We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 144 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-144 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 3 May 2024 (showing first 25 of 32 entries)

[1]  arXiv:2405.01509 [pdf, other]
Title: Learnable Linguistic Watermarks for Tracing Model Extraction Attacks on Large Language Models
Comments: not decided
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[2]  arXiv:2405.01460 [pdf, other]
Title: Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders
Comments: Accepted by ICML 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[3]  arXiv:2405.01459 [pdf, other]
Title: Unconditionally Safe Light Client
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2405.01446 [pdf, other]
Title: An Exploratory Case Study on Data Breach Journalism
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[5]  arXiv:2405.01412 [pdf, other]
Title: Applying Transparent Shaping for Zero Trust Architecture Implementation in AWS: A Case Study
Comments: 8 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[6]  arXiv:2405.01411 [pdf, other]
Title: IDPFilter: Mitigating Interdependent Privacy Issues in Third-Party Apps
Comments: 36 pages 12 figures
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2405.01329 [pdf, other]
Title: Decentralization of Ethereum's Builder Market
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2405.01289 [pdf, other]
Title: Measuring the Exploitation of Weaknesses in the Wild
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2405.01144 [pdf, other]
Title: Boosting Communication Efficiency of Federated Learning's Secure Aggregation
Comments: 2 pages, 4 figures, The 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2405.01118 [pdf, other]
Title: A Survey of the Overlooked Dangers of Template Engines
Comments: 29 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2405.01111 [pdf, other]
Title: Mining REST APIs for Potential Mass Assignment Vulnerabilities
Comments: EASE 2024
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2405.01080 [pdf, other]
Title: KDPrint: Passive Authentication using Keystroke Dynamics-to-Image Encoding via Standardization
Comments: 12 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2405.01046 [pdf, ps, other]
Title: Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures
Comments: This manuscript was accepted for the Technology Research, Education, and Opinion (TREO) Forum at the 32nd European Conference on Information Systems (ECIS 2024) in Paphos, Cyprus
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2405.01030 [pdf, ps, other]
Title: Towards Trust Proof for Secure Confidential Virtual Machines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[15]  arXiv:2405.00865 [pdf, other]
Title: Hiding Sensitive Information Using PDF Steganography
Authors: Ryan Klemm, Bo Chen
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2405.00844 [pdf, other]
Title: A Blockchain-Based Audit Mechanism for Trust and Integrity in IoT-Fog Environments
Comments: 14 pages, 10 figures TSC-2024-05-0329 submitted
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2405.00793 [pdf, ps, other]
Title: The Impact of IMSI Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networks
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2405.00742 [pdf, other]
Title: Federated Graph Learning for EV Charging Demand Forecasting with Personalization Against Cyberattacks
Comments: 11 pages,4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[19]  arXiv:2405.01495 (cross-list from cs.IT) [pdf, other]
Title: Error Correction Capabilities of Non-Linear Cryptographic Hash Functions
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[20]  arXiv:2405.01494 (cross-list from cs.CV) [pdf, other]
Title: Navigating Heterogeneity and Privacy in One-Shot Federated Learning with Diffusion Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2405.01349 (cross-list from cs.LG) [pdf, other]
Title: Position Paper: Beyond Robustness Against Single Attack Types
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[22]  arXiv:2405.01324 (cross-list from cs.NI) [pdf, other]
Title: A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[23]  arXiv:2405.01312 (cross-list from cs.DB) [pdf, other]
Title: Privacy-Enhanced Database Synthesis for Benchmark Publishing
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[24]  arXiv:2405.01229 (cross-list from cs.LG) [pdf, ps, other]
Title: Boosting Jailbreak Attack with Momentum
Comments: ICLR 2024 Workshop on Reliable and Responsible Foundation Models
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[25]  arXiv:2405.01207 (cross-list from cs.LG) [pdf, ps, other]
Title: Improving Membership Inference in ASR Model Auditing with Perturbed Loss Features
Comments: Trustworthy Speech Processing, Satellite Workshop at ICASSP 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[ total of 144 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 126-144 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)