We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 132

[ total of 143 entries: 1-10 | ... | 103-112 | 113-122 | 123-132 | 133-142 | 143 ]
[ showing 10 entries per page: fewer | more | all ]

Wed, 24 Dec 2025 (continued, showing 10 of 22 entries)

[133]  arXiv:2512.20168 [pdf, ps, other]
Title: Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography
Comments: This paper is accepted by Network and Distributed System Security Symposium (NDSS) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[134]  arXiv:2512.20062 [pdf, ps, other]
Title: On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities
Comments: The 9th International Conference on Mobile Internet Security (MobiSec 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[135]  arXiv:2512.20004 [pdf, ps, other]
Title: IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense
Comments: 13 pages
Journal-ref: IEEE Internet of Things Journal, IEEE, ISSN 2327-4662 (2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[136]  arXiv:2512.19997 [pdf, ps, other]
Title: BacAlarm: Mining and Simulating Composite API Traffic to Prevent Broken Access Control Violations
Comments: The full version of this work consists of 15 pages and has been submitted to IEEE Transactions on Software Engineering (TSE)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[137]  arXiv:2512.19968 [pdf, ps, other]
Title: Fast Deterministically Safe Proof-of-Work Consensus
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2512.19951 [pdf, ps, other]
Title: Efficient Mod Approximation and Its Applications to CKKS Ciphertexts
Authors: Yufei Zhou
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2512.19945 [pdf, ps, other]
Title: Energy-Efficient Multi-LLM Reasoning for Binary-Free Zero-Day Detection in IoT Firmware
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2512.20077 (cross-list from quant-ph) [pdf, ps, other]
Title: Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[141]  arXiv:2512.19935 (cross-list from cs.LG) [pdf, ps, other]
Title: Conditional Adversarial Fragility in Financial Machine Learning under Macroeconomic Stress
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[142]  arXiv:2512.19730 (cross-list from cs.LG) [pdf, ps, other]
Title: ArcGen: Generalizing Neural Backdoor Detection Across Diverse Architectures
Comments: 16 pages, 8 figures. This article was accepted by IEEE Transactions on Information Forensics and Security. DOI: 10.1109/TIFS.2025.3610254
Journal-ref: in IEEE Transactions on Information Forensics and Security, vol. 20, pp. 10082-10097, 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 143 entries: 1-10 | ... | 103-112 | 113-122 | 123-132 | 133-142 | 143 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2601, contact, help  (Access key information)