We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 68

[ total of 130 entries: 1-25 | 19-43 | 44-68 | 69-93 | 94-118 | 119-130 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 2 May 2024 (continued, showing last 6 of 22 entries)

[69]  arXiv:2405.00078 [pdf, other]
Title: Mitigating Spectre-PHT using Speculation Barriers in Linux BPF
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[70]  arXiv:2405.00066 [pdf, other]
Title: Research and application of artificial intelligence based webshell detection model: A literature review
Comments: 21 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[71]  arXiv:2405.00663 (cross-list from quant-ph) [pdf, other]
Title: Quantum cryptographic protocols with dual messaging system via 2D alternate quantum walks and genuine single particle entangled states
Comments: 11 pages (including supplementary material), 2 figures and 1 table
Subjects: Quantum Physics (quant-ph); Disordered Systems and Neural Networks (cond-mat.dis-nn); Cryptography and Security (cs.CR); Quantum Algebra (math.QA); Optics (physics.optics)
[72]  arXiv:2405.00610 (cross-list from math.GR) [pdf, ps, other]
Title: Growth in products of matrices: fastest, average, and generic
Comments: 10 pages. Comments are welcome
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Combinatorics (math.CO); Dynamical Systems (math.DS); Probability (math.PR)
[73]  arXiv:2405.00466 (cross-list from cs.CV) [pdf, other]
Title: Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[74]  arXiv:2405.00009 (cross-list from cs.DC) [pdf, other]
Title: Service Level Agreements and Security SLA: A Comprehensive Survey
Comments: 25 pages, 5 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Wed, 1 May 2024 (showing first 19 of 21 entries)

[75]  arXiv:2404.19744 [pdf, other]
Title: PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[76]  arXiv:2404.19715 [pdf, other]
Title: Assessing LLMs in Malicious Code Deobfuscation of Real-world Malware Campaigns
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2404.19677 [pdf, ps, other]
Title: A Comprehensive Analysis of Pegasus Spyware and Its Implications for Digital Privacy and Security
Authors: Karwan Kareem
Comments: 13 Pages
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2404.19480 [pdf, other]
Title: Mitigating and Analysis of Memory Usage Attack in IoE System
Journal-ref: Industrial Networks and Intelligent Systems,2023
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2404.19434 [pdf, other]
Title: Detection of Energy Consumption Cyber Attacks on Smart Devices
Journal-ref: Springer Nature Switzerland,2023
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2404.19418 [pdf, other]
Title: Energy Cyber Attacks to Smart Healthcare Devices: A Testbed
Journal-ref: Bio-inspired Information and Communications Technologies, 2023
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2404.19246 [pdf, ps, other]
Title: Logistic Map Pseudo Random Number Generator in FPGA
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[82]  arXiv:2404.19121 [pdf, ps, other]
Title: Characterising Payload Entropy in Packet Flows
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2404.19114 [pdf, other]
Title: Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems
Comments: This paper has been accepted by DCOSS-IoT 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[84]  arXiv:2404.19064 [pdf, other]
Title: Zero Knowledge Proof for Multiple Sequence Alignment
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2404.19754 (cross-list from quant-ph) [pdf, other]
Title: Succinct arguments for QMA from standard assumptions via compiled nonlocal games
Comments: 57 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[86]  arXiv:2404.19631 (cross-list from cs.LG) [pdf, other]
Title: On Training a Neural Network to Explain Binaries
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[87]  arXiv:2404.19597 (cross-list from cs.CL) [pdf, other]
Title: Transferring Troubles: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning
Comments: work in progress
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[88]  arXiv:2404.19582 (cross-list from cs.LG) [pdf, other]
Title: Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[89]  arXiv:2404.19548 (cross-list from cs.ET) [pdf, ps, other]
Title: An Extensive Survey of Digital Image Steganography: State of the Art
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR)
[90]  arXiv:2404.19460 (cross-list from cs.LG) [pdf, other]
Title: AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples
Comments: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[91]  arXiv:2404.19420 (cross-list from cs.LG) [pdf, other]
Title: Let's Focus: Focused Backdoor Attack against Federated Transfer Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[92]  arXiv:2404.19307 (cross-list from cs.SE) [pdf, other]
Title: Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[93]  arXiv:2404.19227 (cross-list from cs.CV) [pdf, other]
Title: Espresso: Robust Concept Filtering in Text-to-Image Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[ total of 130 entries: 1-25 | 19-43 | 44-68 | 69-93 | 94-118 | 119-130 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)