We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 49

[ total of 106 entries: 1-50 | 50-99 | 100-106 ]
[ showing 50 entries per page: fewer | more | all ]

Wed, 15 May 2024 (continued, showing last 3 of 23 entries)

[50]  arXiv:2405.08698 (cross-list from cs.IT) [pdf, other]
Title: Byzantine-Resilient Secure Aggregation for Federated Learning Without Privacy Compromises
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[51]  arXiv:2405.08577 (cross-list from cs.NI) [pdf, other]
Title: Intelligent Control in 6G Open RAN: Security Risk or Opportunity?
Comments: 36 pages, 14 figures, IEEE COMST (in review)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Performance (cs.PF); Systems and Control (eess.SY)
[52]  arXiv:2405.08487 (cross-list from cs.CV) [pdf, other]
Title: Semantic Contextualization of Face Forgery: A New Definition, Dataset, and Detection Method
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)

Tue, 14 May 2024

[53]  arXiv:2405.07941 [pdf, ps, other]
Title: Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2405.07848 [pdf, other]
Title: Positional-Unigram Byte Models for Generalized TLS Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2405.07667 [pdf, other]
Title: Backdoor Removal for Generative Large Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[56]  arXiv:2405.07611 [pdf, other]
Title: Uncovering GNSS Interference with Aerial Mapping UAV
Comments: In proceedings of the 2024 IEEE Aerospace Conference (AeroConf)
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2405.07533 [pdf, other]
Title: DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[58]  arXiv:2405.07496 [pdf, other]
Title: Oedipus: LLM-enchanced Reasoning CAPTCHA Solver
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2405.07419 [pdf, other]
Title: Indoor and Outdoor Crowd Density Level Estimation with Video Analysis through Machine Learning Models
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2405.07406 [pdf, other]
Title: Machine Unlearning: A Comprehensive Survey
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2405.07358 [pdf, ps, other]
Title: A Value Driven Framework for Cybersecurity Innovation in Transportation & Infrastructure
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2405.07232 [pdf, other]
Title: A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2405.07213 [pdf, other]
Title: Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[64]  arXiv:2405.07172 [pdf, other]
Title: Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2405.07145 [pdf, other]
Title: Stable Signature is Unstable: Removing Image Watermark from Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[66]  arXiv:2405.07094 [pdf, ps, other]
Title: The Road to Compliance: Executive Federal Agencies and the NIST Risk Management Framework
Authors: Michael Stoltz
Comments: This research paper was showcased at the University of West Florida Student Scholars Symposium and Faculty Research Showcase on April 18, 2024. It is supported by the National Science Foundation (NSF) under Grant No. 1946442. The views, findings, and conclusions presented are solely those of the author(s) and do not necessarily represent the views of the NSF
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2405.07054 [pdf, ps, other]
Title: LUCID: A Framework for Reducing False Positives and Inconsistencies Among Container Scanning Tools
Comments: 13 pages, 15 figures, 8 tables
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2405.07018 [pdf, other]
Title: Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought
Comments: This paper has been accepted by IJCAI-24
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2405.07007 [pdf, ps, other]
Title: A New Algorithm for Computing Branch Number of Non-Singular Matrices over Finite Fields
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2405.07004 [pdf, other]
Title: Stealthy Imitation: Reward-guided Environment-free Policy Stealing
Comments: Accepted at ICML 2024. Project page: this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2405.06842 [pdf, other]
Title: BitVMX: A CPU for Universal Computation on Bitcoin
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72]  arXiv:2405.06830 [pdf, other]
Title: Towards Browser Controls to Protect Cookies from Malicious Extensions
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2405.06823 [pdf, other]
Title: PLeak: Prompt Leaking Attacks against Large Language Model Applications
Comments: To appear in the Proceedings of The ACM Conference on Computer and Communications Security (CCS), 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[74]  arXiv:2405.06772 [pdf, other]
Title: CANAL -- Cyber Activity News Alerting Language Model: Empirical Approach vs. Expensive LLM
Comments: Published in 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), Conference Date: 07-09 February 2024
Journal-ref: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), Houston, TX, USA, 2024, pp. 1-12
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[75]  arXiv:2405.07803 (cross-list from cs.IT) [pdf, other]
Title: Decoding Geometric Properties in Non-Random Data from First Information-Theoretic Principles
Comments: arXiv admin note: substantial text overlap with arXiv:2303.16045. substantial text overlap with arXiv:2303.16045
Subjects: Information Theory (cs.IT); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Statistics Theory (math.ST)
[76]  arXiv:2405.07668 (cross-list from cs.SE) [pdf, other]
Title: CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models
Comments: 23 pages, 2 figures, accepted by FSE 2024 (The ACM International Conference on the Foundations of Software Engineering)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[77]  arXiv:2405.07638 (cross-list from cs.NI) [pdf, other]
Title: DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[78]  arXiv:2405.07440 (cross-list from cs.HC) [pdf, other]
Title: Maximizing Information Gain in Privacy-Aware Active Learning of Email Anomalies
Comments: arXiv admin note: substantial text overlap with arXiv:2303.00870
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[79]  arXiv:2405.07430 (cross-list from cs.SE) [pdf, other]
Title: Don't Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[80]  arXiv:2405.07265 (cross-list from cs.DC) [pdf, other]
Title: An Approach for Decentralized Authentication in Networks of UAVs
Comments: 5 pages
Journal-ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto Portugal, April 2021, pp. 13-17, ISSN 2308-4294
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[81]  arXiv:2405.07196 (cross-list from cs.DB) [pdf, other]
Title: Permissioned Blockchain-based Framework for Ranking Synthetic Data Generators
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[82]  arXiv:2405.07061 (cross-list from cs.LG) [pdf, other]
Title: LLMs and the Future of Chip Design: Unveiling Security Risks and Building Trust
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[83]  arXiv:2405.07020 (cross-list from cs.LG) [pdf, other]
Title: Adaptive Online Bayesian Estimation of Frequency Distributions with Local Differential Privacy
Comments: Code for experiments available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[84]  arXiv:2405.06865 (cross-list from cs.CV) [pdf, other]
Title: Disrupting Style Mimicry Attacks on Video Imagery
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[85]  arXiv:2405.06787 (cross-list from quant-ph) [pdf, other]
Title: A computational test of quantum contextuality, and even simpler proofs of quantumness
Comments: 69 pages, 6 figures. For updates see this https URL
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Mon, 13 May 2024 (showing first 14 of 21 entries)

[86]  arXiv:2405.06498 [pdf, other]
Title: Implementation Study of Cost-Effective Verification for Pietrzak's Verifiable Delay Function in Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2405.06371 [pdf, other]
Title: Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
Authors: Jan H. Klemmer (1), Stefan Albert Horstmann (2), Nikhil Patnaik (3), Cordelia Ludden (4), Cordell Burton Jr (4), Carson Powers (4), Fabio Massacci (5 and 6), Akond Rahman (7), Daniel Votipka (4), Heather Richter Lipford (8), Awais Rashid (3), Alena Naiakshina (2), Sascha Fahl (1) ((1) CISPA Helmholtz Center for Information Security, (2) Ruhr University Bochum, (3) University of Bristol, (4) Tufts University, (5) Vrije Universiteit Amsterdam, (6) University of Trento, (7) Auburn University, (8) University of North Carolina at Charlotte)
Comments: 20 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[88]  arXiv:2405.06356 [pdf, other]
Title: CRATOR: a Dark Web Crawler
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2405.06307 [pdf, other]
Title: Smooth Sensitivity for Geo-Privacy
Authors: Yuting Liang, Ke Yi
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2405.06261 [pdf, other]
Title: Improving the Privacy Loss Under User-Level DP Composition for Fixed Estimation Error
Comments: 15 pages, 6 figures, to be submitted to the ACM
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[91]  arXiv:2405.06242 [pdf, other]
Title: Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[92]  arXiv:2405.06237 [pdf, other]
Title: Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2405.06206 [pdf, other]
Title: Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[94]  arXiv:2405.06124 [pdf, other]
Title: Demystifying Behavior-Based Malware Detection at Endpoints
Comments: Behavior-based malware detection with machine learning. 18 pages, 10 figures, 15 tables. Leaderboard: this https URL
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2405.06074 [pdf, other]
Title: Protocols to Code: Formal Verification of a Next-Generation Internet Router
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Programming Languages (cs.PL)
[96]  arXiv:2405.05999 [pdf, other]
Title: LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2405.05990 [pdf, other]
Title: Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[98]  arXiv:2405.06447 (cross-list from cs.SE) [pdf, other]
Title: Sandboxing Adoption in Open Source Ecosystems
Comments: Published at the 12th ACM/IEEE International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS 2024), Co-located with ICSE
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[99]  arXiv:2405.06368 (cross-list from cs.LG) [pdf, other]
Title: DP-DyLoRA: Fine-Tuning Transformer-Based Models On-Device under Differentially Private Federated Learning using Dynamic Low-Rank Adaptation
Comments: 16 pages, 10 figures, 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[ total of 106 entries: 1-50 | 50-99 | 100-106 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)