We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 50

[ total of 142 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-142 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 8 May 2024 (continued, showing last 25 of 32 entries)

[51]  arXiv:2405.04198 [pdf, other]
Title: Enhancing Physical Layer Communication Security through Generative AI with Mixture of Experts
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2405.04168 [pdf, other]
Title: Three variations of Heads or Tails Game for Bitcoin
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[53]  arXiv:2405.04152 [pdf, other]
Title: CAKE: Sharing Slices of Confidential Data on Blockchain
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2405.04138 [pdf, ps, other]
Title: GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[55]  arXiv:2405.04115 [pdf, other]
Title: A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
Comments: Accepted to CVPR 2024
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2405.04109 [pdf, other]
Title: The Malware as a Service ecosystem
Comments: To appear in D Gritzalis, KKR Choo, C Patsakis, "Malware - Handbook of Prevention and Detection", Springer (Advances in Information Security)
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2405.04108 [pdf, other]
Title: A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[58]  arXiv:2405.04095 [pdf, other]
Title: Going Proactive and Explanatory Against Malware Concept Drift
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[59]  arXiv:2405.04068 [pdf, other]
Title: An Improved Reversible Data Hiding Algorithm Based on Reconstructed Mapping for PVO-k
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2405.04049 [pdf, other]
Title: Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[61]  arXiv:2405.04046 [pdf, ps, other]
Title: MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2405.04032 [pdf, other]
Title: Locally Differentially Private In-Context Learning
Comments: This paper was published at LREC-Coling 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[63]  arXiv:2405.04029 [pdf, other]
Title: Enabling Privacy-Preserving and Publicly Auditable Federated Learning
Authors: Huang Zeng (1), Anjia Yang (1), Jian Weng (1), Min-Rong Chen (2), Fengjun Xiao (3 and 4), Yi Liu (1), Ye Yao (4)
Comments: ICC 2024 - 2024 IEEE International Conference on Communications Conference Program
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2405.04021 [pdf, other]
Title: Robust and Reusable Fuzzy Extractors for Low-entropy Rate Randomness Sources
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2405.04010 [pdf, other]
Title: Explainability-Informed Targeted Malware Misclassification
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2405.03991 [pdf, other]
Title: Assemblage: Automatic Binary Dataset Construction for Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67]  arXiv:2405.03974 [pdf, other]
Title: TBNet: A Neural Architectural Defense Framework Facilitating DNN Model Protection in Trusted Execution Environments
Journal-ref: DAC2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[68]  arXiv:2405.03891 [pdf, other]
Title: Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[69]  arXiv:2405.03830 [pdf, other]
Title: Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2405.03828 [pdf, ps, other]
Title: The Trajectory of Romance Scams in the U.S
Comments: 6 pages, 3 figures, 12th International Symposium on Digital Forensics and Security
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[71]  arXiv:2405.03775 [pdf, other]
Title: Secure Inference for Vertically Partitioned Data Using Multiparty Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2405.04344 (cross-list from cs.AI) [pdf, other]
Title: Enhancing Scalability of Metric Differential Privacy via Secret Dataset Partitioning and Benders Decomposition
Authors: Chenxi Qiu
Comments: To be published in IJCAI 2024
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[73]  arXiv:2405.04072 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Unpredictability
Comments: 38 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[74]  arXiv:2405.04034 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Post-Processing for Fair Regression
Comments: ICML 2024. Code is at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[75]  arXiv:2312.12105 (cross-list from cs.DC) [pdf, other]
Title: Trusted Execution Environment for Decentralized Process Mining
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[ total of 142 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-142 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)