We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 99

[ total of 182 entries: 1-50 | 50-99 | 100-149 | 150-182 ]
[ showing 50 entries per page: fewer | more | all ]

Tue, 2 Dec 2025 (continued, showing last 40 of 54 entries)

[100]  arXiv:2512.01391 [pdf, ps, other]
Title: INFERMAL: Inferential analysis of maliciously registered domains
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[101]  arXiv:2512.01353 [pdf, ps, other]
Title: The Trojan Knowledge: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2512.01335 [pdf, ps, other]
Title: EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
Comments: Accepted to ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[103]  arXiv:2512.01326 [pdf, ps, other]
Title: Securing Large Language Models (LLMs) from Prompt Injection Attacks
Comments: 10 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[104]  arXiv:2512.01295 [pdf, ps, other]
Title: Systems Security Foundations for Agentic Computing
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2512.01255 [pdf, ps, other]
Title: Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Software Engineering (cs.SE)
[106]  arXiv:2512.01247 [pdf, ps, other]
Title: Benchmarking and Understanding Safety Risks in AI Character Platforms
Comments: Accepted to NDSS '26: The Network and Distributed System Security Symposium 2026
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[107]  arXiv:2512.01233 [pdf, ps, other]
Title: CTF Archive: Capture, Curate, Learn Forever
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2512.01185 [pdf, ps, other]
Title: DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.01164 [pdf, ps, other]
Title: Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[110]  arXiv:2512.01115 [pdf, ps, other]
Title: Sliced Rényi Pufferfish Privacy: Directional Additive Noise Mechanism and Private Learning with Gradient Clipping
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.00966 [pdf, ps, other]
Title: Mitigating Indirect Prompt Injection via Instruction-Following Intent Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2512.00857 [pdf, ps, other]
Title: Hesperus is Phosphorus: Mapping Threat Actor Naming Taxonomies at Scale
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.00833 [pdf, ps, other]
Title: Logic Encryption: This Time for Real
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[114]  arXiv:2512.00804 [pdf, ps, other]
Title: Bias Injection Attacks on RAG Databases and Sanitization Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[115]  arXiv:2512.00741 [pdf, ps, other]
Title: MASCOT: Analyzing Malware Evolution Through A Well-Curated Source Code Dataset
Comments: 11 pages, 6 figures, conference paper; submitted to IEEE BigData 2025 CyberHunt workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2512.00713 [pdf, ps, other]
Title: Concept-Guided Backdoor Attack on Vision Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.00645 [pdf, ps, other]
Title: Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Comments: Accepted at EAI International Conference on Digital Forensics & Cyber Crime 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.00635 [pdf, ps, other]
Title: Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Authors: Archisman Ghosh
Comments: This extended abstract is archived for educational purposes as an example for different PhD forum competitions. Total page is 3
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.00591 [pdf, ps, other]
Title: TrojanLoC: LLM-based Framework for RTL Trojan Localization
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2512.00480 [pdf, ps, other]
Title: A Unified Framework for Constructing Information-Theoretic Private Information Retrieval
Authors: Liang Feng Zhang
Comments: 22 pages
Journal-ref: Pragmatic Cybersecurity 2025, 1 (1), 3
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2512.00436 [pdf, ps, other]
Title: RECTor: Robust and Efficient Correlation Attack on Tor
Comments: 8 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[122]  arXiv:2512.00414 [pdf, ps, other]
Title: BEACON: Automatic Container Policy Generation using Environment-aware Dynamic Analysis
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2512.00412 [pdf, ps, other]
Title: Red Teaming Large Reasoning Models
Comments: 30 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2512.00377 [pdf, ps, other]
Title: Measuring Memecoin Fragility
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[125]  arXiv:2512.00142 [pdf, ps, other]
Title: DeFi TrustBoost: Blockchain and AI for Trustworthy Decentralized Financial Decisions
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computational Finance (q-fin.CP); General Finance (q-fin.GN)
[126]  arXiv:2512.00136 [pdf, ps, other]
Title: An Empirical Study on the Security Vulnerabilities of GPTs
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2512.00119 [pdf, ps, other]
Title: NetDeTox: Adversarial and Efficient Evasion of Hardware-Security GNNs via RL-LLM Orchestration
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[128]  arXiv:2512.00110 [pdf, ps, other]
Title: Quantum-Adversary-Resilient Evidence Structures and Migration Strategies for Regulated AI Audit Trails
Authors: Leo Kao
Comments: 15 pages, 1 table. Technical report for regulated AI audit trails with quantum-adversary security definitions and migration patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[129]  arXiv:2512.00098 [pdf, ps, other]
Title: Guarding Against Malicious Biased Threats (GAMBiT): Experimental Design of Cognitive Sensors and Triggers with Behavioral Impact Analysis
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[130]  arXiv:2512.00094 [pdf, ps, other]
Title: HMARK: Radioactive Multi-Bit Semantic-Latent Watermarking for Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[131]  arXiv:2512.01974 (cross-list from eess.SP) [pdf, ps, other]
Title: The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain
Authors: Keshab K. Parhi
Comments: Proc. 2025 Asilomar conference on Signals, Systems, and Computers
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[132]  arXiv:2512.01396 (cross-list from cs.SE) [pdf, ps, other]
Title: BackportBench: A Multilingual Benchmark for Automated Backporting of Patches
Comments: Under review
Subjects: Software Engineering (cs.SE); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[133]  arXiv:2512.00734 (cross-list from math.ST) [pdf, ps, other]
Title: Infinitely divisible privacy and beyond I: resolution of the $s^2=2k$ conjecture
Comments: Comments welcome. Abstract shortened based on arxiv requirement
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR); Machine Learning (stat.ML)
[134]  arXiv:2512.00699 (cross-list from quant-ph) [pdf, ps, other]
Title: DyLoC: A Dual-Layer Architecture for Secure and Trainable Quantum Machine Learning Under Polynomial-DLA constraint
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[135]  arXiv:2512.00595 (cross-list from cs.DC) [pdf, ps, other]
Title: IslandRun: Privacy-Aware Multi-Objective Orchestration for Distributed AI Inference
Comments: 15 pages, 3 figures, 2 tables
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[136]  arXiv:2512.00434 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy-Preserving Generative Modeling and Clinical Validation of Longitudinal Health Records for Chronic Disease
Comments: To appear in Proceedings of Machine Learning Research Volume 297 - Proceedings of ML4H 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[137]  arXiv:2512.00272 (cross-list from cs.LG) [pdf, ps, other]
Title: Teleportation-Based Defenses for Privacy in Approximate Machine Unlearning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[138]  arXiv:2512.00251 (cross-list from cs.LG) [pdf, ps, other]
Title: SD-CGAN: Conditional Sinkhorn Divergence GAN for DDoS Anomaly Detection in IoT Networks
Comments: 7 pages, 6 figures, camera-ready version accepted for presentation at IEEE ICNC 2026
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[139]  arXiv:2512.00218 (cross-list from cs.AI) [pdf, ps, other]
Title: Reasoning Under Pressure: How do Training Incentives Influence Chain-of-Thought Monitorability?
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 1 Dec 2025 (showing first 10 of 43 entries)

[140]  arXiv:2511.23408 [pdf, ps, other]
Title: Evaluating LLMs for One-Shot Patching of Real and Artificial Vulnerabilities
Comments: Pre-print - Extended version of the poster paper accepted at the 41st ACM/SIGAPP Symposium on Applied Computing (SAC) Smarter Engineering-Building AI and Building with AI (SEAI) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[141]  arXiv:2511.23393 [pdf, ps, other]
Title: FedSGT: Exact Federated Unlearning via Sequential Group-based Training
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2511.23252 [pdf, ps, other]
Title: One-Shot Secure Aggregation: A Hybrid Cryptographic Protocol for Private Federated Learning in IoT
Comments: 11 pages, 6 figures. Accepted at The 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143]  arXiv:2511.23200 [pdf, ps, other]
Title: Quantifying the Privacy-Utility Trade-off in GPS-based Daily Stress Recognition using Semantic Features
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[144]  arXiv:2511.23198 [pdf, ps, other]
Title: Clustering Malware at Scale: A First Full-Benchmark Study
Comments: pre-print of the paper (i.e. "submitted manuscript" version); small updates to the tables, figures, and text were made in order to report the correct results on Ember
Journal-ref: ARES 2025. Lecture Notes in Computer Science vol 15993. pp 231-251
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145]  arXiv:2511.23183 [pdf, ps, other]
Title: Identification of Malicious Posts on the Dark Web Using Supervised Machine Learning
Comments: Manuscript under review (SN Computer Science)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[146]  arXiv:2511.23026 [pdf, ps, other]
Title: A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks
Authors: Kassem Kallas
Comments: My PhD Thesis in Information Engineering and Sciences defended at University of Siena in Italy in 2017 under the supervision of Professor Mauro Barni
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[147]  arXiv:2511.22791 [pdf, ps, other]
Title: An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks
Comments: This paper has been accepted for publication in the Proceedings of the 44th AIAA/IEEE Digital Avionics Systems Conference (DASC) 2025, where it received the Best Paper of Session Award
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[148]  arXiv:2511.22788 [pdf, ps, other]
Title: PRISM: Privacy-Aware Routing for Adaptive Cloud-Edge LLM Inference via Semantic Sketch Collaboration
Comments: Accepted to AAAI 2026. This is the arXiv preprint version
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[149]  arXiv:2511.22700 [pdf, ps, other]
Title: Ghosting Your LLM: Without The Knowledge of Your Gradient and Data
Authors: Abeer Matar A. Almalky (1), Ziyan Wang (2), Mohaiminul Al Nahian (1), Li Yang (2), Adnan Siraj Rakin (1) ((1) Binghamton University, (2) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[ total of 182 entries: 1-50 | 50-99 | 100-149 | 150-182 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)