We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 150

[ total of 182 entries: 1-50 | 51-100 | 101-150 | 151-182 ]
[ showing 50 entries per page: fewer | more | all ]

Mon, 1 Dec 2025 (continued, showing last 32 of 43 entries)

[151]  arXiv:2511.22441 [pdf, ps, other]
Title: GEO-Detective: Unveiling Location Privacy Risks in Images with LLM Agents
Comments: 15 pages with 7 figures and 12 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[152]  arXiv:2511.22434 [pdf, ps, other]
Title: FastFHE: Packing-Scalable and Depthwise-Separable CNN Inference Over FHE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[153]  arXiv:2511.22416 [pdf, ps, other]
Title: Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2511.22415 [pdf, ps, other]
Title: Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Comments: Workshop on Safe and Robust Robot Learning for Operation in the Real World at CoRL 2025
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2511.22340 [pdf, ps, other]
Title: Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Journal-ref: WiSec 2024: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165]  arXiv:2511.22017 [pdf, ps, other]
Title: POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2511.21999 [pdf, ps, other]
Title: GECKO: Securing Digital Assets Through(out) the Physical World (Extended Technical Report)
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2511.21901 [pdf, ps, other]
Title: Standardized Threat Taxonomy for AI Security, Governance, and Regulatory Compliance
Authors: Hernan Huwyler
Comments: 10 pages, LaTeX. Preprint available on Zenodo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Risk Management (q-fin.RM)
[168]  arXiv:2511.21804 [pdf, ps, other]
Title: Beyond Membership: Limitations of Add/Remove Adjacency in Differential Privacy
Comments: 17 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2511.21803 [pdf, ps, other]
Title: Cross-Layer Detection of Wireless Misbehavior Using 5G RAN Telemetry and Operational Metadata
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2511.21795 [pdf, ps, other]
Title: Advanced Data Collection Techniques in Cloud Security: A Multi-Modal Deep Learning Autoencoder Approach
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2511.21768 [pdf, ps, other]
Title: Categorical Framework for Quantum-Resistant Zero-Trust AI Security
Subjects: Cryptography and Security (cs.CR); Category Theory (math.CT); Quantum Physics (quant-ph)
[172]  arXiv:2511.21764 [pdf, ps, other]
Title: Adaptive Detection of Polymorphic Malware: Leveraging Mutation Engines and YARA Rules for Enhanced Security
Comments: 11 pages, 4 figures, 4 tables, 2 snapshots. Author Chinmay Prawah Pant contributed to proofreading, presentation improvements, and organizational support; core research, methodology, and experimentation were conducted by the main authors
Subjects: Cryptography and Security (cs.CR)
[173]  arXiv:2511.21758 [pdf, ps, other]
Title: A Longitudinal Measurement of Privacy Policy Evolution for Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[174]  arXiv:2511.23406 (cross-list from cs.IT) [pdf, ps, other]
Title: Quantum Private Distributed Matrix Multiplication With Degree Tables
Comments: The abstract here is trimmed due to the space limitations in the submission process
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP); Quantum Physics (quant-ph)
[175]  arXiv:2511.23278 (cross-list from cs.NI) [pdf, ps, other]
Title: RetryGuard: Preventing Self-Inflicted Retry Storms in Cloud Microservices Applications
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[176]  arXiv:2511.22924 (cross-list from cs.MA) [pdf, ps, other]
Title: AgentShield: Make MAS more secure and efficient
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[177]  arXiv:2511.22859 (cross-list from eess.IV) [pdf, ps, other]
Title: TokCom-UEP: Semantic Importance-Matched Unequal Error Protection for Resilient Image Transmission
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR)
[178]  arXiv:2511.22359 (cross-list from cs.SE) [pdf, ps, other]
Title: UniBOM -- A Unified SBOM Analysis and Visualisation Tool for IoT Systems and Beyond
Comments: This paper has been accepted at the ACM 15th International Conference on the Internet of Things (ACM IoT 2025)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[179]  arXiv:2511.22147 (cross-list from cs.CV) [pdf, ps, other]
Title: RemedyGS: Defend 3D Gaussian Splatting against Computation Cost Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[180]  arXiv:2511.21990 (cross-list from cs.LG) [pdf, ps, other]
Title: A Safety and Security Framework for Real-World Agentic Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[181]  arXiv:2511.21842 (cross-list from cs.LG) [pdf, ps, other]
Title: Unsupervised Anomaly Detection for Smart IoT Devices: Performance and Resource Comparison
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[182]  arXiv:2511.21757 (cross-list from cs.CY) [pdf, ps, other]
Title: Medical Malice: A Dataset for Context-Aware Safety in Healthcare LLMs
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[ total of 182 entries: 1-50 | 51-100 | 101-150 | 151-182 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)