We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 25

[ total of 130 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-130 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 3 May 2024 (continued, showing 25 of 32 entries)

[26]  arXiv:2405.01411 [pdf, other]
Title: IDPFilter: Mitigating Interdependent Privacy Issues in Third-Party Apps
Comments: 36 pages 12 figures
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2405.01329 [pdf, other]
Title: Decentralization of Ethereum's Builder Market
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2405.01289 [pdf, other]
Title: Measuring the Exploitation of Weaknesses in the Wild
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2405.01144 [pdf, other]
Title: Boosting Communication Efficiency of Federated Learning's Secure Aggregation
Comments: 2 pages, 4 figures, The 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2405.01118 [pdf, other]
Title: A Survey of the Overlooked Dangers of Template Engines
Comments: 29 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2405.01111 [pdf, other]
Title: Mining REST APIs for Potential Mass Assignment Vulnerabilities
Comments: EASE 2024
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2405.01080 [pdf, other]
Title: KDPrint: Passive Authentication using Keystroke Dynamics-to-Image Encoding via Standardization
Comments: 12 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2405.01046 [pdf, ps, other]
Title: Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures
Comments: This manuscript was accepted for the Technology Research, Education, and Opinion (TREO) Forum at the 32nd European Conference on Information Systems (ECIS 2024) in Paphos, Cyprus
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2405.01030 [pdf, ps, other]
Title: Towards Trust Proof for Secure Confidential Virtual Machines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[35]  arXiv:2405.00865 [pdf, other]
Title: Hiding Sensitive Information Using PDF Steganography
Authors: Ryan Klemm, Bo Chen
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2405.00844 [pdf, other]
Title: A Blockchain-Based Audit Mechanism for Trust and Integrity in IoT-Fog Environments
Comments: 14 pages, 10 figures TSC-2024-05-0329 submitted
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2405.00793 [pdf, ps, other]
Title: The Impact of IMSI Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networks
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2405.00742 [pdf, other]
Title: Federated Graph Learning for EV Charging Demand Forecasting with Personalization Against Cyberattacks
Comments: 11 pages,4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[39]  arXiv:2405.01495 (cross-list from cs.IT) [pdf, other]
Title: Error Correction Capabilities of Non-Linear Cryptographic Hash Functions
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[40]  arXiv:2405.01494 (cross-list from cs.CV) [pdf, other]
Title: Navigating Heterogeneity and Privacy in One-Shot Federated Learning with Diffusion Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41]  arXiv:2405.01349 (cross-list from cs.LG) [pdf, other]
Title: Position Paper: Beyond Robustness Against Single Attack Types
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[42]  arXiv:2405.01324 (cross-list from cs.NI) [pdf, other]
Title: A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[43]  arXiv:2405.01312 (cross-list from cs.DB) [pdf, other]
Title: Privacy-Enhanced Database Synthesis for Benchmark Publishing
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[44]  arXiv:2405.01229 (cross-list from cs.LG) [pdf, ps, other]
Title: Boosting Jailbreak Attack with Momentum
Comments: ICLR 2024 Workshop on Reliable and Responsible Foundation Models
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[45]  arXiv:2405.01207 (cross-list from cs.LG) [pdf, ps, other]
Title: Improving Membership Inference in ASR Model Auditing with Perturbed Loss Features
Comments: Trustworthy Speech Processing, Satellite Workshop at ICASSP 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[46]  arXiv:2405.01202 (cross-list from cs.SE) [pdf, other]
Title: DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection
Comments: 15 pages, 8 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[47]  arXiv:2405.01103 (cross-list from cs.SE) [pdf, other]
Title: LLM Security Guard for Code
Comments: SECUTE, EASE 2024
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[48]  arXiv:2405.01073 (cross-list from cs.LG) [pdf, other]
Title: Poisoning Attacks on Federated Learning for Autonomous Driving
Comments: Accepted to SCAI2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[49]  arXiv:2405.01031 (cross-list from cs.LG) [pdf, other]
Title: The Privacy Power of Correlated Noise in Decentralized Learning
Comments: Accepted as conference paper at ICML 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC); Machine Learning (stat.ML)
[50]  arXiv:2405.00955 (cross-list from cs.LG) [pdf, other]
Title: Recovering Labels from Local Updates in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 130 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-130 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)