We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 98

[ total of 124 entries: 1-100 | 99-124 ]
[ showing 100 entries per page: fewer | more | all ]

Mon, 15 Apr 2024 (continued, showing last 6 of 16 entries)

[99]  arXiv:2404.08144 [pdf, other]
Title: LLM Agents can Autonomously Exploit One-day Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[100]  arXiv:2404.08517 (cross-list from cs.SE) [pdf, other]
Title: Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[101]  arXiv:2404.08273 (cross-list from cs.CV) [pdf, other]
Title: Struggle with Adversarial Defense? Try Diffusion
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[102]  arXiv:2404.08255 (cross-list from cs.CV) [pdf, other]
Title: Practical Region-level Attack against Segment Anything Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[103]  arXiv:2404.08224 (cross-list from cs.LG) [src]
Title: HCL-MTSAD: Hierarchical Contrastive Consistency Learning for Accurate Detection of Industrial Multivariate Time Series Anomalies
Comments: This paper is a manuscript that is still in the process of revision, including Table 1, Figure 2, problem definition in section III.B and method description proposed in section IV. In addition, the submitter has not been authorized by the first author and other co-authors to post the paper to arXiv
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[104]  arXiv:2404.08064 (cross-list from eess.AS) [pdf, ps, other]
Title: The Impact of Speech Anonymization on Pathology and Its Limits
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Fri, 12 Apr 2024

[105]  arXiv:2404.07892 [pdf, other]
Title: A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2404.07878 [pdf, other]
Title: LeapFrog: The Rowhammer Instruction Skip Attack
Comments: Accepted at Hardware.io 2024
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[107]  arXiv:2404.07863 [pdf, other]
Title: Backdoor Contrastive Learning via Bi-level Trigger Optimization
Comments: Accepted by ICLR 2024
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2404.07831 [pdf, ps, other]
Title: Protected QR Code-based Anti-counterfeit System for Pharmaceutical Manufacturing
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2404.07797 [pdf, other]
Title: Illicit Promotion on Twitter
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[110]  arXiv:2404.07675 [pdf, other]
Title: Opportunistic Sensor-Based Multi-Factor Authentication in and for the Internet of Things
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2404.07572 [pdf, other]
Title: Fragile Model Watermark for integrity protection: leveraging boundary volatility and sensitive sample-pairing
Comments: The article has been accepted by IEEE International Conference on Multimedia and Expo 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[112]  arXiv:2404.07557 [pdf, ps, other]
Title: Towards Secure and Reliable Heterogeneous Real-time Telemetry Communication in Autonomous UAV Swarms
Comments: 4 pages, 2 figures, submitted and accepted to iCCC24
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[113]  arXiv:2404.07527 [pdf, other]
Title: Security Modelling for Cyber-Physical Systems: A Systematic Literature Review
Comments: Preprint under submission
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2404.07464 [pdf, other]
Title: Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2404.07437 [pdf, other]
Title: Privacy preserving layer partitioning for Deep Neural Network models
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2404.07426 [pdf, other]
Title: RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation
Comments: Accepted to appear for publication in the ISQED 2024 Conference Proceedings (IEEE Xplore)
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2404.07366 [pdf, other]
Title: Differentially Private GANs for Generating Synthetic Indoor Location Data
Comments: Submitted to International Journal of Information Security
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Signal Processing (eess.SP)
[118]  arXiv:2404.07345 [pdf, other]
Title: Indoor Location Fingerprinting Privacy: A Comprehensive Survey
Comments: Submitted to ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[119]  arXiv:2404.07242 [pdf, other]
Title: Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[120]  arXiv:2404.07234 [pdf, other]
Title: Goal-guided Generative Prompt Injection Attack on Large Language Models
Comments: 22 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[121]  arXiv:2404.07765 (cross-list from cs.CL) [pdf, other]
Title: AnnoCTR: A Dataset for Detecting and Linking Entities, Tactics, and Techniques in Cyber Threat Reports
Comments: Accepted at LREC-COLING 2024. Corpus available at this https URL
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[122]  arXiv:2404.07667 (cross-list from cs.CV) [pdf, other]
Title: Dealing with Subject Similarity in Differential Morphing Attack Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[123]  arXiv:2404.07559 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Reinforcement Learning with Self-Play
Comments: 32 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Machine Learning (stat.ML)
[124]  arXiv:2404.07240 (cross-list from math.HO) [pdf, other]
Title: Interactions Between Brauer Configuration Algebras and Classical Cryptanalysis to Analyze Bach's Canons
Comments: 54 pages
Subjects: History and Overview (math.HO); Cryptography and Security (cs.CR)
[ total of 124 entries: 1-100 | 99-124 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)