We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 63

[ total of 145 entries: 1-25 | 14-38 | 39-63 | 64-88 | 89-113 | 114-138 | 139-145 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 9 Dec 2025 (continued, showing last 15 of 47 entries)

[64]  arXiv:2512.06048 [pdf, ps, other]
Title: The Road of Adaptive AI for Precision in Cybersecurity
Authors: Sahil Garg
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[65]  arXiv:2512.06033 [pdf, ps, other]
Title: Sell Data to AI Algorithms Without Revealing It: Secure Data Valuation and Sharing via Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[66]  arXiv:2512.07814 (cross-list from cs.SE) [pdf, ps, other]
Title: Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach
Comments: 21 pages, 8 figures
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[67]  arXiv:2512.07574 (cross-list from eess.IV) [pdf, ps, other]
Title: Precise Liver Tumor Segmentation in CT Using a Hybrid Deep Learning-Radiomics Framework
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[68]  arXiv:2512.07520 (cross-list from cs.AR) [pdf, ps, other]
Title: aLEAKator: HDL Mixed-Domain Simulation for Masked Hardware \& Software Formal Verification
Authors: Noé Amiot (ALSOC), Quentin L. Meunier (ALSOC), Karine Heydemann (ALSOC), Emmanuelle Encrenaz (ALSOC)
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[69]  arXiv:2512.07368 (cross-list from cs.SE) [pdf, ps, other]
Title: Challenges in Developing Secure Software -- Results of an Interview Study in the German Software Industry
Comments: This paper includes 6 pages, 1 table, 1 figure. It is an English translation of our paper published in the German journal "Softwaretechnik Trends": ISSN 0720-8928, vol. 45, no. 4, pp. 2-7, year 2025
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[70]  arXiv:2512.07247 (cross-list from cs.CV) [pdf, ps, other]
Title: AdLift: Lifting Adversarial Perturbations to Safeguard 3D Gaussian Splatting Assets Against Instruction-Driven Editing
Comments: 40 pages, 34 figures, 18 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2512.07228 (cross-list from cs.CV) [pdf, ps, other]
Title: Towards Robust Protective Perturbation against DeepFake Face Swapping
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2512.06971 (cross-list from cs.LG) [pdf, ps, other]
Title: Prediction with Expert Advice under Local Differential Privacy
Comments: 19 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[73]  arXiv:2512.06925 (cross-list from cs.LG) [pdf, ps, other]
Title: Deep Reinforcement Learning for Phishing Detection with Transformer-Based Semantic Features
Authors: Aseer Al Faisal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[74]  arXiv:2512.06906 (cross-list from cs.SE) [pdf, ps, other]
Title: MINES: Explainable Anomaly Detection through Web API Invariant Inference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[75]  arXiv:2512.06716 (cross-list from cs.AI) [pdf, ps, other]
Title: Cognitive Control Architecture (CCA): A Lifecycle Supervision Framework for Robustly Aligned AI Agents
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[76]  arXiv:2512.06304 (cross-list from eess.AS) [pdf, ps, other]
Title: Degrading Voice: A Comprehensive Overview of Robust Voice Conversion Through Input Manipulation
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Sound (cs.SD)
[77]  arXiv:2512.06243 (cross-list from cs.LG) [pdf, ps, other]
Title: Quantization Blindspots: How Model Compression Breaks Backdoor Defenses
Authors: Rohan Pandey, Eric Ye
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[78]  arXiv:2512.06123 (cross-list from cs.SE) [pdf, ps, other]
Title: Toward Patch Robustness Certification and Detection for Deep Learning Systems Beyond Consistent Samples
Comments: accepted by IEEE Transactions on Reliability; extended technical report
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 8 Dec 2025 (showing first 10 of 11 entries)

[79]  arXiv:2512.05951 [pdf, ps, other]
Title: Trusted AI Agents in the Cloud
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[80]  arXiv:2512.05745 [pdf, ps, other]
Title: ARGUS: Defending Against Multimodal Indirect Prompt Injection via Steering Instruction-Following Behavior
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[81]  arXiv:2512.05707 [pdf, ps, other]
Title: Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2512.05518 [pdf, ps, other]
Title: Matching Ranks Over Probability Yields Truly Deep Safety Alignment
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[83]  arXiv:2512.05485 [pdf, ps, other]
Title: TeleAI-Safety: A comprehensive LLM jailbreaking benchmark towards attacks, defenses, and evaluations
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2512.05459 [pdf, ps, other]
Title: PrivCode: When Code Generation Meets Differential Privacy
Comments: Accepted at NDSS 2026; code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2512.05374 [pdf, ps, other]
Title: Please Don't Kill My Vibe: Empowering Agents with Data Flow Control
Comments: 7 pages, 7 figures, CIDR 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[86]  arXiv:2512.05321 [pdf, ps, other]
Title: A Practical Honeypot-Based Threat Intelligence Framework for Cyber Defence in the Cloud
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2512.05288 [pdf, ps, other]
Title: Beyond Detection: A Comprehensive Benchmark and Study on Representation Learning for Fine-Grained Webshell Family Classification
Authors: Feijiang Han
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[88]  arXiv:2512.04429 (cross-list from quant-ph) [pdf, ps, other]
Title: Combined Quantum and Post-Quantum Security Performance Under Finite Keys
Comments: 10 pages, 5 figures, 1 table
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 145 entries: 1-25 | 14-38 | 39-63 | 64-88 | 89-113 | 114-138 | 139-145 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)