We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 95 entries: 1-25 | 26-50 | 51-75 | 76-95 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 20 May 2024

[1]  arXiv:2405.10906 [pdf, other]
Title: POSTER: Testing network-based RTK for GNSS receiver security
Comments: To appear in the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2405.10880 [pdf, ps, other]
Title: The MESA Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) 2024
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2405.10758 [pdf, other]
Title: Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2405.10543 [pdf, other]
Title: SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2405.10521 [pdf, other]
Title: Generative AI for Secure and Privacy-Preserving Mobile Crowdsensing
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2405.10376 [pdf, ps, other]
Title: Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[7]  arXiv:2405.10373 [pdf, other]
Title: A Transdisciplinary Approach to Cybersecurity: A Framework for Encouraging Transdisciplinary Thinking
Authors: Emily Kesler
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2405.10757 (cross-list from cs.LG) [pdf, other]
Title: Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[9]  arXiv:2405.10678 (cross-list from cs.CY) [pdf, ps, other]
Title: IT Strategic alignment in the decentralized finance (DeFi): CBDC and digital currencies
Comments: Keywords: IT Strategic alignment, Decentralized Finance (DeFi), Cryptocurrency, Digital Economy
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[10]  arXiv:2405.10612 (cross-list from cs.CV) [pdf, other]
Title: Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Fri, 17 May 2024

[11]  arXiv:2405.10131 [pdf, other]
Title: Trusting the Cloud-Native Edge: Remotely Attested Kubernetes Workers
Comments: Pre-print of article accepted to IEEE ICCCN 2024
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2405.10051 [pdf, other]
Title: MarkLLM: An Open-Source Toolkit for LLM Watermarking
Comments: 16 pages, 5 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[13]  arXiv:2405.09916 [pdf, other]
Title: DIMSIM -- Device Integrity Monitoring through iSIM Applets and Distributed Ledger Technology
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2405.09757 [pdf, other]
Title: Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates
Comments: Under review
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2405.09721 [pdf, other]
Title: DP-RuL: Differentially-Private Rule Learning for Clinical Decision Support Systems
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2405.09662 [pdf, ps, other]
Title: Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[17]  arXiv:2405.10274 (cross-list from quant-ph) [pdf, other]
Title: Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[18]  arXiv:2405.10220 (cross-list from cs.SE) [pdf, other]
Title: SoK: Prudent Evaluation Practices for Fuzzing
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[19]  arXiv:2405.10096 (cross-list from cs.LG) [pdf, other]
Title: The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective
Comments: 6 pages, 5 figures, submitted to 2024 IEEE MeditCom
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[20]  arXiv:2405.09902 (cross-list from cs.CV) [pdf, other]
Title: Unveiling the Potential: Harnessing Deep Metric Learning to Circumvent Video Streaming Encryption
Comments: Published in the WI-IAT 2023 proceedings
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[21]  arXiv:2405.09805 (cross-list from cs.CL) [pdf, other]
Title: SecureLLM: Using Compositionality to Build Provably Secure Language Models for Private, Sensitive, and Secret Data
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[22]  arXiv:2405.09786 (cross-list from cs.LG) [pdf, other]
Title: IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency
Comments: Accepted to ICML 2024, 29 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[23]  arXiv:2405.09550 (cross-list from cs.CV) [pdf, other]
Title: Mask-based Invisible Backdoor Attacks on Object Detection
Authors: Shin Jeong Jin
Comments: 7 pages, 3 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Thu, 16 May 2024 (showing first 2 of 16 entries)

[24]  arXiv:2405.09465 [pdf, other]
Title: Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2405.09412 [pdf, other]
Title: Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis
Comments: 5 pages
Journal-ref: Proc of the 15th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2024), Venice, Italy, May 2024, pp. 8-12, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[ total of 95 entries: 1-25 | 26-50 | 51-75 | 76-95 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)