We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 43

[ total of 150 entries: 1-10 | ... | 14-23 | 24-33 | 34-43 | 44-53 | 54-63 | 64-73 | 74-83 | ... | 144-150 ]
[ showing 10 entries per page: fewer | more | all ]

Thu, 4 Dec 2025 (continued, showing 10 of 34 entries)

[44]  arXiv:2512.03462 [pdf, ps, other]
Title: A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Comments: 14 pages,2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2512.03461 [pdf, ps, other]
Title: In-Situ Encryption of Single-Transistor Nonvolatile Memories without Density Loss
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[46]  arXiv:2512.03420 [pdf, ps, other]
Title: HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[47]  arXiv:2512.03361 [pdf, ps, other]
Title: Rethinking Security in Semantic Communication: Latent Manipulation as a New Threat
Authors: Zhiyuan Xi, Kun Zhu
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[48]  arXiv:2512.03358 [pdf, ps, other]
Title: Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2512.03356 [pdf, ps, other]
Title: Immunity memory-based jailbreak detection: multi-agent adaptive guard for large language models
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2512.03351 [pdf, ps, other]
Title: Empirical assessment of the perception of graphical threat model acceptability
Comments: Accepted into the Asia-Pacific Software Engineering Conference (APSEC) 2025. Will appear in APSEC 2025 proceedings
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2512.03238 [pdf, ps, other]
Title: How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[52]  arXiv:2512.03207 [pdf, ps, other]
Title: Technical Report: The Need for a (Research) Sandstorm through the Privacy Sandbox
Comments: Technical report accompanying the research portal Privacy Sandstorm (this https URL) launched after our HotPETs 2024 talk "The Need for a (Research) Sandstorm through the Privacy Sandbox''
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2512.03121 [pdf, ps, other]
Title: Lost in Modality: Evaluating the Effectiveness of Text-Based Membership Inference Attacks on Large Multimodal Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 150 entries: 1-10 | ... | 14-23 | 24-33 | 34-43 | 44-53 | 54-63 | 64-73 | 74-83 | ... | 144-150 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)