We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 149

[ total of 182 entries: 1-50 | 50-99 | 100-149 | 150-182 ]
[ showing 50 entries per page: fewer | more | all ]

Mon, 1 Dec 2025 (continued, showing last 33 of 43 entries)

[150]  arXiv:2511.22681 [pdf, ps, other]
Title: CacheTrap: Injecting Trojans in LLMs without Leaving any Traces in Inputs or Weights
Authors: Mohaiminul Al Nahian (1), Abeer Matar A. Almalky (1), Gamana Aragonda (2), Ranyang Zhou (2), Sabbir Ahmed (1), Dmitry Ponomarev (1), Li Yang (3), Shaahin Angizi (2), Adnan Siraj Rakin (1) ((1) SUNY Binghamton, (2) New Jersey Institute of Technology, (3) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2511.22441 [pdf, ps, other]
Title: GEO-Detective: Unveiling Location Privacy Risks in Images with LLM Agents
Comments: 15 pages with 7 figures and 12 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[152]  arXiv:2511.22434 [pdf, ps, other]
Title: FastFHE: Packing-Scalable and Depthwise-Separable CNN Inference Over FHE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[153]  arXiv:2511.22416 [pdf, ps, other]
Title: Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2511.22415 [pdf, ps, other]
Title: Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Comments: Workshop on Safe and Robust Robot Learning for Operation in the Real World at CoRL 2025
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2511.22340 [pdf, ps, other]
Title: Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Journal-ref: WiSec 2024: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165]  arXiv:2511.22017 [pdf, ps, other]
Title: POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2511.21999 [pdf, ps, other]
Title: GECKO: Securing Digital Assets Through(out) the Physical World (Extended Technical Report)
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2511.21901 [pdf, ps, other]
Title: Standardized Threat Taxonomy for AI Security, Governance, and Regulatory Compliance
Authors: Hernan Huwyler
Comments: 10 pages, LaTeX. Preprint available on Zenodo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Risk Management (q-fin.RM)
[168]  arXiv:2511.21804 [pdf, ps, other]
Title: Beyond Membership: Limitations of Add/Remove Adjacency in Differential Privacy
Comments: 17 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2511.21803 [pdf, ps, other]
Title: Cross-Layer Detection of Wireless Misbehavior Using 5G RAN Telemetry and Operational Metadata
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2511.21795 [pdf, ps, other]
Title: Advanced Data Collection Techniques in Cloud Security: A Multi-Modal Deep Learning Autoencoder Approach
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2511.21768 [pdf, ps, other]
Title: Categorical Framework for Quantum-Resistant Zero-Trust AI Security
Subjects: Cryptography and Security (cs.CR); Category Theory (math.CT); Quantum Physics (quant-ph)
[172]  arXiv:2511.21764 [pdf, ps, other]
Title: Adaptive Detection of Polymorphic Malware: Leveraging Mutation Engines and YARA Rules for Enhanced Security
Comments: 11 pages, 4 figures, 4 tables, 2 snapshots. Author Chinmay Prawah Pant contributed to proofreading, presentation improvements, and organizational support; core research, methodology, and experimentation were conducted by the main authors
Subjects: Cryptography and Security (cs.CR)
[173]  arXiv:2511.21758 [pdf, ps, other]
Title: A Longitudinal Measurement of Privacy Policy Evolution for Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[174]  arXiv:2511.23406 (cross-list from cs.IT) [pdf, ps, other]
Title: Quantum Private Distributed Matrix Multiplication With Degree Tables
Comments: The abstract here is trimmed due to the space limitations in the submission process
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP); Quantum Physics (quant-ph)
[175]  arXiv:2511.23278 (cross-list from cs.NI) [pdf, ps, other]
Title: RetryGuard: Preventing Self-Inflicted Retry Storms in Cloud Microservices Applications
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[176]  arXiv:2511.22924 (cross-list from cs.MA) [pdf, ps, other]
Title: AgentShield: Make MAS more secure and efficient
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[177]  arXiv:2511.22859 (cross-list from eess.IV) [pdf, ps, other]
Title: TokCom-UEP: Semantic Importance-Matched Unequal Error Protection for Resilient Image Transmission
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR)
[178]  arXiv:2511.22359 (cross-list from cs.SE) [pdf, ps, other]
Title: UniBOM -- A Unified SBOM Analysis and Visualisation Tool for IoT Systems and Beyond
Comments: This paper has been accepted at the ACM 15th International Conference on the Internet of Things (ACM IoT 2025)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[179]  arXiv:2511.22147 (cross-list from cs.CV) [pdf, ps, other]
Title: RemedyGS: Defend 3D Gaussian Splatting against Computation Cost Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[180]  arXiv:2511.21990 (cross-list from cs.LG) [pdf, ps, other]
Title: A Safety and Security Framework for Real-World Agentic Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[181]  arXiv:2511.21842 (cross-list from cs.LG) [pdf, ps, other]
Title: Unsupervised Anomaly Detection for Smart IoT Devices: Performance and Resource Comparison
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[182]  arXiv:2511.21757 (cross-list from cs.CY) [pdf, ps, other]
Title: Medical Malice: A Dataset for Context-Aware Safety in Healthcare LLMs
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[ total of 182 entries: 1-50 | 50-99 | 100-149 | 150-182 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)