We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 106 entries: 1-106 ]
[ showing up to 130 entries per page: fewer | more ]

Fri, 17 May 2024

[1]  arXiv:2405.10131 [pdf, other]
Title: Trusting the Cloud-Native Edge: Remotely Attested Kubernetes Workers
Comments: Pre-print of article accepted to IEEE ICCCN 2024
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2405.10051 [pdf, other]
Title: MarkLLM: An Open-Source Toolkit for LLM Watermarking
Comments: 16 pages, 5 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[3]  arXiv:2405.09916 [pdf, other]
Title: DIMSIM -- Device Integrity Monitoring through iSIM Applets and Distributed Ledger Technology
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2405.09757 [pdf, other]
Title: Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
Comments: Under review
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2405.09721 [pdf, other]
Title: DP-RuL: Differentially-Private Rule Learning for Clinical Decision Support Systems
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2405.09662 [pdf, ps, other]
Title: Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[7]  arXiv:2405.10274 (cross-list from quant-ph) [pdf, other]
Title: Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[8]  arXiv:2405.10220 (cross-list from cs.SE) [pdf, other]
Title: SoK: Prudent Evaluation Practices for Fuzzing
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[9]  arXiv:2405.10096 (cross-list from cs.LG) [pdf, other]
Title: The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective
Comments: 6 pages, 5 figures, submitted to 2024 IEEE MeditCom
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[10]  arXiv:2405.09902 (cross-list from cs.CV) [pdf, other]
Title: Unveiling the Potential: Harnessing Deep Metric Learning to Circumvent Video Streaming Encryption
Comments: Published in the WI-IAT 2023 proceedings
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[11]  arXiv:2405.09805 (cross-list from cs.CL) [pdf, other]
Title: SecureLLM: Using Compositionality to Build Provably Secure Language Models for Private, Sensitive, and Secret Data
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[12]  arXiv:2405.09786 (cross-list from cs.LG) [pdf, other]
Title: IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency
Comments: Accepted to ICML 2024, 29 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[13]  arXiv:2405.09550 (cross-list from cs.CV) [pdf, other]
Title: Mask-based Invisible Backdoor Attacks on Object Detection
Authors: Shin Jeong Jin
Comments: 7 pages, 3 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Thu, 16 May 2024

[14]  arXiv:2405.09465 [pdf, other]
Title: Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2405.09412 [pdf, other]
Title: Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis
Comments: 5 pages
Journal-ref: Proc of the 15th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2024), Venice, Italy, May 2024, pp. 8-12, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[16]  arXiv:2405.09318 [pdf, other]
Title: Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls
Comments: Submitted to IEEE MILCOM 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17]  arXiv:2405.09230 [pdf, ps, other]
Title: Reduce to the MACs -- Privacy Friendly Generic Probe Requests
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[18]  arXiv:2405.09205 [pdf, other]
Title: A first look into Utiq: Next-generation cookies at the ISP level
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[19]  arXiv:2405.09191 [pdf, other]
Title: QMedShield: A Novel Quantum Chaos-based Image Encryption Scheme for Secure Medical Image Storage in the Cloud
Comments: 20 pages, 17 Figures, 9 Tables
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[20]  arXiv:2405.09090 [pdf, other]
Title: Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2405.09084 [pdf, ps, other]
Title: Temporarily Restricting Solidity Smart Contract Interactions
Comments: submitted to DAPPS 2024. 11 pages, 5 Figures
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2405.09470 (cross-list from cs.SD) [pdf, other]
Title: Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer
Comments: Accepted to SecTL (AsiaCCS Workshop) 2024
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[23]  arXiv:2405.09398 (cross-list from cs.DC) [pdf, ps, other]
Title: Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure
Comments: 7 pages, for associated implementation etc., see this https URL
Journal-ref: Proc of the 14th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2023), Nice, France, June 2023, pp. 1-7, ISSN 2308-4294
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[24]  arXiv:2405.09306 (cross-list from cs.IR) [pdf, other]
Title: Words Blending Boxes. Obfuscating Queries in Information Retrieval using Differential Privacy
Comments: Preprint submitted to Information Science journal
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[25]  arXiv:2405.09264 (cross-list from cs.NI) [pdf, other]
Title: A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights
Comments: Presented at the 2024 IFIP Networking Conference (IFIP Networking)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[26]  arXiv:2405.09176 (cross-list from cs.LG) [pdf, other]
Title: Cross-Input Certified Training for Universal Perturbations
Comments: 21 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[27]  arXiv:2405.08962 (cross-list from quant-ph) [pdf, other]
Title: Understanding Side-Channel Vulnerabilities in Superconducting Qubit Readout Architectures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[28]  arXiv:2405.08920 (cross-list from cs.LG) [pdf, other]
Title: Neural Collapse Meets Differential Privacy: Curious Behaviors of NoisyGD with Near-perfect Representation Learning
Comments: To appear in ICML 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[29]  arXiv:2405.08834 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Machine Learning Threats to Spacecraft
Comments: Preprint
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 15 May 2024

[30]  arXiv:2405.08762 [pdf, other]
Title: S3C2 Summit 2024-03: Industry Secure Supply Chain Summit
Comments: This is our WIP paper on the Summit. More versions will be released soon
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2405.08755 [pdf, other]
Title: Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[32]  arXiv:2405.08539 [pdf, other]
Title: SecScore: Enhancing the CVSS Threat Metric Group with Empirical Evidences
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2405.08479 [pdf, other]
Title: A Survey on Complexity Measures of Pseudo-Random Sequences
Authors: Chunlei Li
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2405.08466 [pdf, ps, other]
Title: Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?
Comments: Accepted at ACSW 2024
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2405.08395 [pdf, other]
Title: Cross-Blockchain Communication Using Oracles With an Off-Chain Aggregation Mechanism Based on zk-SNARKs
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[36]  arXiv:2405.08363 [pdf, other]
Title: UnMarker: A Universal Attack on Defensive Watermarking
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[37]  arXiv:2405.08359 [pdf, other]
Title: GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles
Comments: Article under review at IEEE Transactions on Dependable and Secure Computing. For associated AV-GPS-Dataset, see this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[38]  arXiv:2405.08356 [pdf, other]
Title: A Model-oriented Reasoning Framework for Privacy Analysis of Complex Systems
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2405.08340 [pdf, other]
Title: Achieving Resolution-Agnostic DNN-based Image Watermarking:A Novel Perspective of Implicit Neural Representation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[40]  arXiv:2405.08305 [pdf, other]
Title: Collateral Portfolio Optimization in Crypto-Backed Stablecoins
Comments: Accepted for presentation at MARBLE 2024
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2405.08299 [pdf, other]
Title: Differentially Private Federated Learning: A Systematic Review
Comments: 37pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[42]  arXiv:2405.08278 [pdf, other]
Title: Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection
Comments: Under review
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[43]  arXiv:2405.08268 [pdf, other]
Title: T-Watch: Towards Timed Execution of Private Transaction in Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[44]  arXiv:2405.08117 [pdf, ps, other]
Title: Secret Sharing with Certified Deletion
Comments: To appear at CRYPTO 2024
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2405.08102 [pdf, other]
Title: Evaluating Google's Protected Audience Protocol
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2405.08084 [pdf, ps, other]
Title: PrivFED -- A Framework for Privacy-Preserving Federated Learning in Enhanced Breast Cancer Diagnosis
Comments: Presented in ICIITB 2024 organized by Modern College of Business and Science, Oman
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2405.08043 [pdf, other]
Title: HRNet: Differentially Private Hierarchical and Multi-Resolution Network for Human Mobility Data Synthesization
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2405.08025 [pdf, ps, other]
Title: A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[49]  arXiv:2405.08741 (cross-list from cs.DM) [pdf, ps, other]
Title: On Maximal Families of Binary Polynomials with Pairwise Linear Common Factors
Comments: 5 pages. Extended abstract submitted to BFA 2024
Subjects: Discrete Mathematics (cs.DM); Cryptography and Security (cs.CR); Combinatorics (math.CO)
[50]  arXiv:2405.08698 (cross-list from cs.IT) [pdf, other]
Title: Byzantine-Resilient Secure Aggregation for Federated Learning Without Privacy Compromises
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[51]  arXiv:2405.08577 (cross-list from cs.NI) [pdf, other]
Title: Intelligent Control in 6G Open RAN: Security Risk or Opportunity?
Comments: 36 pages, 14 figures, IEEE COMST (in review)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Performance (cs.PF); Systems and Control (eess.SY)
[52]  arXiv:2405.08487 (cross-list from cs.CV) [pdf, other]
Title: Semantic Contextualization of Face Forgery: A New Definition, Dataset, and Detection Method
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)

Tue, 14 May 2024

[53]  arXiv:2405.07941 [pdf, ps, other]
Title: Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2405.07848 [pdf, other]
Title: Positional-Unigram Byte Models for Generalized TLS Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2405.07667 [pdf, other]
Title: Backdoor Removal for Generative Large Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[56]  arXiv:2405.07611 [pdf, other]
Title: Uncovering GNSS Interference with Aerial Mapping UAV
Comments: In proceedings of the 2024 IEEE Aerospace Conference (AeroConf)
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2405.07533 [pdf, other]
Title: DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[58]  arXiv:2405.07496 [pdf, other]
Title: Oedipus: LLM-enchanced Reasoning CAPTCHA Solver
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2405.07419 [pdf, other]
Title: Indoor and Outdoor Crowd Density Level Estimation with Video Analysis through Machine Learning Models
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2405.07406 [pdf, other]
Title: Machine Unlearning: A Comprehensive Survey
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2405.07358 [pdf, ps, other]
Title: A Value Driven Framework for Cybersecurity Innovation in Transportation & Infrastructure
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2405.07232 [pdf, other]
Title: A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2405.07213 [pdf, other]
Title: Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[64]  arXiv:2405.07172 [pdf, other]
Title: Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2405.07145 [pdf, other]
Title: Stable Signature is Unstable: Removing Image Watermark from Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[66]  arXiv:2405.07094 [pdf, ps, other]
Title: The Road to Compliance: Executive Federal Agencies and the NIST Risk Management Framework
Authors: Michael Stoltz
Comments: This research paper was showcased at the University of West Florida Student Scholars Symposium and Faculty Research Showcase on April 18, 2024. It is supported by the National Science Foundation (NSF) under Grant No. 1946442. The views, findings, and conclusions presented are solely those of the author(s) and do not necessarily represent the views of the NSF
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2405.07054 [pdf, ps, other]
Title: LUCID: A Framework for Reducing False Positives and Inconsistencies Among Container Scanning Tools
Comments: 13 pages, 15 figures, 8 tables
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2405.07018 [pdf, other]
Title: Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought
Comments: This paper has been accepted by IJCAI-24
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2405.07007 [pdf, ps, other]
Title: A New Algorithm for Computing Branch Number of Non-Singular Matrices over Finite Fields
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2405.07004 [pdf, other]
Title: Stealthy Imitation: Reward-guided Environment-free Policy Stealing
Comments: Accepted at ICML 2024. Project page: this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2405.06842 [pdf, other]
Title: BitVMX: A CPU for Universal Computation on Bitcoin
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72]  arXiv:2405.06830 [pdf, other]
Title: Towards Browser Controls to Protect Cookies from Malicious Extensions
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2405.06823 [pdf, other]
Title: PLeak: Prompt Leaking Attacks against Large Language Model Applications
Comments: To appear in the Proceedings of The ACM Conference on Computer and Communications Security (CCS), 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[74]  arXiv:2405.06772 [pdf, other]
Title: CANAL -- Cyber Activity News Alerting Language Model: Empirical Approach vs. Expensive LLM
Comments: Published in 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), Conference Date: 07-09 February 2024
Journal-ref: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), Houston, TX, USA, 2024, pp. 1-12
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[75]  arXiv:2405.07803 (cross-list from cs.IT) [pdf, other]
Title: Decoding Geometric Properties in Non-Random Data from First Information-Theoretic Principles
Comments: arXiv admin note: substantial text overlap with arXiv:2303.16045. substantial text overlap with arXiv:2303.16045
Subjects: Information Theory (cs.IT); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Statistics Theory (math.ST)
[76]  arXiv:2405.07668 (cross-list from cs.SE) [pdf, other]
Title: CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models
Comments: 23 pages, 2 figures, accepted by FSE 2024 (The ACM International Conference on the Foundations of Software Engineering)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[77]  arXiv:2405.07638 (cross-list from cs.NI) [pdf, other]
Title: DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[78]  arXiv:2405.07440 (cross-list from cs.HC) [pdf, other]
Title: Maximizing Information Gain in Privacy-Aware Active Learning of Email Anomalies
Comments: arXiv admin note: substantial text overlap with arXiv:2303.00870
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[79]  arXiv:2405.07430 (cross-list from cs.SE) [pdf, other]
Title: Don't Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[80]  arXiv:2405.07265 (cross-list from cs.DC) [pdf, other]
Title: An Approach for Decentralized Authentication in Networks of UAVs
Comments: 5 pages
Journal-ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto Portugal, April 2021, pp. 13-17, ISSN 2308-4294
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[81]  arXiv:2405.07196 (cross-list from cs.DB) [pdf, other]
Title: Permissioned Blockchain-based Framework for Ranking Synthetic Data Generators
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[82]  arXiv:2405.07061 (cross-list from cs.LG) [pdf, other]
Title: LLMs and the Future of Chip Design: Unveiling Security Risks and Building Trust
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[83]  arXiv:2405.07020 (cross-list from cs.LG) [pdf, other]
Title: Adaptive Online Bayesian Estimation of Frequency Distributions with Local Differential Privacy
Comments: Code for experiments available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[84]  arXiv:2405.06865 (cross-list from cs.CV) [pdf, other]
Title: Disrupting Style Mimicry Attacks on Video Imagery
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[85]  arXiv:2405.06787 (cross-list from quant-ph) [pdf, other]
Title: A computational test of quantum contextuality, and even simpler proofs of quantumness
Comments: 69 pages, 6 figures. For updates see this https URL
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Mon, 13 May 2024

[86]  arXiv:2405.06498 [pdf, other]
Title: Implementation Study of Cost-Effective Verification for Pietrzak's Verifiable Delay Function in Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2405.06371 [pdf, other]
Title: Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
Authors: Jan H. Klemmer (1), Stefan Albert Horstmann (2), Nikhil Patnaik (3), Cordelia Ludden (4), Cordell Burton Jr (4), Carson Powers (4), Fabio Massacci (5 and 6), Akond Rahman (7), Daniel Votipka (4), Heather Richter Lipford (8), Awais Rashid (3), Alena Naiakshina (2), Sascha Fahl (1) ((1) CISPA Helmholtz Center for Information Security, (2) Ruhr University Bochum, (3) University of Bristol, (4) Tufts University, (5) Vrije Universiteit Amsterdam, (6) University of Trento, (7) Auburn University, (8) University of North Carolina at Charlotte)
Comments: 20 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[88]  arXiv:2405.06356 [pdf, other]
Title: CRATOR: a Dark Web Crawler
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2405.06307 [pdf, other]
Title: Smooth Sensitivity for Geo-Privacy
Authors: Yuting Liang, Ke Yi
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2405.06261 [pdf, other]
Title: Improving the Privacy Loss Under User-Level DP Composition for Fixed Estimation Error
Comments: 15 pages, 6 figures, to be submitted to the ACM
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[91]  arXiv:2405.06242 [pdf, other]
Title: Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[92]  arXiv:2405.06237 [pdf, other]
Title: Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2405.06206 [pdf, other]
Title: Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[94]  arXiv:2405.06124 [pdf, other]
Title: Demystifying Behavior-Based Malware Detection at Endpoints
Comments: Behavior-based malware detection with machine learning. 18 pages, 10 figures, 15 tables. Leaderboard: this https URL
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2405.06074 [pdf, other]
Title: Protocols to Code: Formal Verification of a Next-Generation Internet Router
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Programming Languages (cs.PL)
[96]  arXiv:2405.05999 [pdf, other]
Title: LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2405.05990 [pdf, other]
Title: Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[98]  arXiv:2405.06447 (cross-list from cs.SE) [pdf, other]
Title: Sandboxing Adoption in Open Source Ecosystems
Comments: Published at the 12th ACM/IEEE International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS 2024), Co-located with ICSE
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[99]  arXiv:2405.06368 (cross-list from cs.LG) [pdf, other]
Title: DP-DyLoRA: Fine-Tuning Transformer-Based Models On-Device under Differentially Private Federated Learning using Dynamic Low-Rank Adaptation
Comments: 16 pages, 10 figures, 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[100]  arXiv:2405.06278 (cross-list from cs.CV) [pdf, other]
Title: Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[101]  arXiv:2405.06247 (cross-list from cs.LG) [pdf, other]
Title: Disttack: Graph Adversarial Attacks Toward Distributed GNN Training
Comments: Accepted by 30th International European Conference on Parallel and Distributed Computing(Euro-Par 2024)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[102]  arXiv:2405.06172 (cross-list from cs.LG) [pdf, other]
Title: Anomaly Detection in Graph Structured Data: A Survey
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[103]  arXiv:2405.06126 (cross-list from quant-ph) [pdf, other]
Title: Quantum Secure Anonymous Communication Networks
Comments: Accepted for publication in QCNC2024
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[104]  arXiv:2405.06073 (cross-list from cs.LG) [pdf, other]
Title: Hard Work Does Not Always Pay Off: Poisoning Attacks on Neural Architecture Search
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[105]  arXiv:2405.06049 (cross-list from cs.CV) [pdf, other]
Title: BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[106]  arXiv:2403.19303 (cross-list from cs.CY) [pdf, ps, other]
Title: Developing generative AI chatbots conceptual framework for higher education
Comments: 28 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[ total of 106 entries: 1-106 ]
[ showing up to 130 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)