We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 52

[ total of 153 entries: 1-25 | 3-27 | 28-52 | 53-77 | 78-102 | 103-127 | 128-152 | 153 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 24 May 2024 (continued, showing 25 of 49 entries)

[53]  arXiv:2405.13568 [pdf, other]
Title: CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP
Comments: International Conference on Information Systems Security and Privacy 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[54]  arXiv:2405.13517 [pdf, other]
Title: WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[55]  arXiv:2405.13401 [pdf, ps, other]
Title: TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models
Comments: 18 pages, 13 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[56]  arXiv:2405.13380 [pdf, other]
Title: The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2405.13310 [pdf, ps, other]
Title: Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols
Comments: 22 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2405.13295 [pdf, ps, other]
Title: Dialects for CoAP-like Messaging Protocols
Authors: Carolyn Talcott
Comments: 63 pages
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2405.13175 [pdf, other]
Title: FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques
Comments: Usenix Security Symposium 2024 -- DOI To Be Announced soon
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2405.13156 [pdf, other]
Title: A Privacy-Preserving DAO Model Using NFT Authentication for the Punishment not Reward Blockchain Architecture
Comments: Submitted to conference
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[61]  arXiv:2405.13147 [pdf, other]
Title: A novel reliability attack of Physical Unclonable Functions
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2405.13146 [pdf, other]
Title: A lightweight PUF-based authentication protocol
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2405.13080 [pdf, other]
Title: EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection
Comments: 18 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2405.13077 [pdf, other]
Title: GPT-4 Jailbreaks Itself with Near-Perfect Success Using Self-Explanation
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[65]  arXiv:2405.13068 [pdf, other]
Title: Lockpicking LLMs: A Logit-Based Jailbreak Using Token-level Manipulation
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[66]  arXiv:2405.13066 [pdf, other]
Title: Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS
Comments: This paper was accepted at the 14th IEEE International Workshop on Network Technologies for Security, Administration & Protection (NETSAP 2024)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[67]  arXiv:2405.13062 [pdf, other]
Title: StatAvg: Mitigating Data Heterogeneity in Federated Learning for Intrusion Detection Systems
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[68]  arXiv:2405.14725 (cross-list from cs.LG) [pdf, other]
Title: A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[69]  arXiv:2405.14517 (cross-list from cs.LG) [pdf, other]
Title: Identity Inference from CLIP Models using Only Textual Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[70]  arXiv:2405.14457 (cross-list from cs.LG) [pdf, other]
Title: Tighter Privacy Auditing of DP-SGD in the Hidden State Threat Model
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[71]  arXiv:2405.14388 (cross-list from cs.SE) [pdf, other]
Title: Evaluation of the Programming Skills of Large Language Models
Subjects: Software Engineering (cs.SE); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[72]  arXiv:2405.13801 (cross-list from stat.ME) [pdf, other]
Title: Bayesian Inference Under Differential Privacy: Prior Selection Considerations with Application to Univariate Gaussian Data and Regression
Comments: 9-page main document with 5 figures and a 12-page appendix with 4 figures
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[73]  arXiv:2405.13763 (cross-list from cs.LG) [pdf, other]
Title: Banded Square Root Matrix Factorization for Differentially Private Model Training
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[74]  arXiv:2405.13677 (cross-list from cs.LG) [pdf, ps, other]
Title: Naturally Private Recommendations with Determinantal Point Processes
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[75]  arXiv:2405.13670 (cross-list from cs.SI) [pdf, ps, other]
Title: GNN-based Anomaly Detection for Encoded Network Traffic
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[76]  arXiv:2405.13481 (cross-list from stat.ML) [pdf, other]
Title: Locally Private Estimation with Public Features
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:2405.13453 (cross-list from cs.LG) [pdf, other]
Title: A Huber Loss Minimization Approach to Mean Estimation under User-level Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 153 entries: 1-25 | 3-27 | 28-52 | 53-77 | 78-102 | 103-127 | 128-152 | 153 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)