We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 70

[ total of 126 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-126 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 28 May 2024 (continued, showing 25 of 33 entries)

[71]  arXiv:2405.16719 [pdf, other]
Title: Alistair: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2405.16707 [pdf, other]
Title: Visualizing the Shadows: Unveiling Data Poisoning Behaviors in Federated Learning
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2405.16655 [pdf, ps, other]
Title: Predicting Likely-Vulnerable Code Changes: Machine Learning-based Vulnerability Protections for Android Open Source Project
Authors: Keun Soo Yim
Comments: This is a preprint of an article that has been submitted to a journal for publication
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG); Software Engineering (cs.SE)
[74]  arXiv:2405.16619 [pdf, other]
Title: Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners
Comments: This preprint has not undergone peer review or any post-submission improvements or corrections. The Version of Record of this contribution is accepted to and will be published in "Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2024)", and is available online at TBD
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2405.16539 [pdf, ps, other]
Title: MinRank Gabidulin encryption scheme on matrix codes
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2405.16476 [pdf, other]
Title: KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation
Journal-ref: 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:2405.16421 [pdf, ps, other]
Title: Towards Sustainable IoT: Challenges, Solutions, and Future Directions for Device Longevity
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[78]  arXiv:2405.16372 [pdf, other]
Title: Path-wise Vulnerability Mitigation
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2405.16318 [pdf, other]
Title: Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices
Comments: 12 pages
Journal-ref: International Journal On Advances in Security, vol. 14, no. 1 and 2, pp. 59-70, 2021
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[80]  arXiv:2405.16314 [pdf, other]
Title: Threat Analysis of Industrial Internet of Things Devices
Comments: 7 pages
Journal-ref: Proc of the 11th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2020), Nice, France, Apr 2020, pp. 31-37, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2405.16241 [pdf, other]
Title: FastQuery: Communication-efficient Embedding Table Query for Private LLM Inference
Comments: 6 pages, DAC2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[82]  arXiv:2405.16227 [pdf, ps, other]
Title: SIGNLINE: Digital signature scheme based on linear equations cryptosystem
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Group Theory (math.GR)
[83]  arXiv:2405.16215 [pdf, ps, other]
Title: Individual and Contextual Variables of Cyber Security Behaviour -- An empirical analysis of national culture, industry, organisation, and individual variables of (in)secure human behaviour
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2405.16112 [pdf, other]
Title: Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor
Comments: 13 pages, 5 figures and 5 tables
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[85]  arXiv:2405.15902 [pdf, other]
Title: Hacc-Man: An Arcade Game for Jailbreaking LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC)
[86]  arXiv:2405.17042 (cross-list from cs.LG) [pdf, other]
Title: LabObf: A Label Protection Scheme for Vertical Federated Learning Through Label Obfuscation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[87]  arXiv:2405.16961 (cross-list from eess.IV) [pdf, other]
Title: Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis
Authors: Rony Abecidan (CRIStAL), Vincent Itier (IMT Nord Europe, CRIStAL), Jérémie Boulanger (CRIStAL), Patrick Bas (CRIStAL), Tomáš Pevný (CTU)
Subjects: Image and Video Processing (eess.IV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[88]  arXiv:2405.16784 (cross-list from cs.IT) [pdf, ps, other]
Title: The second-order zero differential uniformity of the swapped inverse functions over finite fields
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[89]  arXiv:2405.16682 (cross-list from cs.LG) [pdf, other]
Title: A Systematic Review of Federated Generative Models
Comments: 24 Pages, 3 Figures, 5 Tables
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[90]  arXiv:2405.16567 (cross-list from cs.AI) [pdf, other]
Title: Automatic Jailbreaking of the Text-to-Image Generative AI Systems
Comments: Under review
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[91]  arXiv:2405.16361 (cross-list from cs.LG) [pdf, other]
Title: LDPKiT: Recovering Utility in LDP Schemes by Training with Noise^2
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[92]  arXiv:2405.16229 (cross-list from cs.CL) [pdf, other]
Title: No Two Devils Alike: Unveiling Distinct Mechanisms of Fine-tuning Attacks
Comments: work in progress
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[93]  arXiv:2405.16036 (cross-list from cs.LG) [pdf, other]
Title: Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[94]  arXiv:2405.15979 (cross-list from cs.LG) [pdf, other]
Title: BadGD: A unified data-centric framework to identify gradient descent vulnerabilities
Comments: 25 pages, 1 figure
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[95]  arXiv:2405.15971 (cross-list from cs.LG) [pdf, other]
Title: Robust width: A lightweight and certifiable adversarial defense
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 126 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-126 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)