We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 20

[ total of 106 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-106 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 16 May 2024 (continued, showing last 9 of 16 entries)

[21]  arXiv:2405.09084 [pdf, ps, other]
Title: Temporarily Restricting Solidity Smart Contract Interactions
Comments: submitted to DAPPS 2024. 11 pages, 5 Figures
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2405.09470 (cross-list from cs.SD) [pdf, other]
Title: Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer
Comments: Accepted to SecTL (AsiaCCS Workshop) 2024
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[23]  arXiv:2405.09398 (cross-list from cs.DC) [pdf, ps, other]
Title: Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure
Comments: 7 pages, for associated implementation etc., see this https URL
Journal-ref: Proc of the 14th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2023), Nice, France, June 2023, pp. 1-7, ISSN 2308-4294
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[24]  arXiv:2405.09306 (cross-list from cs.IR) [pdf, other]
Title: Words Blending Boxes. Obfuscating Queries in Information Retrieval using Differential Privacy
Comments: Preprint submitted to Information Science journal
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[25]  arXiv:2405.09264 (cross-list from cs.NI) [pdf, other]
Title: A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights
Comments: Presented at the 2024 IFIP Networking Conference (IFIP Networking)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[26]  arXiv:2405.09176 (cross-list from cs.LG) [pdf, other]
Title: Cross-Input Certified Training for Universal Perturbations
Comments: 21 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[27]  arXiv:2405.08962 (cross-list from quant-ph) [pdf, other]
Title: Understanding Side-Channel Vulnerabilities in Superconducting Qubit Readout Architectures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[28]  arXiv:2405.08920 (cross-list from cs.LG) [pdf, other]
Title: Neural Collapse Meets Differential Privacy: Curious Behaviors of NoisyGD with Near-perfect Representation Learning
Comments: To appear in ICML 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[29]  arXiv:2405.08834 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Machine Learning Threats to Spacecraft
Comments: Preprint
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Wed, 15 May 2024 (showing first 16 of 23 entries)

[30]  arXiv:2405.08762 [pdf, other]
Title: S3C2 Summit 2024-03: Industry Secure Supply Chain Summit
Comments: This is our WIP paper on the Summit. More versions will be released soon
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2405.08755 [pdf, other]
Title: Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[32]  arXiv:2405.08539 [pdf, other]
Title: SecScore: Enhancing the CVSS Threat Metric Group with Empirical Evidences
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2405.08479 [pdf, other]
Title: A Survey on Complexity Measures of Pseudo-Random Sequences
Authors: Chunlei Li
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2405.08466 [pdf, ps, other]
Title: Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?
Comments: Accepted at ACSW 2024
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2405.08395 [pdf, other]
Title: Cross-Blockchain Communication Using Oracles With an Off-Chain Aggregation Mechanism Based on zk-SNARKs
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[36]  arXiv:2405.08363 [pdf, other]
Title: UnMarker: A Universal Attack on Defensive Watermarking
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[37]  arXiv:2405.08359 [pdf, other]
Title: GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles
Comments: Article under review at IEEE Transactions on Dependable and Secure Computing. For associated AV-GPS-Dataset, see this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[38]  arXiv:2405.08356 [pdf, other]
Title: A Model-oriented Reasoning Framework for Privacy Analysis of Complex Systems
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2405.08340 [pdf, other]
Title: Achieving Resolution-Agnostic DNN-based Image Watermarking:A Novel Perspective of Implicit Neural Representation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[40]  arXiv:2405.08305 [pdf, other]
Title: Collateral Portfolio Optimization in Crypto-Backed Stablecoins
Comments: Accepted for presentation at MARBLE 2024
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2405.08299 [pdf, other]
Title: Differentially Private Federated Learning: A Systematic Review
Comments: 37pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[42]  arXiv:2405.08278 [pdf, other]
Title: Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection
Comments: Under review
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[43]  arXiv:2405.08268 [pdf, other]
Title: T-Watch: Towards Timed Execution of Private Transaction in Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[44]  arXiv:2405.08117 [pdf, ps, other]
Title: Secret Sharing with Certified Deletion
Comments: To appear at CRYPTO 2024
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2405.08102 [pdf, other]
Title: Evaluating Google's Protected Audience Protocol
Subjects: Cryptography and Security (cs.CR)
[ total of 106 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-106 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)