We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 139

[ total of 182 entries: 1-25 | ... | 65-89 | 90-114 | 115-139 | 140-164 | 165-182 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 1 Dec 2025 (showing first 25 of 43 entries)

[140]  arXiv:2511.23408 [pdf, ps, other]
Title: Evaluating LLMs for One-Shot Patching of Real and Artificial Vulnerabilities
Comments: Pre-print - Extended version of the poster paper accepted at the 41st ACM/SIGAPP Symposium on Applied Computing (SAC) Smarter Engineering-Building AI and Building with AI (SEAI) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[141]  arXiv:2511.23393 [pdf, ps, other]
Title: FedSGT: Exact Federated Unlearning via Sequential Group-based Training
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2511.23252 [pdf, ps, other]
Title: One-Shot Secure Aggregation: A Hybrid Cryptographic Protocol for Private Federated Learning in IoT
Comments: 11 pages, 6 figures. Accepted at The 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143]  arXiv:2511.23200 [pdf, ps, other]
Title: Quantifying the Privacy-Utility Trade-off in GPS-based Daily Stress Recognition using Semantic Features
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[144]  arXiv:2511.23198 [pdf, ps, other]
Title: Clustering Malware at Scale: A First Full-Benchmark Study
Comments: pre-print of the paper (i.e. "submitted manuscript" version); small updates to the tables, figures, and text were made in order to report the correct results on Ember
Journal-ref: ARES 2025. Lecture Notes in Computer Science vol 15993. pp 231-251
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145]  arXiv:2511.23183 [pdf, ps, other]
Title: Identification of Malicious Posts on the Dark Web Using Supervised Machine Learning
Comments: Manuscript under review (SN Computer Science)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[146]  arXiv:2511.23026 [pdf, ps, other]
Title: A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks
Authors: Kassem Kallas
Comments: My PhD Thesis in Information Engineering and Sciences defended at University of Siena in Italy in 2017 under the supervision of Professor Mauro Barni
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[147]  arXiv:2511.22791 [pdf, ps, other]
Title: An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks
Comments: This paper has been accepted for publication in the Proceedings of the 44th AIAA/IEEE Digital Avionics Systems Conference (DASC) 2025, where it received the Best Paper of Session Award
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[148]  arXiv:2511.22788 [pdf, ps, other]
Title: PRISM: Privacy-Aware Routing for Adaptive Cloud-Edge LLM Inference via Semantic Sketch Collaboration
Comments: Accepted to AAAI 2026. This is the arXiv preprint version
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[149]  arXiv:2511.22700 [pdf, ps, other]
Title: Ghosting Your LLM: Without The Knowledge of Your Gradient and Data
Authors: Abeer Matar A. Almalky (1), Ziyan Wang (2), Mohaiminul Al Nahian (1), Li Yang (2), Adnan Siraj Rakin (1) ((1) Binghamton University, (2) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2511.22681 [pdf, ps, other]
Title: CacheTrap: Injecting Trojans in LLMs without Leaving any Traces in Inputs or Weights
Authors: Mohaiminul Al Nahian (1), Abeer Matar A. Almalky (1), Gamana Aragonda (2), Ranyang Zhou (2), Sabbir Ahmed (1), Dmitry Ponomarev (1), Li Yang (3), Shaahin Angizi (2), Adnan Siraj Rakin (1) ((1) SUNY Binghamton, (2) New Jersey Institute of Technology, (3) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2511.22441 [pdf, ps, other]
Title: GEO-Detective: Unveiling Location Privacy Risks in Images with LLM Agents
Comments: 15 pages with 7 figures and 12 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[152]  arXiv:2511.22434 [pdf, ps, other]
Title: FastFHE: Packing-Scalable and Depthwise-Separable CNN Inference Over FHE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[153]  arXiv:2511.22416 [pdf, ps, other]
Title: Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2511.22415 [pdf, ps, other]
Title: Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Comments: Workshop on Safe and Robust Robot Learning for Operation in the Real World at CoRL 2025
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2511.22340 [pdf, ps, other]
Title: Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Journal-ref: WiSec 2024: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 182 entries: 1-25 | ... | 65-89 | 90-114 | 115-139 | 140-164 | 165-182 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)