We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 43

[ total of 106 entries: 1-25 | 19-43 | 44-68 | 69-93 | 94-106 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 15 May 2024 (continued, showing last 9 of 23 entries)

[44]  arXiv:2405.08117 [pdf, ps, other]
Title: Secret Sharing with Certified Deletion
Comments: To appear at CRYPTO 2024
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2405.08102 [pdf, other]
Title: Evaluating Google's Protected Audience Protocol
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2405.08084 [pdf, ps, other]
Title: PrivFED -- A Framework for Privacy-Preserving Federated Learning in Enhanced Breast Cancer Diagnosis
Comments: Presented in ICIITB 2024 organized by Modern College of Business and Science, Oman
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2405.08043 [pdf, other]
Title: HRNet: Differentially Private Hierarchical and Multi-Resolution Network for Human Mobility Data Synthesization
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2405.08025 [pdf, ps, other]
Title: A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[49]  arXiv:2405.08741 (cross-list from cs.DM) [pdf, ps, other]
Title: On Maximal Families of Binary Polynomials with Pairwise Linear Common Factors
Comments: 5 pages. Extended abstract submitted to BFA 2024
Subjects: Discrete Mathematics (cs.DM); Cryptography and Security (cs.CR); Combinatorics (math.CO)
[50]  arXiv:2405.08698 (cross-list from cs.IT) [pdf, other]
Title: Byzantine-Resilient Secure Aggregation for Federated Learning Without Privacy Compromises
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[51]  arXiv:2405.08577 (cross-list from cs.NI) [pdf, other]
Title: Intelligent Control in 6G Open RAN: Security Risk or Opportunity?
Comments: 36 pages, 14 figures, IEEE COMST (in review)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Performance (cs.PF); Systems and Control (eess.SY)
[52]  arXiv:2405.08487 (cross-list from cs.CV) [pdf, other]
Title: Semantic Contextualization of Face Forgery: A New Definition, Dataset, and Detection Method
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)

Tue, 14 May 2024 (showing first 16 of 33 entries)

[53]  arXiv:2405.07941 [pdf, ps, other]
Title: Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2405.07848 [pdf, other]
Title: Positional-Unigram Byte Models for Generalized TLS Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2405.07667 [pdf, other]
Title: Backdoor Removal for Generative Large Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[56]  arXiv:2405.07611 [pdf, other]
Title: Uncovering GNSS Interference with Aerial Mapping UAV
Comments: In proceedings of the 2024 IEEE Aerospace Conference (AeroConf)
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2405.07533 [pdf, other]
Title: DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[58]  arXiv:2405.07496 [pdf, other]
Title: Oedipus: LLM-enchanced Reasoning CAPTCHA Solver
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2405.07419 [pdf, other]
Title: Indoor and Outdoor Crowd Density Level Estimation with Video Analysis through Machine Learning Models
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2405.07406 [pdf, other]
Title: Machine Unlearning: A Comprehensive Survey
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2405.07358 [pdf, ps, other]
Title: A Value Driven Framework for Cybersecurity Innovation in Transportation & Infrastructure
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2405.07232 [pdf, other]
Title: A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2405.07213 [pdf, other]
Title: Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[64]  arXiv:2405.07172 [pdf, other]
Title: Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2405.07145 [pdf, other]
Title: Stable Signature is Unstable: Removing Image Watermark from Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[66]  arXiv:2405.07094 [pdf, ps, other]
Title: The Road to Compliance: Executive Federal Agencies and the NIST Risk Management Framework
Authors: Michael Stoltz
Comments: This research paper was showcased at the University of West Florida Student Scholars Symposium and Faculty Research Showcase on April 18, 2024. It is supported by the National Science Foundation (NSF) under Grant No. 1946442. The views, findings, and conclusions presented are solely those of the author(s) and do not necessarily represent the views of the NSF
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2405.07054 [pdf, ps, other]
Title: LUCID: A Framework for Reducing False Positives and Inconsistencies Among Container Scanning Tools
Comments: 13 pages, 15 figures, 8 tables
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2405.07018 [pdf, other]
Title: Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought
Comments: This paper has been accepted by IJCAI-24
Subjects: Cryptography and Security (cs.CR)
[ total of 106 entries: 1-25 | 19-43 | 44-68 | 69-93 | 94-106 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)