We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 102

[ total of 130 entries: 1-25 | ... | 28-52 | 53-77 | 78-102 | 103-127 | 128-130 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 30 Apr 2024 (continued, showing 25 of 35 entries)

[103]  arXiv:2404.18407 [pdf, other]
Title: ICMarks: A Robust Watermarking Framework for Integrated Circuit Physical Design IP Protection
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[104]  arXiv:2404.18396 [pdf, other]
Title: DRAM-Profiler: An Experimental DRAM RowHammer Vulnerability Profiling Mechanism
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[105]  arXiv:2404.18388 [pdf, other]
Title: SPECIAL: Synopsis Assisted Secure Collaborative Analytics
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[106]  arXiv:2404.18365 [pdf, other]
Title: "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2404.18353 [pdf, other]
Title: Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Programming Languages (cs.PL)
[108]  arXiv:2404.18350 [pdf, other]
Title: L-DIT: A dApp for Live Detectability, Identifiability and Trackability for ASOs on the Behavioral Dynamics Blockchain
Subjects: Cryptography and Security (cs.CR); Instrumentation and Methods for Astrophysics (astro-ph.IM)
[109]  arXiv:2404.18328 [pdf, ps, other]
Title: Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[110]  arXiv:2404.18308 [pdf, ps, other]
Title: Near-Term Enforcement of AI Chip Export Controls Using A Minimal Firmware-Based Design for Offline Licensing
Authors: James Petrie
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[111]  arXiv:2404.18251 [pdf, other]
Title: Machine Learning for Blockchain Data Analysis: Progress and Opportunities
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2404.18090 [pdf, other]
Title: A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2404.18082 [pdf, ps, other]
Title: Cyber Security in Containerization Platforms: A Comparative Study of Security Challenges, Measures and Best Practices
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2404.17989 [pdf, other]
Title: InfoSec.pptx: A Longitudinal Study of Speakers, Topics, and Sponsors at Security Conferences in Academia and Industry
Comments: Code and data can be found in the repository: this https URL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[115]  arXiv:2404.17984 [pdf, other]
Title: Privacy-Preserving, Dropout-Resilient Aggregation in Decentralized Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2404.17970 [pdf, other]
Title: Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2404.17960 [pdf, other]
Title: PhishGuard: A Convolutional Neural Network Based Model for Detecting Phishing URLs with Explainability Analysis
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[118]  arXiv:2404.17864 [pdf, ps, other]
Title: Solvent: liquidity verification of smart contracts
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[119]  arXiv:2404.17839 [pdf, other]
Title: Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection
Journal-ref: 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE '24)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[120]  arXiv:2404.17787 [pdf, ps, other]
Title: Quantum resistant multi-signature scheme with optimal communication round: A Blockchain-based approach
Comments: This article has 18 pages, 6 figures, and 4 tables
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2404.17617 [pdf, other]
Title: Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning
Journal-ref: Proceedings of the AAAI Conference on Artificial Intelligence. 2024, 38(19): 21359-21367
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[122]  arXiv:2404.18887 (cross-list from cs.SE) [pdf, other]
Title: PrescientFuzz: A more effective exploration approach for grey-box fuzzing
Comments: 20 pages, 12 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[123]  arXiv:2404.18534 (cross-list from cs.CL) [pdf, other]
Title: Evaluating and Mitigating Linguistic Discrimination in Large Language Models
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[124]  arXiv:2404.18502 (cross-list from quant-ph) [pdf, other]
Title: Towards Classical Software Verification using Quantum Computers
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[125]  arXiv:2404.18191 (cross-list from cs.CL) [pdf, other]
Title: Exploring the Robustness of In-Context Learning with Noisy Labels
Comments: ICLR 2024 Workshop on Reliable and Responsible Foundation Models
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC)
[126]  arXiv:2404.17947 (cross-list from cs.LG) [pdf, other]
Title: Bounding the Expected Robustness of Graph Neural Networks Subject to Node Feature Attacks
Comments: Accepted at ICLR 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[127]  arXiv:2404.17721 (cross-list from cs.SD) [pdf, ps, other]
Title: An RFP dataset for Real, Fake, and Partially fake audio detection
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[ total of 130 entries: 1-25 | ... | 28-52 | 53-77 | 78-102 | 103-127 | 128-130 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)