We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 97

[ total of 142 entries: 1-10 | ... | 68-77 | 78-87 | 88-97 | 98-107 | 108-117 | 118-127 | 128-137 | 138-142 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 7 May 2024 (continued, showing 10 of 47 entries)

[98]  arXiv:2405.02963 [pdf, ps, other]
Title: Preventive Audits for Data Applications Before Data Sharing in the Power IoT
Comments: 19 pages, 18 figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[99]  arXiv:2405.02875 [pdf, ps, other]
Title: Insights Gained after a Decade of Cellular Automata-based Cryptography
Authors: Luca Mariot
Comments: 20 pages, 2 figures. Invited paper at AUTOMATA 2024
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2405.02826 [pdf, other]
Title: Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2405.02790 [pdf, other]
Title: Confidential and Protected Disease Classifier using Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[102]  arXiv:2405.02696 [pdf, other]
Title: DiffuseTrace: A Transparent and Flexible Watermarking Scheme for Latent Diffusion Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2405.02665 [pdf, ps, other]
Title: Metric Differential Privacy at the User-Level
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2405.02646 [pdf, other]
Title: Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
Comments: 11 pages, 3 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2405.02629 [pdf, other]
Title: SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2405.02615 [pdf, other]
Title: TetraBFT: Reducing Latency of Unauthenticated, Responsive BFT Consensus
Comments: The full version of the PODC 2024 paper
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2405.02548 [pdf, other]
Title: CNN-LSTM and Transfer Learning Models for Malware Classification based on Opcodes and API Calls
Journal-ref: Bensaoud, A., & Kalita, J. (2024). CNN-LSTM and transfer learning models for malware classification based on opcodes and API calls. Knowledge-Based Systems, 111543
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[ total of 142 entries: 1-10 | ... | 68-77 | 78-87 | 88-97 | 98-107 | 108-117 | 118-127 | 128-137 | 138-142 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)