We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 82

[ total of 154 entries: 1-25 | 8-32 | 33-57 | 58-82 | 83-107 | 108-132 | 133-154 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 12 Dec 2025 (continued, showing last 19 of 32 entries)

[83]  arXiv:2512.10296 [pdf, ps, other]
Title: FLARE: A Wireless Side-Channel Fingerprinting Attack on Federated Learning
Comments: This paper has been accepted for publication in IEEE INFOCOM 2026 - IEEE Conference on Computer Communications
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[84]  arXiv:2512.10280 [pdf, ps, other]
Title: Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[85]  arXiv:2512.10185 [pdf, ps, other]
Title: Watermarks for Language Models via Probabilistic Automata
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[86]  arXiv:2512.10135 [pdf, ps, other]
Title: Lightweight Security for Private Networks: Real-World Evaluation of WireGuard
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); High Energy Physics - Experiment (hep-ex)
[87]  arXiv:2512.10104 [pdf, ps, other]
Title: Phishing Email Detection Using Large Language Models
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[88]  arXiv:2512.10088 [pdf, ps, other]
Title: Evaluation of Risk and Resilience of the MBTA Green Rapid Transit System
Comments: 28 pages, multiple figures. Course project (CY 5250, Northeastern University)
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2512.10029 [pdf, ps, other]
Title: Malicious GenAI Chrome Extensions: Unpacking Data Exfiltration and Malicious Behaviours
Comments: VIRUS BULLETIN CONFERENCE SEPTEMBER 2025
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2512.10020 [pdf, ps, other]
Title: A Comparative Analysis of zk-SNARKs and zk-STARKs: Theory and Practice
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[91]  arXiv:2512.09959 [pdf, ps, other]
Title: TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2512.09958 [pdf, ps, other]
Title: When Quantum Federated Learning Meets Blockchain in 6G Networks
Comments: Accepted at IEEE Communications Standards Magazine
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[93]  arXiv:2512.09954 [pdf, ps, other]
Title: Cross-Layer Isochronous Diffusion Protocol (CIDP): A Rigorous Information-Theoretic and Control-Theoretic Framework for Sovereign Tactical Anonymity
Authors: Pravin G
Comments: 11 pages, 4 figures, 4 tables, with full proofs and FPGA prototype evaluation
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2512.09953 [pdf, ps, other]
Title: ZK-APEX: Zero-Knowledge Approximate Personalized Unlearning with Executable Proofs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[95]  arXiv:2512.09938 [pdf, ps, other]
Title: Blockchain-Anchored Audit Trail Model for Transparent Inter-Operator Settlement
Journal-ref: INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING; 2024;https://www.ijisae.org/index.php/IJISAE/article/view/7919/6939
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[96]  arXiv:2512.09934 [pdf, ps, other]
Title: IoTEdu: Access Control, Detection, and Automatic Incident Response in Academic IoT Networks
Comments: 5 pages, 2 figures, and 3 tables, accepted for presentation at ERRC/WRSeg 2025
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI); Software Engineering (cs.SE)
[97]  arXiv:2512.10652 (cross-list from cs.CV) [pdf, ps, other]
Title: TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[98]  arXiv:2512.10449 (cross-list from cs.AI) [pdf, ps, other]
Title: When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[99]  arXiv:2512.10203 (cross-list from econ.TH) [pdf, ps, other]
Title: On Sybil Proofness in Competitive Combinatorial Exchanges
Authors: Abhimanyu Nag
Comments: 26 Pages, Accepted to FC26 as a poster
Subjects: Theoretical Economics (econ.TH); Cryptography and Security (cs.CR)
[100]  arXiv:2512.09957 (cross-list from cs.DC) [pdf, ps, other]
Title: CloudFix: Automated Policy Repair for Cloud Access Control Policies Using Large Language Models
Comments: 10 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[101]  arXiv:2512.09941 (cross-list from cs.IT) [pdf, ps, other]
Title: Fourier Sparsity of Delta Functions and Matching Vector PIRs
Comments: Full version. Accepted to ITCS 2026
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Combinatorics (math.CO)

Thu, 11 Dec 2025 (showing first 6 of 22 entries)

[102]  arXiv:2512.09883 [pdf, ps, other]
Title: ByteShield: Adversarially Robust End-to-End Malware Detection through Byte Masking
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2512.09872 [pdf, ps, other]
Title: FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning
Comments: Accepted in IEEE HOST 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[104]  arXiv:2512.09769 [pdf, ps, other]
Title: Defining Cost Function of Steganography with Large Language Models
Authors: Hanzhou Wu, Yige Wang
Comments: Some minor typo errors are corrected, this https URL&user=IdiF7M0AAAAJ
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2512.09549 [pdf, ps, other]
Title: Chasing Shadows: Pitfalls in LLM Security Research
Comments: About to appear at NDSS'26
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2512.09539 [pdf, ps, other]
Title: Comparative Analysis of Hash-based Malware Clustering via K-Means
Comments: To be published in the proceedings of the 8th International Conference on Reliable Information and Communication Technology (IRICT 2025). Springer Book Series: "Lecture Notes on Data Engineering and Communications Technologies"
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107]  arXiv:2512.09485 [pdf, ps, other]
Title: Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks
Comments: Accepted by IEEE JSAC. This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 154 entries: 1-25 | 8-32 | 33-57 | 58-82 | 83-107 | 108-132 | 133-154 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)