We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 30

[ total of 106 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | ... | 101-106 ]
[ showing 10 entries per page: fewer | more | all ]

Wed, 15 May 2024 (continued, showing 10 of 23 entries)

[31]  arXiv:2405.08755 [pdf, other]
Title: Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[32]  arXiv:2405.08539 [pdf, other]
Title: SecScore: Enhancing the CVSS Threat Metric Group with Empirical Evidences
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2405.08479 [pdf, other]
Title: A Survey on Complexity Measures of Pseudo-Random Sequences
Authors: Chunlei Li
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2405.08466 [pdf, ps, other]
Title: Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?
Comments: Accepted at ACSW 2024
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2405.08395 [pdf, other]
Title: Cross-Blockchain Communication Using Oracles With an Off-Chain Aggregation Mechanism Based on zk-SNARKs
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[36]  arXiv:2405.08363 [pdf, other]
Title: UnMarker: A Universal Attack on Defensive Watermarking
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[37]  arXiv:2405.08359 [pdf, other]
Title: GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles
Comments: Article under review at IEEE Transactions on Dependable and Secure Computing. For associated AV-GPS-Dataset, see this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[38]  arXiv:2405.08356 [pdf, other]
Title: A Model-oriented Reasoning Framework for Privacy Analysis of Complex Systems
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2405.08340 [pdf, other]
Title: Achieving Resolution-Agnostic DNN-based Image Watermarking:A Novel Perspective of Implicit Neural Representation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[40]  arXiv:2405.08305 [pdf, other]
Title: Collateral Portfolio Optimization in Crypto-Backed Stablecoins
Comments: Accepted for presentation at MARBLE 2024
Subjects: Cryptography and Security (cs.CR)
[ total of 106 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | ... | 101-106 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)