We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 105

[ total of 182 entries: 1-10 | ... | 76-85 | 86-95 | 96-105 | 106-115 | 116-125 | 126-135 | 136-145 | ... | 176-182 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 2 Dec 2025 (continued, showing 10 of 54 entries)

[106]  arXiv:2512.01247 [pdf, ps, other]
Title: Benchmarking and Understanding Safety Risks in AI Character Platforms
Comments: Accepted to NDSS '26: The Network and Distributed System Security Symposium 2026
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[107]  arXiv:2512.01233 [pdf, ps, other]
Title: CTF Archive: Capture, Curate, Learn Forever
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2512.01185 [pdf, ps, other]
Title: DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.01164 [pdf, ps, other]
Title: Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[110]  arXiv:2512.01115 [pdf, ps, other]
Title: Sliced Rényi Pufferfish Privacy: Directional Additive Noise Mechanism and Private Learning with Gradient Clipping
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.00966 [pdf, ps, other]
Title: Mitigating Indirect Prompt Injection via Instruction-Following Intent Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2512.00857 [pdf, ps, other]
Title: Hesperus is Phosphorus: Mapping Threat Actor Naming Taxonomies at Scale
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.00833 [pdf, ps, other]
Title: Logic Encryption: This Time for Real
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[114]  arXiv:2512.00804 [pdf, ps, other]
Title: Bias Injection Attacks on RAG Databases and Sanitization Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[115]  arXiv:2512.00741 [pdf, ps, other]
Title: MASCOT: Analyzing Malware Evolution Through A Well-Curated Source Code Dataset
Comments: 11 pages, 6 figures, conference paper; submitted to IEEE BigData 2025 CyberHunt workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 182 entries: 1-10 | ... | 76-85 | 86-95 | 96-105 | 106-115 | 116-125 | 126-135 | 136-145 | ... | 176-182 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)