We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 29

[ total of 122 entries: 1-25 | 5-29 | 30-54 | 55-79 | 80-104 | 105-122 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 18 Apr 2024 (continued, showing last 15 of 26 entries)

[30]  arXiv:2404.10800 [pdf, other]
Title: Advancing Network Intrusion Detection: Integrating Graph Neural Networks with Scattering Transform and Node2Vec for Enhanced Anomaly Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[31]  arXiv:2404.10796 [pdf, ps, other]
Title: Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective
Comments: Submitted to Computer & Security (Elsevier)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[32]  arXiv:2404.10792 [pdf, other]
Title: Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach
Comments: 15 pages, 4 figures, conference (ARC24)
Journal-ref: Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2024. Lecture Notes in Computer Science, vol 14553. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[33]  arXiv:2404.10790 [pdf, other]
Title: Multimodal Attack Detection for Action Recognition Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[34]  arXiv:2404.10789 [pdf, other]
Title: PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Comments: 9th IEEE European Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[35]  arXiv:2404.10788 [pdf, other]
Title: The Path To Autonomous Cyber Defense
Comments: 9 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[36]  arXiv:2404.10782 [pdf, ps, other]
Title: Quantifying AI Vulnerabilities: A Synthesis of Complexity, Dynamical Systems, and Game Theory
Authors: B Kereopa-Yorke
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2404.10781 [pdf, ps, other]
Title: Authenticity in Authorship: The Writer's Integrity Framework for Verifying Human-Generated Text
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2404.10780 [pdf, ps, other]
Title: Phishing Website Detection Using a Combined Model of ANN and LSTM
Comments: Pages 9, Figures 5
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[39]  arXiv:2404.11467 (cross-list from cs.SE) [pdf, other]
Title: A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[40]  arXiv:2404.11450 (cross-list from cs.DB) [pdf, other]
Title: Real-Time Trajectory Synthesis with Local Differential Privacy
Comments: Accepted by ICDE 2024. Code is available at: this https URL
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[41]  arXiv:2404.11056 (cross-list from cs.LG) [pdf, other]
Title: LMEraser: Large Model Unlearning through Adaptive Prompt Tuning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[42]  arXiv:2404.10995 (cross-list from math.OC) [pdf, other]
Title: Clipped SGD Algorithms for Privacy Preserving Performative Prediction: Bias Amplification and Remedies
Comments: 22 pages, 11 figures
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43]  arXiv:2404.10988 (cross-list from cs.CY) [pdf, other]
Title: From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises
Comments: Published in ACM ITiCSE 2024 conference proceedings, see this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[44]  arXiv:2404.10957 (cross-list from cs.LG) [pdf, other]
Title: Personalized Federated Learning via Stacking
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 17 Apr 2024 (showing first 10 of 16 entries)

[45]  arXiv:2404.10764 [pdf, other]
Title: Confidential Federated Computations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2404.10715 [pdf, other]
Title: Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2404.10659 [pdf, other]
Title: Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2404.10610 [pdf, other]
Title: Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2404.10602 [pdf, other]
Title: Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design
Comments: This paper has been accepted for publication by the 33rd International Symposium on High-Performance Parallel and Distributed Computing (HPDC) 2024. The copyright is with the ACM and the final version will be published by the ACM
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[50]  arXiv:2404.10543 [pdf, other]
Title: Characterizing Polkadot's Transactions Ecosystem: methodology, tools, and insights
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2404.10491 [pdf, other]
Title: BoLD: Fast and Cheap Dispute Resolution
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[52]  arXiv:2404.10404 [pdf, other]
Title: Sisu: Decentralized Trustless Bridge For Full Ethereum Node
Authors: Billy Pham, Huy Le
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2404.10187 [pdf, other]
Title: SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Comments: 20 pages, 1 figure, 8 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[54]  arXiv:2404.10092 [pdf, other]
Title: Integration of Federated Learning and Blockchain in Healthcare: A Tutorial
Subjects: Cryptography and Security (cs.CR)
[ total of 122 entries: 1-25 | 5-29 | 30-54 | 55-79 | 80-104 | 105-122 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)