We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 64

[ total of 182 entries: 1-100 | 65-164 | 165-182 ]
[ showing 100 entries per page: fewer | more | all ]

Wed, 3 Dec 2025 (continued, showing last 21 of 29 entries)

[65]  arXiv:2512.02418 [pdf, ps, other]
Title: Leveraging Large Language Models to Bridge On-chain and Off-chain Transparency in Stablecoins
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2512.02414 [pdf, ps, other]
Title: Characterizing Cyber Attacks against Space Infrastructures with Missing Data: Framework and Case Study
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2512.02399 [pdf, ps, other]
Title: AtomGraph: Tackling Atomicity Violation in Smart Contracts using Multimodal GCNs
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2512.02321 [pdf, ps, other]
Title: LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[69]  arXiv:2512.02318 [pdf, ps, other]
Title: COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[70]  arXiv:2512.02301 [pdf, ps, other]
Title: Quantum Vanguard: Server Optimized Privacy Fortified Federated Intelligence for Future Vehicles
Comments: Under Review
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2512.02287 [pdf, ps, other]
Title: HOT Protocol
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2512.02270 [pdf, ps, other]
Title: Property-Guided Cyber-Physical Reduction and Surrogation for Safety Analysis in Robotic Vehicles
Comments: Accepted at EAI SmartSP 2025 (EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles), Springer LNICST. The code repository is available here: this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[73]  arXiv:2512.02259 [pdf, ps, other]
Title: CVE Breadcrumbs: Tracking Vulnerabilities Through Versioned Apache Libraries
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[74]  arXiv:2512.02243 [pdf, ps, other]
Title: PhishSnap: Image-Based Phishing Detection Using Perceptual Hashing
Comments: IEE Standard Formatting, 3 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[75]  arXiv:2512.02157 [pdf, ps, other]
Title: Factor(T,U): Factored Cognition Strengthens Monitoring of Untrusted AI
Comments: 7 pages body; 19 pages total; 8 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[76]  arXiv:2512.02087 [pdf, ps, other]
Title: A survey about Hidden Subgroup Problem from a mathematical and cryptographic perspective
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2512.02082 [pdf, ps, other]
Title: Deterministic Random Bit Generators Based on Ascon for Embedded Systems
Authors: Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2512.02069 [pdf, ps, other]
Title: Large Language Model based Smart Contract Auditing with LLMBugScanner
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[79]  arXiv:2512.02062 [pdf, ps, other]
Title: Superpixel Attack: Enhancing Black-box Adversarial Attack with Image-driven Division Areas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[80]  arXiv:2512.02973 (cross-list from cs.CV) [pdf, ps, other]
Title: Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[81]  arXiv:2512.02410 (cross-list from cs.MA) [pdf, ps, other]
Title: Decentralized Multi-Agent System with Trust-Aware Communication
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)
[82]  arXiv:2512.02306 (cross-list from cs.AI) [pdf, ps, other]
Title: OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[83]  arXiv:2512.02276 (cross-list from cs.NI) [pdf, ps, other]
Title: Adversarial Robustness of Traffic Classification under Resource Constraints: Input Structure Matters
Comments: Accepted at the 2025 IEEE International Symposium on Networks, Computers and Communications (ISNCC)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[84]  arXiv:2512.02047 (cross-list from cs.CY) [pdf, ps, other]
Title: Copyright in AI Pre-Training Data Filtering: Regulatory Landscape and Mitigation Strategies
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[85]  arXiv:2512.02046 (cross-list from cs.CY) [pdf, ps, other]
Title: Global AI Governance Overview: Understanding Regulatory Requirements Across Global Jurisdictions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)

Tue, 2 Dec 2025

[86]  arXiv:2512.01893 [pdf, ps, other]
Title: Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration
Comments: Data and code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2512.01891 [pdf, ps, other]
Title: Behind the Curtain: How Shared Hosting Providers Respond to Vulnerability Notifications
Comments: Accepted at IEEE S&P 2026
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2512.01845 [pdf, ps, other]
Title: JPEGs Just Got Snipped: Croppable Signatures Against Deepfake Images
Journal-ref: 2025 International Joint Conference on Neural Networks (IJCNN)
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2512.01832 [pdf, ps, other]
Title: A Privacy-Preserving Information-Sharing Protocol for Federated Authentication
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2512.01727 [pdf, ps, other]
Title: AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2512.01666 [pdf, ps, other]
Title: Demystifying Feature Engineering in Malware Analysis of API Call Sequences
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2512.01651 [pdf, ps, other]
Title: Rethinking Cybersecurity Ontology Classification and Evaluation: Towards a Credibility-Centered Framework
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2512.01604 [pdf, ps, other]
Title: On the Context-Hiding Property of Shamir-Based Homomorphic Secret Sharing
Comments: 2025 IEEE International Symposium on Information Theory
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2512.01596 [pdf, ps, other]
Title: Towards a Multi-Layer Defence Framework for Securing Near-Real-Time Operations in Open RAN
Comments: This is the authors preprint version. The manuscript has been submitted to IEEE
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[95]  arXiv:2512.01595 [pdf, ps, other]
Title: WhiteLie: A Robust System for Spoofing User Data in Android Platforms
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2512.01594 [pdf, ps, other]
Title: Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[97]  arXiv:2512.01577 [pdf, ps, other]
Title: Beyond the Hype: A Large-Scale Empirical Analysis of On-Chain Transactions in NFT Scams
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2512.01574 [pdf, ps, other]
Title: IVE: An Accelerator for Single-Server Private Information Retrieval Using Versatile Processing Elements
Comments: 15 pages, 14 figures, accepted at HPCA 2026
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[99]  arXiv:2512.01437 [pdf, ps, other]
Title: Inside Qubic's Selfish Mining Campaign on Monero: Evidence, Tactics, and Limits
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2512.01391 [pdf, ps, other]
Title: INFERMAL: Inferential analysis of maliciously registered domains
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[101]  arXiv:2512.01353 [pdf, ps, other]
Title: The Trojan Knowledge: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2512.01335 [pdf, ps, other]
Title: EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
Comments: Accepted to ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[103]  arXiv:2512.01326 [pdf, ps, other]
Title: Securing Large Language Models (LLMs) from Prompt Injection Attacks
Comments: 10 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[104]  arXiv:2512.01295 [pdf, ps, other]
Title: Systems Security Foundations for Agentic Computing
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2512.01255 [pdf, ps, other]
Title: Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Software Engineering (cs.SE)
[106]  arXiv:2512.01247 [pdf, ps, other]
Title: Benchmarking and Understanding Safety Risks in AI Character Platforms
Comments: Accepted to NDSS '26: The Network and Distributed System Security Symposium 2026
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[107]  arXiv:2512.01233 [pdf, ps, other]
Title: CTF Archive: Capture, Curate, Learn Forever
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2512.01185 [pdf, ps, other]
Title: DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.01164 [pdf, ps, other]
Title: Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[110]  arXiv:2512.01115 [pdf, ps, other]
Title: Sliced Rényi Pufferfish Privacy: Directional Additive Noise Mechanism and Private Learning with Gradient Clipping
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.00966 [pdf, ps, other]
Title: Mitigating Indirect Prompt Injection via Instruction-Following Intent Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2512.00857 [pdf, ps, other]
Title: Hesperus is Phosphorus: Mapping Threat Actor Naming Taxonomies at Scale
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.00833 [pdf, ps, other]
Title: Logic Encryption: This Time for Real
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[114]  arXiv:2512.00804 [pdf, ps, other]
Title: Bias Injection Attacks on RAG Databases and Sanitization Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[115]  arXiv:2512.00741 [pdf, ps, other]
Title: MASCOT: Analyzing Malware Evolution Through A Well-Curated Source Code Dataset
Comments: 11 pages, 6 figures, conference paper; submitted to IEEE BigData 2025 CyberHunt workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2512.00713 [pdf, ps, other]
Title: Concept-Guided Backdoor Attack on Vision Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.00645 [pdf, ps, other]
Title: Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Comments: Accepted at EAI International Conference on Digital Forensics & Cyber Crime 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.00635 [pdf, ps, other]
Title: Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Authors: Archisman Ghosh
Comments: This extended abstract is archived for educational purposes as an example for different PhD forum competitions. Total page is 3
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.00591 [pdf, ps, other]
Title: TrojanLoC: LLM-based Framework for RTL Trojan Localization
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2512.00480 [pdf, ps, other]
Title: A Unified Framework for Constructing Information-Theoretic Private Information Retrieval
Authors: Liang Feng Zhang
Comments: 22 pages
Journal-ref: Pragmatic Cybersecurity 2025, 1 (1), 3
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2512.00436 [pdf, ps, other]
Title: RECTor: Robust and Efficient Correlation Attack on Tor
Comments: 8 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[122]  arXiv:2512.00414 [pdf, ps, other]
Title: BEACON: Automatic Container Policy Generation using Environment-aware Dynamic Analysis
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2512.00412 [pdf, ps, other]
Title: Red Teaming Large Reasoning Models
Comments: 30 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2512.00377 [pdf, ps, other]
Title: Measuring Memecoin Fragility
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[125]  arXiv:2512.00142 [pdf, ps, other]
Title: DeFi TrustBoost: Blockchain and AI for Trustworthy Decentralized Financial Decisions
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computational Finance (q-fin.CP); General Finance (q-fin.GN)
[126]  arXiv:2512.00136 [pdf, ps, other]
Title: An Empirical Study on the Security Vulnerabilities of GPTs
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2512.00119 [pdf, ps, other]
Title: NetDeTox: Adversarial and Efficient Evasion of Hardware-Security GNNs via RL-LLM Orchestration
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[128]  arXiv:2512.00110 [pdf, ps, other]
Title: Quantum-Adversary-Resilient Evidence Structures and Migration Strategies for Regulated AI Audit Trails
Authors: Leo Kao
Comments: 15 pages, 1 table. Technical report for regulated AI audit trails with quantum-adversary security definitions and migration patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[129]  arXiv:2512.00098 [pdf, ps, other]
Title: Guarding Against Malicious Biased Threats (GAMBiT): Experimental Design of Cognitive Sensors and Triggers with Behavioral Impact Analysis
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[130]  arXiv:2512.00094 [pdf, ps, other]
Title: HMARK: Radioactive Multi-Bit Semantic-Latent Watermarking for Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[131]  arXiv:2512.01974 (cross-list from eess.SP) [pdf, ps, other]
Title: The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain
Authors: Keshab K. Parhi
Comments: Proc. 2025 Asilomar conference on Signals, Systems, and Computers
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[132]  arXiv:2512.01396 (cross-list from cs.SE) [pdf, ps, other]
Title: BackportBench: A Multilingual Benchmark for Automated Backporting of Patches
Comments: Under review
Subjects: Software Engineering (cs.SE); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[133]  arXiv:2512.00734 (cross-list from math.ST) [pdf, ps, other]
Title: Infinitely divisible privacy and beyond I: resolution of the $s^2=2k$ conjecture
Comments: Comments welcome. Abstract shortened based on arxiv requirement
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR); Machine Learning (stat.ML)
[134]  arXiv:2512.00699 (cross-list from quant-ph) [pdf, ps, other]
Title: DyLoC: A Dual-Layer Architecture for Secure and Trainable Quantum Machine Learning Under Polynomial-DLA constraint
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[135]  arXiv:2512.00595 (cross-list from cs.DC) [pdf, ps, other]
Title: IslandRun: Privacy-Aware Multi-Objective Orchestration for Distributed AI Inference
Comments: 15 pages, 3 figures, 2 tables
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[136]  arXiv:2512.00434 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy-Preserving Generative Modeling and Clinical Validation of Longitudinal Health Records for Chronic Disease
Comments: To appear in Proceedings of Machine Learning Research Volume 297 - Proceedings of ML4H 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[137]  arXiv:2512.00272 (cross-list from cs.LG) [pdf, ps, other]
Title: Teleportation-Based Defenses for Privacy in Approximate Machine Unlearning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[138]  arXiv:2512.00251 (cross-list from cs.LG) [pdf, ps, other]
Title: SD-CGAN: Conditional Sinkhorn Divergence GAN for DDoS Anomaly Detection in IoT Networks
Comments: 7 pages, 6 figures, camera-ready version accepted for presentation at IEEE ICNC 2026
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[139]  arXiv:2512.00218 (cross-list from cs.AI) [pdf, ps, other]
Title: Reasoning Under Pressure: How do Training Incentives Influence Chain-of-Thought Monitorability?
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 1 Dec 2025 (showing first 25 of 43 entries)

[140]  arXiv:2511.23408 [pdf, ps, other]
Title: Evaluating LLMs for One-Shot Patching of Real and Artificial Vulnerabilities
Comments: Pre-print - Extended version of the poster paper accepted at the 41st ACM/SIGAPP Symposium on Applied Computing (SAC) Smarter Engineering-Building AI and Building with AI (SEAI) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[141]  arXiv:2511.23393 [pdf, ps, other]
Title: FedSGT: Exact Federated Unlearning via Sequential Group-based Training
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2511.23252 [pdf, ps, other]
Title: One-Shot Secure Aggregation: A Hybrid Cryptographic Protocol for Private Federated Learning in IoT
Comments: 11 pages, 6 figures. Accepted at The 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143]  arXiv:2511.23200 [pdf, ps, other]
Title: Quantifying the Privacy-Utility Trade-off in GPS-based Daily Stress Recognition using Semantic Features
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[144]  arXiv:2511.23198 [pdf, ps, other]
Title: Clustering Malware at Scale: A First Full-Benchmark Study
Comments: pre-print of the paper (i.e. "submitted manuscript" version); small updates to the tables, figures, and text were made in order to report the correct results on Ember
Journal-ref: ARES 2025. Lecture Notes in Computer Science vol 15993. pp 231-251
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145]  arXiv:2511.23183 [pdf, ps, other]
Title: Identification of Malicious Posts on the Dark Web Using Supervised Machine Learning
Comments: Manuscript under review (SN Computer Science)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[146]  arXiv:2511.23026 [pdf, ps, other]
Title: A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks
Authors: Kassem Kallas
Comments: My PhD Thesis in Information Engineering and Sciences defended at University of Siena in Italy in 2017 under the supervision of Professor Mauro Barni
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[147]  arXiv:2511.22791 [pdf, ps, other]
Title: An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks
Comments: This paper has been accepted for publication in the Proceedings of the 44th AIAA/IEEE Digital Avionics Systems Conference (DASC) 2025, where it received the Best Paper of Session Award
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[148]  arXiv:2511.22788 [pdf, ps, other]
Title: PRISM: Privacy-Aware Routing for Adaptive Cloud-Edge LLM Inference via Semantic Sketch Collaboration
Comments: Accepted to AAAI 2026. This is the arXiv preprint version
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[149]  arXiv:2511.22700 [pdf, ps, other]
Title: Ghosting Your LLM: Without The Knowledge of Your Gradient and Data
Authors: Abeer Matar A. Almalky (1), Ziyan Wang (2), Mohaiminul Al Nahian (1), Li Yang (2), Adnan Siraj Rakin (1) ((1) Binghamton University, (2) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2511.22681 [pdf, ps, other]
Title: CacheTrap: Injecting Trojans in LLMs without Leaving any Traces in Inputs or Weights
Authors: Mohaiminul Al Nahian (1), Abeer Matar A. Almalky (1), Gamana Aragonda (2), Ranyang Zhou (2), Sabbir Ahmed (1), Dmitry Ponomarev (1), Li Yang (3), Shaahin Angizi (2), Adnan Siraj Rakin (1) ((1) SUNY Binghamton, (2) New Jersey Institute of Technology, (3) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2511.22441 [pdf, ps, other]
Title: GEO-Detective: Unveiling Location Privacy Risks in Images with LLM Agents
Comments: 15 pages with 7 figures and 12 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[152]  arXiv:2511.22434 [pdf, ps, other]
Title: FastFHE: Packing-Scalable and Depthwise-Separable CNN Inference Over FHE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[153]  arXiv:2511.22416 [pdf, ps, other]
Title: Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2511.22415 [pdf, ps, other]
Title: Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Comments: Workshop on Safe and Robust Robot Learning for Operation in the Real World at CoRL 2025
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2511.22340 [pdf, ps, other]
Title: Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Journal-ref: WiSec 2024: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 182 entries: 1-100 | 65-164 | 165-182 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)