We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 114

[ total of 182 entries: 1-50 | 15-64 | 65-114 | 115-164 | 165-182 ]
[ showing 50 entries per page: fewer | more | all ]

Tue, 2 Dec 2025 (continued, showing last 25 of 54 entries)

[115]  arXiv:2512.00741 [pdf, ps, other]
Title: MASCOT: Analyzing Malware Evolution Through A Well-Curated Source Code Dataset
Comments: 11 pages, 6 figures, conference paper; submitted to IEEE BigData 2025 CyberHunt workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2512.00713 [pdf, ps, other]
Title: Concept-Guided Backdoor Attack on Vision Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.00645 [pdf, ps, other]
Title: Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Comments: Accepted at EAI International Conference on Digital Forensics & Cyber Crime 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.00635 [pdf, ps, other]
Title: Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Authors: Archisman Ghosh
Comments: This extended abstract is archived for educational purposes as an example for different PhD forum competitions. Total page is 3
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.00591 [pdf, ps, other]
Title: TrojanLoC: LLM-based Framework for RTL Trojan Localization
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2512.00480 [pdf, ps, other]
Title: A Unified Framework for Constructing Information-Theoretic Private Information Retrieval
Authors: Liang Feng Zhang
Comments: 22 pages
Journal-ref: Pragmatic Cybersecurity 2025, 1 (1), 3
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2512.00436 [pdf, ps, other]
Title: RECTor: Robust and Efficient Correlation Attack on Tor
Comments: 8 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[122]  arXiv:2512.00414 [pdf, ps, other]
Title: BEACON: Automatic Container Policy Generation using Environment-aware Dynamic Analysis
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2512.00412 [pdf, ps, other]
Title: Red Teaming Large Reasoning Models
Comments: 30 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2512.00377 [pdf, ps, other]
Title: Measuring Memecoin Fragility
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[125]  arXiv:2512.00142 [pdf, ps, other]
Title: DeFi TrustBoost: Blockchain and AI for Trustworthy Decentralized Financial Decisions
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computational Finance (q-fin.CP); General Finance (q-fin.GN)
[126]  arXiv:2512.00136 [pdf, ps, other]
Title: An Empirical Study on the Security Vulnerabilities of GPTs
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2512.00119 [pdf, ps, other]
Title: NetDeTox: Adversarial and Efficient Evasion of Hardware-Security GNNs via RL-LLM Orchestration
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[128]  arXiv:2512.00110 [pdf, ps, other]
Title: Quantum-Adversary-Resilient Evidence Structures and Migration Strategies for Regulated AI Audit Trails
Authors: Leo Kao
Comments: 15 pages, 1 table. Technical report for regulated AI audit trails with quantum-adversary security definitions and migration patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[129]  arXiv:2512.00098 [pdf, ps, other]
Title: Guarding Against Malicious Biased Threats (GAMBiT): Experimental Design of Cognitive Sensors and Triggers with Behavioral Impact Analysis
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[130]  arXiv:2512.00094 [pdf, ps, other]
Title: HMARK: Radioactive Multi-Bit Semantic-Latent Watermarking for Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[131]  arXiv:2512.01974 (cross-list from eess.SP) [pdf, ps, other]
Title: The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain
Authors: Keshab K. Parhi
Comments: Proc. 2025 Asilomar conference on Signals, Systems, and Computers
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[132]  arXiv:2512.01396 (cross-list from cs.SE) [pdf, ps, other]
Title: BackportBench: A Multilingual Benchmark for Automated Backporting of Patches
Comments: Under review
Subjects: Software Engineering (cs.SE); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[133]  arXiv:2512.00734 (cross-list from math.ST) [pdf, ps, other]
Title: Infinitely divisible privacy and beyond I: resolution of the $s^2=2k$ conjecture
Comments: Comments welcome. Abstract shortened based on arxiv requirement
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR); Machine Learning (stat.ML)
[134]  arXiv:2512.00699 (cross-list from quant-ph) [pdf, ps, other]
Title: DyLoC: A Dual-Layer Architecture for Secure and Trainable Quantum Machine Learning Under Polynomial-DLA constraint
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[135]  arXiv:2512.00595 (cross-list from cs.DC) [pdf, ps, other]
Title: IslandRun: Privacy-Aware Multi-Objective Orchestration for Distributed AI Inference
Comments: 15 pages, 3 figures, 2 tables
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[136]  arXiv:2512.00434 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy-Preserving Generative Modeling and Clinical Validation of Longitudinal Health Records for Chronic Disease
Comments: To appear in Proceedings of Machine Learning Research Volume 297 - Proceedings of ML4H 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[137]  arXiv:2512.00272 (cross-list from cs.LG) [pdf, ps, other]
Title: Teleportation-Based Defenses for Privacy in Approximate Machine Unlearning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[138]  arXiv:2512.00251 (cross-list from cs.LG) [pdf, ps, other]
Title: SD-CGAN: Conditional Sinkhorn Divergence GAN for DDoS Anomaly Detection in IoT Networks
Comments: 7 pages, 6 figures, camera-ready version accepted for presentation at IEEE ICNC 2026
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[139]  arXiv:2512.00218 (cross-list from cs.AI) [pdf, ps, other]
Title: Reasoning Under Pressure: How do Training Incentives Influence Chain-of-Thought Monitorability?
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 1 Dec 2025 (showing first 25 of 43 entries)

[140]  arXiv:2511.23408 [pdf, ps, other]
Title: Evaluating LLMs for One-Shot Patching of Real and Artificial Vulnerabilities
Comments: Pre-print - Extended version of the poster paper accepted at the 41st ACM/SIGAPP Symposium on Applied Computing (SAC) Smarter Engineering-Building AI and Building with AI (SEAI) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[141]  arXiv:2511.23393 [pdf, ps, other]
Title: FedSGT: Exact Federated Unlearning via Sequential Group-based Training
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2511.23252 [pdf, ps, other]
Title: One-Shot Secure Aggregation: A Hybrid Cryptographic Protocol for Private Federated Learning in IoT
Comments: 11 pages, 6 figures. Accepted at The 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143]  arXiv:2511.23200 [pdf, ps, other]
Title: Quantifying the Privacy-Utility Trade-off in GPS-based Daily Stress Recognition using Semantic Features
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[144]  arXiv:2511.23198 [pdf, ps, other]
Title: Clustering Malware at Scale: A First Full-Benchmark Study
Comments: pre-print of the paper (i.e. "submitted manuscript" version); small updates to the tables, figures, and text were made in order to report the correct results on Ember
Journal-ref: ARES 2025. Lecture Notes in Computer Science vol 15993. pp 231-251
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145]  arXiv:2511.23183 [pdf, ps, other]
Title: Identification of Malicious Posts on the Dark Web Using Supervised Machine Learning
Comments: Manuscript under review (SN Computer Science)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[146]  arXiv:2511.23026 [pdf, ps, other]
Title: A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks
Authors: Kassem Kallas
Comments: My PhD Thesis in Information Engineering and Sciences defended at University of Siena in Italy in 2017 under the supervision of Professor Mauro Barni
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[147]  arXiv:2511.22791 [pdf, ps, other]
Title: An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks
Comments: This paper has been accepted for publication in the Proceedings of the 44th AIAA/IEEE Digital Avionics Systems Conference (DASC) 2025, where it received the Best Paper of Session Award
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[148]  arXiv:2511.22788 [pdf, ps, other]
Title: PRISM: Privacy-Aware Routing for Adaptive Cloud-Edge LLM Inference via Semantic Sketch Collaboration
Comments: Accepted to AAAI 2026. This is the arXiv preprint version
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[149]  arXiv:2511.22700 [pdf, ps, other]
Title: Ghosting Your LLM: Without The Knowledge of Your Gradient and Data
Authors: Abeer Matar A. Almalky (1), Ziyan Wang (2), Mohaiminul Al Nahian (1), Li Yang (2), Adnan Siraj Rakin (1) ((1) Binghamton University, (2) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2511.22681 [pdf, ps, other]
Title: CacheTrap: Injecting Trojans in LLMs without Leaving any Traces in Inputs or Weights
Authors: Mohaiminul Al Nahian (1), Abeer Matar A. Almalky (1), Gamana Aragonda (2), Ranyang Zhou (2), Sabbir Ahmed (1), Dmitry Ponomarev (1), Li Yang (3), Shaahin Angizi (2), Adnan Siraj Rakin (1) ((1) SUNY Binghamton, (2) New Jersey Institute of Technology, (3) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2511.22441 [pdf, ps, other]
Title: GEO-Detective: Unveiling Location Privacy Risks in Images with LLM Agents
Comments: 15 pages with 7 figures and 12 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[152]  arXiv:2511.22434 [pdf, ps, other]
Title: FastFHE: Packing-Scalable and Depthwise-Separable CNN Inference Over FHE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[153]  arXiv:2511.22416 [pdf, ps, other]
Title: Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2511.22415 [pdf, ps, other]
Title: Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Comments: Workshop on Safe and Robust Robot Learning for Operation in the Real World at CoRL 2025
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2511.22340 [pdf, ps, other]
Title: Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Journal-ref: WiSec 2024: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 182 entries: 1-50 | 15-64 | 65-114 | 115-164 | 165-182 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)