We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 93

[ total of 106 entries: 1-25 | 19-43 | 44-68 | 69-93 | 94-106 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 13 May 2024 (continued, showing last 13 of 21 entries)

[94]  arXiv:2405.06124 [pdf, other]
Title: Demystifying Behavior-Based Malware Detection at Endpoints
Comments: Behavior-based malware detection with machine learning. 18 pages, 10 figures, 15 tables. Leaderboard: this https URL
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2405.06074 [pdf, other]
Title: Protocols to Code: Formal Verification of a Next-Generation Internet Router
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Programming Languages (cs.PL)
[96]  arXiv:2405.05999 [pdf, other]
Title: LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2405.05990 [pdf, other]
Title: Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[98]  arXiv:2405.06447 (cross-list from cs.SE) [pdf, other]
Title: Sandboxing Adoption in Open Source Ecosystems
Comments: Published at the 12th ACM/IEEE International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS 2024), Co-located with ICSE
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[99]  arXiv:2405.06368 (cross-list from cs.LG) [pdf, other]
Title: DP-DyLoRA: Fine-Tuning Transformer-Based Models On-Device under Differentially Private Federated Learning using Dynamic Low-Rank Adaptation
Comments: 16 pages, 10 figures, 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[100]  arXiv:2405.06278 (cross-list from cs.CV) [pdf, other]
Title: Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[101]  arXiv:2405.06247 (cross-list from cs.LG) [pdf, other]
Title: Disttack: Graph Adversarial Attacks Toward Distributed GNN Training
Comments: Accepted by 30th International European Conference on Parallel and Distributed Computing(Euro-Par 2024)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[102]  arXiv:2405.06172 (cross-list from cs.LG) [pdf, other]
Title: Anomaly Detection in Graph Structured Data: A Survey
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[103]  arXiv:2405.06126 (cross-list from quant-ph) [pdf, other]
Title: Quantum Secure Anonymous Communication Networks
Comments: Accepted for publication in QCNC2024
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[104]  arXiv:2405.06073 (cross-list from cs.LG) [pdf, other]
Title: Hard Work Does Not Always Pay Off: Poisoning Attacks on Neural Architecture Search
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[105]  arXiv:2405.06049 (cross-list from cs.CV) [pdf, other]
Title: BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[106]  arXiv:2403.19303 (cross-list from cs.CY) [pdf, ps, other]
Title: Developing generative AI chatbots conceptual framework for higher education
Comments: 28 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[ total of 106 entries: 1-25 | 19-43 | 44-68 | 69-93 | 94-106 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)