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[73]  arXiv:2404.12125 (cross-list from cs.CY) [pdf, other]
Title: Intelligence Education made in Europe
Comments: 16 pages, 2 figures. No potential conflict of interest was reported by the authors
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[74]  arXiv:2404.12086 (cross-list from cs.CY) [pdf, other]
Title: Preserving Nature's Ledger: Blockchains in Biodiversity Conservation
Subjects: Computers and Society (cs.CY); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Emerging Technologies (cs.ET)
[75]  arXiv:2404.12075 (cross-list from cs.HC) [pdf, other]
Title: E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting
Comments: 23 pages, 2024 IEEE Symposium on Security and Privacy
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[76]  arXiv:2404.12014 (cross-list from cs.CL) [pdf, other]
Title: Enhance Robustness of Language Models Against Variation Attack through Graph Integration
Comments: 12 pages, 4 figures, accepted by COLING 2024
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[77]  arXiv:2404.11962 (cross-list from cs.AI) [pdf, other]
Title: ©Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model
Comments: 20 pages, 6 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[78]  arXiv:2404.11905 (cross-list from cs.LG) [pdf, other]
Title: FedMID: A Data-Free Method for Using Intermediate Outputs as a Defense Mechanism Against Poisoning Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[79]  arXiv:2404.11763 (cross-list from cs.SE) [pdf, other]
Title: The Code the World Depends On: A First Look at Technology Makers' Open Source Software Dependencies
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[80]  arXiv:2404.11665 (cross-list from cs.LG) [pdf, other]
Title: Exploring DNN Robustness Against Adversarial Attacks Using Approximate Multipliers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Thu, 18 Apr 2024

[81]  arXiv:2404.11473 [pdf, ps, other]
Title: Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[82]  arXiv:2404.11410 [pdf, other]
Title: SERENE: A Collusion Resilient Replication-based Verification Framework
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[83]  arXiv:2404.11388 [pdf, ps, other]
Title: Enhancing Data Privacy In Wireless Sensor Networks: Investigating Techniques And Protocols To Protect Privacy Of Data Transmitted Over Wireless Sensor Networks In Critical Applications Of Healthcare And National Security
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[84]  arXiv:2404.11372 [pdf, other]
Title: S3PHER: Secure and Searchable System for Patient-driven HEalth data shaRing
Comments: 20 pages, 1 figure, 2 tables in the appendix
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2404.11338 [pdf, other]
Title: LLMs for Cyber Security: New Opportunities
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[86]  arXiv:2404.11325 [pdf, ps, other]
Title: On Learning Parities with Dependent Noise
Comments: This note draws heavily from arXiv:2404.03774
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[87]  arXiv:2404.11284 [pdf, other]
Title: Amplifying Main Memory-Based Timing Covert and Side Channels using Processing-in-Memory Operations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[88]  arXiv:2404.11281 [pdf, other]
Title: SoK: Decentralized Finance (DeFi) -- Fundamentals, Taxonomy and Risks
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2404.11189 [pdf, other]
Title: The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on Rollup Performance and Cost Efficiency
Comments: Work in progress, exploring zkSync Era. More EVM chains will be added in the final version
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2404.11121 [pdf, other]
Title: TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment
Comments: arXiv admin note: text overlap with arXiv:2310.07152 by other authors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[91]  arXiv:2404.11107 [pdf, other]
Title: KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[92]  arXiv:2404.10800 [pdf, other]
Title: Advancing Network Intrusion Detection: Integrating Graph Neural Networks with Scattering Transform and Node2Vec for Enhanced Anomaly Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[93]  arXiv:2404.10796 [pdf, ps, other]
Title: Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective
Comments: Submitted to Computer & Security (Elsevier)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2404.10792 [pdf, other]
Title: Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach
Comments: 15 pages, 4 figures, conference (ARC24)
Journal-ref: Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2024. Lecture Notes in Computer Science, vol 14553. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[95]  arXiv:2404.10790 [pdf, other]
Title: Multimodal Attack Detection for Action Recognition Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[96]  arXiv:2404.10789 [pdf, other]
Title: PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Comments: 9th IEEE European Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[97]  arXiv:2404.10788 [pdf, other]
Title: The Path To Autonomous Cyber Defense
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[98]  arXiv:2404.10782 [pdf, ps, other]
Title: Quantifying AI Vulnerabilities: A Synthesis of Complexity, Dynamical Systems, and Game Theory
Authors: B Kereopa-Yorke
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2404.10781 [pdf, ps, other]
Title: Authenticity in Authorship: The Writer's Integrity Framework for Verifying Human-Generated Text
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2404.10780 [pdf, ps, other]
Title: Phishing Website Detection Using a Combined Model of ANN and LSTM
Comments: Pages 9, Figures 5
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[101]  arXiv:2404.11467 (cross-list from cs.SE) [pdf, other]
Title: A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[102]  arXiv:2404.11450 (cross-list from cs.DB) [pdf, other]
Title: Real-Time Trajectory Synthesis with Local Differential Privacy
Comments: Accepted by ICDE 2024. Code is available at: this https URL
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[103]  arXiv:2404.11056 (cross-list from cs.LG) [pdf, other]
Title: LMEraser: Large Model Unlearning through Adaptive Prompt Tuning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[104]  arXiv:2404.10995 (cross-list from math.OC) [pdf, other]
Title: Clipped SGD Algorithms for Privacy Preserving Performative Prediction: Bias Amplification and Remedies
Comments: 22 pages, 11 figures
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[105]  arXiv:2404.10988 (cross-list from cs.CY) [pdf, other]
Title: From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises
Comments: Published in ACM ITiCSE 2024 conference proceedings, see this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[106]  arXiv:2404.10957 (cross-list from cs.LG) [pdf, other]
Title: Personalized Federated Learning via Stacking
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 17 Apr 2024 (showing first 9 of 16 entries)

[107]  arXiv:2404.10764 [pdf, other]
Title: Confidential Federated Computations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[108]  arXiv:2404.10715 [pdf, other]
Title: Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[109]  arXiv:2404.10659 [pdf, other]
Title: Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2404.10610 [pdf, other]
Title: Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2404.10602 [pdf, other]
Title: Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design
Comments: This paper has been accepted for publication by the 33rd International Symposium on High-Performance Parallel and Distributed Computing (HPDC) 2024. The copyright is with the ACM and the final version will be published by the ACM
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[112]  arXiv:2404.10543 [pdf, other]
Title: Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2404.10491 [pdf, other]
Title: BoLD: Fast and Cheap Dispute Resolution
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[114]  arXiv:2404.10404 [pdf, other]
Title: Sisu: Decentralized Trustless Bridge For Full Ethereum Node
Authors: Billy Pham, Huy Le
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2404.10187 [pdf, other]
Title: SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Comments: 20 pages, 1 figure, 8 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[ total of 122 entries: 1-100 | 16-115 | 116-122 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)