We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 145

[ total of 145 entries: 1-100 | 46-145 ]
[ showing 100 entries per page: fewer | more | all ]

Tue, 9 Dec 2025 (continued, showing last 33 of 47 entries)

[46]  arXiv:2512.06747 [pdf, ps, other]
Title: PrivLLMSwarm: Privacy-Preserving LLM-Driven UAV Swarms for Secure IoT Surveillance
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[47]  arXiv:2512.06713 [pdf, ps, other]
Title: Look Twice before You Leap: A Rational Agent Framework for Localized Adversarial Anonymization
Comments: 16 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[48]  arXiv:2512.06660 [pdf, ps, other]
Title: Towards Small Language Models for Security Query Generation in SOC Workflows
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[49]  arXiv:2512.06659 [pdf, ps, other]
Title: The Evolution of Agentic AI in Cybersecurity: From Single LLM Reasoners to Multi-Agent Systems and Autonomous Pipelines
Authors: Vaishali Vinay
Comments: Accepted at ICAIC 2026
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2512.06589 [pdf, ps, other]
Title: OmniSafeBench-MM: A Unified Benchmark and Toolbox for Multimodal Jailbreak Attack-Defense Evaluation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[51]  arXiv:2512.06557 [pdf, ps, other]
Title: Characterizing Large-Scale Adversarial Activities Through Large-Scale Honey-Nets
Comments: Accepted at Conference IEEE UEMCON 2025
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[52]  arXiv:2512.06556 [pdf, ps, other]
Title: Securing the Model Context Protocol: Defending LLMs Against Tool Poisoning and Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[53]  arXiv:2512.06555 [pdf, ps, other]
Title: BEACON: A Unified Behavioral-Tactical Framework for Explainable Cybercrime Analysis with Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[54]  arXiv:2512.06500 [pdf, ps, other]
Title: PDRIMA: A Policy-Driven Runtime Integrity Measurement and Attestation Approach for ARM TrustZone-based TEE
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2512.06467 [pdf, ps, other]
Title: Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[56]  arXiv:2512.06411 [pdf, ps, other]
Title: KyFrog: A High-Security LWE-Based KEM Inspired by ML-KEM
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[57]  arXiv:2512.06396 [pdf, ps, other]
Title: AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity
Authors: Shovan Roy
Comments: 6 pages for IEEE conference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[58]  arXiv:2512.06390 [pdf, ps, other]
Title: Web Technologies Security in the AI Era: A Survey of CDN-Enhanced Defenses
Comments: Accepted at 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob). 7 pages, 5 figures
Journal-ref: 2025 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bali, Indonesia, 2025, pp. 180-186
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[59]  arXiv:2512.06387 [pdf, ps, other]
Title: Beyond Model Jailbreak: Systematic Dissection of the "Ten DeadlySins" in Embodied Intelligence
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[60]  arXiv:2512.06364 [pdf, ps, other]
Title: JEEVHITAA -- An End-to-End HCAI System to Support Collective Care
Comments: 14 pages, 4 figures, 6 tables, 2 algorithms, Preprint of work Submitted to MobiSys 2026 - Emergent Ideas Track
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Human-Computer Interaction (cs.HC)
[61]  arXiv:2512.06253 [pdf, ps, other]
Title: Privacy Loss of Noise Perturbation via Concentration Analysis of A Product Measure
Comments: Accepted by ACM International Conference on Management of Data (SIGMOD '26)
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2512.06172 [pdf, ps, other]
Title: DEFEND: Poisoned Model Detection and Malicious Client Exclusion Mechanism for Secure Federated Learning-based Road Condition Classification
Comments: Accepted to the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[63]  arXiv:2512.06155 [pdf, ps, other]
Title: Sift or Get Off the PoC: Applying Information Retrieval to Vulnerability Research with SiftRank
Authors: Caleb Gross
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[64]  arXiv:2512.06048 [pdf, ps, other]
Title: The Road of Adaptive AI for Precision in Cybersecurity
Authors: Sahil Garg
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[65]  arXiv:2512.06033 [pdf, ps, other]
Title: Sell Data to AI Algorithms Without Revealing It: Secure Data Valuation and Sharing via Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[66]  arXiv:2512.07814 (cross-list from cs.SE) [pdf, ps, other]
Title: Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach
Comments: 21 pages, 8 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[67]  arXiv:2512.07574 (cross-list from eess.IV) [pdf, ps, other]
Title: Precise Liver Tumor Segmentation in CT Using a Hybrid Deep Learning-Radiomics Framework
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[68]  arXiv:2512.07520 (cross-list from cs.AR) [pdf, ps, other]
Title: aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware \& Software Formal Verification
Authors: Noé Amiot (ALSOC), Quentin L. Meunier (ALSOC), Karine Heydemann (ALSOC), Emmanuelle Encrenaz (ALSOC)
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[69]  arXiv:2512.07368 (cross-list from cs.SE) [pdf, ps, other]
Title: Challenges in Developing Secure Software -- Results of an Interview Study in the German Software Industry
Comments: This paper includes 6 pages, 1 table, 1 figure. It is an English translation of our paper published in the German journal "Softwaretechnik Trends": ISSN 0720-8928, vol. 45, no. 4, pp. 2-7, year 2025
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[70]  arXiv:2512.07247 (cross-list from cs.CV) [pdf, ps, other]
Title: AdLift: Lifting Adversarial Perturbations to Safeguard 3D Gaussian Splatting Assets Against Instruction-Driven Editing
Comments: 40 pages, 34 figures, 18 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2512.07228 (cross-list from cs.CV) [pdf, ps, other]
Title: Towards Robust Protective Perturbation against DeepFake Face Swapping
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2512.06971 (cross-list from cs.LG) [pdf, ps, other]
Title: Prediction with Expert Advice under Local Differential Privacy
Comments: 19 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[73]  arXiv:2512.06925 (cross-list from cs.LG) [pdf, ps, other]
Title: Deep Reinforcement Learning for Phishing Detection with Transformer-Based Semantic Features
Authors: Aseer Al Faisal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[74]  arXiv:2512.06906 (cross-list from cs.SE) [pdf, ps, other]
Title: MINES: Explainable Anomaly Detection through Web API Invariant Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[75]  arXiv:2512.06716 (cross-list from cs.AI) [pdf, ps, other]
Title: Cognitive Control Architecture (CCA): A Lifecycle Supervision Framework for Robustly Aligned AI Agents
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[76]  arXiv:2512.06304 (cross-list from eess.AS) [pdf, ps, other]
Title: Degrading Voice: A Comprehensive Overview of Robust Voice Conversion Through Input Manipulation
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Sound (cs.SD)
[77]  arXiv:2512.06243 (cross-list from cs.LG) [pdf, ps, other]
Title: Quantization Blindspots: How Model Compression Breaks Backdoor Defenses
Authors: Rohan Pandey, Eric Ye
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[78]  arXiv:2512.06123 (cross-list from cs.SE) [pdf, ps, other]
Title: Toward Patch Robustness Certification and Detection for Deep Learning Systems Beyond Consistent Samples
Comments: accepted by IEEE Transactions on Reliability; extended technical report
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 8 Dec 2025

[79]  arXiv:2512.05951 [pdf, ps, other]
Title: Trusted AI Agents in the Cloud
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[80]  arXiv:2512.05745 [pdf, ps, other]
Title: ARGUS: Defending Against Multimodal Indirect Prompt Injection via Steering Instruction-Following Behavior
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[81]  arXiv:2512.05707 [pdf, ps, other]
Title: Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2512.05518 [pdf, ps, other]
Title: Matching Ranks Over Probability Yields Truly Deep Safety Alignment
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[83]  arXiv:2512.05485 [pdf, ps, other]
Title: TeleAI-Safety: A comprehensive LLM jailbreaking benchmark towards attacks, defenses, and evaluations
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2512.05459 [pdf, ps, other]
Title: PrivCode: When Code Generation Meets Differential Privacy
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2512.05374 [pdf, ps, other]
Title: Please Don't Kill My Vibe: Empowering Agents with Data Flow Control
Comments: 7 pages, 7 figures, CIDR 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[86]  arXiv:2512.05321 [pdf, ps, other]
Title: A Practical Honeypot-Based Threat Intelligence Framework for Cyber Defence in the Cloud
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2512.05288 [pdf, ps, other]
Title: Beyond Detection: A Comprehensive Benchmark and Study on Representation Learning for Fine-Grained Webshell Family Classification
Authors: Feijiang Han
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[88]  arXiv:2512.04429 (cross-list from quant-ph) [pdf, ps, other]
Title: Combined Quantum and Post-Quantum Security Performance Under Finite Keys
Comments: 10 pages, 5 figures, 1 table
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[89]  arXiv:2509.18874 (cross-list from cs.HC) [pdf, ps, other]
Title: When Ads Become Profiles: Uncovering the Invisible Risk of Web Advertising at Scale with LLMs
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)

Fri, 5 Dec 2025

[90]  arXiv:2512.05065 [pdf, ps, other]
Title: Personalizing Agent Privacy Decisions via Logical Entailment
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2512.04950 [pdf, ps, other]
Title: Opacity problems in multi-energy timed automata
Comments: This is the author version (extended with all proofs) of the manuscript of the same name published in the proceedings of the 41st ACM/SIGAPP Symposium on Applied Computing (SAC 2026)
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2512.04908 [pdf, ps, other]
Title: Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming
Comments: Submitted to FLOPS 2026
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[93]  arXiv:2512.04855 [pdf, ps, other]
Title: A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments
Comments: 22 Pages
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) Vol.17, No.5/6, November 2025
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2512.04841 [pdf, ps, other]
Title: SoK: a Comprehensive Causality Analysis Framework for Large Language Model Security
Authors: Wei Zhao, Zhe Li, Jun Sun
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[95]  arXiv:2512.04675 [pdf, ps, other]
Title: Cryptanalysis of Gleeok-128
Comments: 44 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2512.04668 [pdf, ps, other]
Title: Topology Matters: Measuring Memory Leakage in Multi-Agent LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[97]  arXiv:2512.04611 [pdf, ps, other]
Title: PBFuzz: Agentic Directed Fuzzing for PoV Generation
Comments: 24 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[98]  arXiv:2512.04580 [pdf, ps, other]
Title: CryptoTensors: A Light-Weight Large Language Model File Format for Highly-Secure Model Distribution
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2512.04436 [pdf, ps, other]
Title: ReFuzz: Reusing Tests for Processor Fuzzing with Contextual Bandits
Comments: To be published in the proceedings of the Network and Distributed System Security (NDSS) Symposium, 2026
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2512.04368 [pdf, ps, other]
Title: AutoGuard: A Self-Healing Proactive Security Layer for DevSecOps Pipelines Using Reinforcement Learning
Comments: Accepted and Presented at 1st IEEE Uttar Pradesh Section Women in Engineering International Conference on Electrical Electronics and Computer Engineering (UPWIECON 2025) organized by NIELIT Dehradun held during 30th 31st October 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Performance (cs.PF)
[101]  arXiv:2512.04338 [pdf, ps, other]
Title: One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises
Comments: Proceedings of the 2025 Annual Computer Security Applications Conference (ACSAC' 25), December 8-12, 2025, Honolulu, Hawaii, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[102]  arXiv:2512.04260 [pdf, ps, other]
Title: Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2512.04259 [pdf, ps, other]
Title: WildCode: An Empirical Analysis of Code Generated by ChatGPT
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[104]  arXiv:2512.04254 [pdf, ps, other]
Title: Hey GPT-OSS, Looks Like You Got It -- Now Walk Me Through It! An Assessment of the Reasoning Language Models Chain of Thought Mechanism for Digital Forensics
Comments: Accept at DFRWS EU 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[105]  arXiv:2512.04237 [pdf, ps, other]
Title: Primitive Vector Cipher(PVC): A Hybrid Encryption Scheme based on the Vector Computational Diffie-Hellman (V-CDH) Problem
Comments: Submitted for publication. 19 pages
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2512.04129 [pdf, ps, other]
Title: Tipping the Dominos: Topology-Aware Multi-Hop Attacks on LLM-Based Multi-Agent Systems
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2512.04120 [pdf, ps, other]
Title: Towards Contextual Sensitive Data Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computers and Society (cs.CY); Databases (cs.DB); Information Retrieval (cs.IR)
[108]  arXiv:2512.05069 (cross-list from cs.LG) [pdf, ps, other]
Title: Hybrid Quantum-Classical Autoencoders for Unsupervised Network Intrusion Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[109]  arXiv:2512.04785 (cross-list from cs.AI) [pdf, ps, other]
Title: ASTRIDE: A Security Threat Modeling Platform for Agentic-AI Applications
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[110]  arXiv:2512.04590 (cross-list from cs.LG) [pdf, ps, other]
Title: Exploiting ftrace's function_graph Tracer Features for Machine Learning: A Case Study on Encryption Detection
Comments: Conference paper presented at AICCSA 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[111]  arXiv:2512.04106 (cross-list from cs.SE) [pdf, ps, other]
Title: Retrieval-Augmented Few-Shot Prompting Versus Fine-Tuning for Code Vulnerability Detection
Comments: Accepted in the 3rd International Conference on Foundation and Large Language Models (FLLM2025)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)

Thu, 4 Dec 2025

[112]  arXiv:2512.03792 [pdf, ps, other]
Title: Unfolding Challenges in Securing and Regulating Unmanned Air Vehicles
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.03791 [pdf, ps, other]
Title: CCN: Decentralized Cross-Chain Channel Networks Supporting Secure and Privacy-Preserving Multi-Hop Interactions
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2512.03775 [pdf, ps, other]
Title: "MCP Does Not Stand for Misuse Cryptography Protocol": Uncovering Cryptographic Misuse in Model Context Protocol at Scale
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2512.03765 [pdf, ps, other]
Title: The Treasury Proof Ledger: A Cryptographic Framework for Accountable Bitcoin Treasuries
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2512.03720 [pdf, ps, other]
Title: Context-Aware Hierarchical Learning: A Two-Step Paradigm towards Safer LLMs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.03669 [pdf, ps, other]
Title: Towards Privacy-Preserving Range Queries with Secure Learned Spatial Index over Encrypted Data
Comments: IEEE TrustCom-2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.03641 [pdf, ps, other]
Title: A Descriptive Model for Modelling Attacker Decision-Making in Cyber-Deception
Comments: 24 Pages, 4 Tables
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.03620 [pdf, ps, other]
Title: SELF: A Robust Singular Value and Eigenvalue Approach for LLM Fingerprinting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[120]  arXiv:2512.03551 [pdf, ps, other]
Title: A User Centric Group Authentication Scheme for Secure Communication
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2512.03465 [pdf, ps, other]
Title: Tuning for TraceTarnish: Techniques, Trends, and Testing Tangible Traits
Authors: Robert Dilworth
Comments: 20 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Information Retrieval (cs.IR)
[122]  arXiv:2512.03462 [pdf, ps, other]
Title: A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Comments: 14 pages,2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[123]  arXiv:2512.03461 [pdf, ps, other]
Title: In-Situ Encryption of Single-Transistor Nonvolatile Memories without Density Loss
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[124]  arXiv:2512.03420 [pdf, ps, other]
Title: HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[125]  arXiv:2512.03361 [pdf, ps, other]
Title: Rethinking Security in Semantic Communication: Latent Manipulation as a New Threat
Authors: Zhiyuan Xi, Kun Zhu
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[126]  arXiv:2512.03358 [pdf, ps, other]
Title: Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2512.03356 [pdf, ps, other]
Title: Immunity memory-based jailbreak detection: multi-agent adaptive guard for large language models
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2512.03351 [pdf, ps, other]
Title: Empirical assessment of the perception of graphical threat model acceptability
Comments: Accepted into the Asia-Pacific Software Engineering Conference (APSEC) 2025. Will appear in APSEC 2025 proceedings
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2512.03238 [pdf, ps, other]
Title: How to DP-fy Your Data: A Practical Guide to Generating Synthetic Data With Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[130]  arXiv:2512.03207 [pdf, ps, other]
Title: Technical Report: The Need for a (Research) Sandstorm through the Privacy Sandbox
Comments: Technical report accompanying the research portal Privacy Sandstorm (this https URL) launched after our HotPETs 2024 talk "The Need for a (Research) Sandstorm through the Privacy Sandbox''
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2512.03121 [pdf, ps, other]
Title: Lost in Modality: Evaluating the Effectiveness of Text-Based Membership Inference Attacks on Large Multimodal Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[132]  arXiv:2512.03100 [pdf, ps, other]
Title: Ensemble Privacy Defense for Knowledge-Intensive LLMs against Membership Inference Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[133]  arXiv:2512.03097 [pdf, ps, other]
Title: Many-to-One Adversarial Consensus: Exposing Multi-Agent Collusion Risks in AI-Based Healthcare
Comments: 7 pages Conference level paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[134]  arXiv:2512.03089 [pdf, ps, other]
Title: Password-Activated Shutdown Protocols for Misaligned Frontier Agents
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[135]  arXiv:2512.03088 [pdf, ps, other]
Title: From Oracle Choice to Oracle Lock-In: An Exploratory Study on Blockchain Oracles Supplier Selection
Comments: Not peer reviewed
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Economics (econ.GN)
[136]  arXiv:2512.04044 (cross-list from cs.LG) [pdf, ps, other]
Title: MarkTune: Improving the Quality-Detectability Trade-off in Open-Weight LLM Watermarking
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[137]  arXiv:2512.04008 (cross-list from cs.LG) [pdf, ps, other]
Title: Efficient Public Verification of Private ML via Regularization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[138]  arXiv:2512.03868 (cross-list from cs.SE) [pdf, ps, other]
Title: A Comprehensive Study on the Impact of Vulnerable Dependencies on Open-Source Software
Journal-ref: 2024 IEEE 35th International Symposium on Software Reliability Engineering (ISSRE)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[139]  arXiv:2512.03816 (cross-list from cs.LG) [pdf, ps, other]
Title: Log Probability Tracking of LLM APIs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[140]  arXiv:2512.03771 (cross-list from cs.CL) [pdf, ps, other]
Title: In-Context Representation Hijacking
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[141]  arXiv:2512.03580 (cross-list from cs.CV) [pdf, ps, other]
Title: Dynamic Optical Test for Bot Identification (DOT-BI): A simple check to identify bots in surveys and online processes
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[142]  arXiv:2512.03564 (cross-list from cs.LG) [pdf, ps, other]
Title: Towards Irreversible Machine Unlearning for Diffusion Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[143]  arXiv:2512.03536 (cross-list from cs.NI) [pdf, ps, other]
Title: Mobility Induced Sensitivity of UAV based Nodes to Jamming in Private 5G Airfield Networks An Experimental Study
Comments: 4 pages, 4 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Robotics (cs.RO)
[144]  arXiv:2512.03310 (cross-list from cs.CL) [pdf, ps, other]
Title: Randomized Masked Finetuning: An Efficient Way to Mitigate Memorization of PIIs in LLMs
Comments: To be submitted for ICML 2026
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145]  arXiv:2512.03079 (cross-list from cs.CL) [pdf, ps, other]
Title: Watermarks for Embeddings-as-a-Service Large Language Models
Authors: Anudeex Shetty
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 145 entries: 1-100 | 46-145 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)