We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 150

[ total of 182 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-182 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 1 Dec 2025 (continued, showing 25 of 43 entries)

[151]  arXiv:2511.22441 [pdf, ps, other]
Title: GEO-Detective: Unveiling Location Privacy Risks in Images with LLM Agents
Comments: 15 pages with 7 figures and 12 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[152]  arXiv:2511.22434 [pdf, ps, other]
Title: FastFHE: Packing-Scalable and Depthwise-Separable CNN Inference Over FHE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[153]  arXiv:2511.22416 [pdf, ps, other]
Title: Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2511.22415 [pdf, ps, other]
Title: Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Comments: Workshop on Safe and Robust Robot Learning for Operation in the Real World at CoRL 2025
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2511.22340 [pdf, ps, other]
Title: Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Journal-ref: WiSec 2024: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165]  arXiv:2511.22017 [pdf, ps, other]
Title: POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2511.21999 [pdf, ps, other]
Title: GECKO: Securing Digital Assets Through(out) the Physical World (Extended Technical Report)
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2511.21901 [pdf, ps, other]
Title: Standardized Threat Taxonomy for AI Security, Governance, and Regulatory Compliance
Authors: Hernan Huwyler
Comments: 10 pages, LaTeX. Preprint available on Zenodo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Risk Management (q-fin.RM)
[168]  arXiv:2511.21804 [pdf, ps, other]
Title: Beyond Membership: Limitations of Add/Remove Adjacency in Differential Privacy
Comments: 17 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2511.21803 [pdf, ps, other]
Title: Cross-Layer Detection of Wireless Misbehavior Using 5G RAN Telemetry and Operational Metadata
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2511.21795 [pdf, ps, other]
Title: Advanced Data Collection Techniques in Cloud Security: A Multi-Modal Deep Learning Autoencoder Approach
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2511.21768 [pdf, ps, other]
Title: Categorical Framework for Quantum-Resistant Zero-Trust AI Security
Subjects: Cryptography and Security (cs.CR); Category Theory (math.CT); Quantum Physics (quant-ph)
[172]  arXiv:2511.21764 [pdf, ps, other]
Title: Adaptive Detection of Polymorphic Malware: Leveraging Mutation Engines and YARA Rules for Enhanced Security
Comments: 11 pages, 4 figures, 4 tables, 2 snapshots. Author Chinmay Prawah Pant contributed to proofreading, presentation improvements, and organizational support; core research, methodology, and experimentation were conducted by the main authors
Subjects: Cryptography and Security (cs.CR)
[173]  arXiv:2511.21758 [pdf, ps, other]
Title: A Longitudinal Measurement of Privacy Policy Evolution for Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[174]  arXiv:2511.23406 (cross-list from cs.IT) [pdf, ps, other]
Title: Quantum Private Distributed Matrix Multiplication With Degree Tables
Comments: The abstract here is trimmed due to the space limitations in the submission process
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP); Quantum Physics (quant-ph)
[175]  arXiv:2511.23278 (cross-list from cs.NI) [pdf, ps, other]
Title: RetryGuard: Preventing Self-Inflicted Retry Storms in Cloud Microservices Applications
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[ total of 182 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-182 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)