Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 76-100 101-125 126-150 151-175 176-200 201-225 226-250 ... 501-522
Showing up to 25 entries per page: fewer | more | all
[151] arXiv:2403.08463 [pdf, html, other]
Title: A Comparison of SynDiffix Multi-table versus Single-table Synthetic Data
Paul Francis
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2403.08656 [pdf, other]
Title: Physical Memory Attacks and a Memory Safe Management System for Memory Defense
Alon Hillel-Tuch, Aspen Olmstead
Comments: Computer Science, Computer Engineering, and Applied Computing (CSCE) Conference 2022
Journal-ref: Springer Nature - Book Series: Transactions on Computational Science & Computational Intelligence 2022
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[153] arXiv:2403.08701 [pdf, html, other]
Title: Review of Generative AI Methods in Cybersecurity
Yagmur Yigit, William J Buchanan, Madjid G Tehrani, Leandros Maglaras
Comments: 40 pages
Subjects: Cryptography and Security (cs.CR)
[154] arXiv:2403.08740 [pdf, html, other]
Title: Acoustic Side Channel Attack on Keyboards Based on Typing Patterns
Alireza Taheritajar, Reza Rahaeimehr
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[155] arXiv:2403.08917 [pdf, html, other]
Title: Efficiently Computing Similarities to Private Datasets
Arturs Backurs, Zinan Lin, Sepideh Mahabadi, Sandeep Silwal, Jakub Tarnawski
Comments: To appear at ICLR 2024
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[156] arXiv:2403.09080 [pdf, html, other]
Title: Ciphertext-Only Attack on a Secure $k$-NN Computation on Cloud
Shyam Murthy, Santosh Kumar Upadhyaya, Srinivas Vivek
Subjects: Cryptography and Security (cs.CR)
[157] arXiv:2403.09118 [pdf, html, other]
Title: Graph-Based DDoS Attack Detection in IoT Systems with Lossy Network
Arvin Hekmati, Bhaskar Krishnamachari
Comments: 11 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[158] arXiv:2403.09209 [pdf, html, other]
Title: LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection
Xiangrui Cai, Yang Wang, Sihan Xu, Hao Li, Ying Zhang, Zheli Liu, Xiaojie Yuan
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[159] arXiv:2403.09322 [pdf, other]
Title: Privacy Preserving Anomaly Detection on Homomorphic Encrypted Data from IoT Sensors
Anca Hangan, Dragos Lazea, Tudor Cioara
Subjects: Cryptography and Security (cs.CR)
[160] arXiv:2403.09351 [pdf, html, other]
Title: LDPRecover: Recovering Frequencies from Poisoning Attacks against Local Differential Privacy
Xinyue Sun, Qingqing Ye, Haibo Hu, Jiawei Duan, Tianyu Wo, Jie Xu, Renyu Yang
Comments: This paper has been accepted by ICDE 2024
Subjects: Cryptography and Security (cs.CR)
[161] arXiv:2403.09352 [pdf, other]
Title: REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography
Samuel Pagliarini, Aikata Aikata, Malik Imran, Sujoy Sinha Roy
Comments: Accepted in AsiaCCS'24
Subjects: Cryptography and Security (cs.CR)
[162] arXiv:2403.09475 [pdf, html, other]
Title: Covert Communication for Untrusted UAV-Assisted Wireless Systems
Chan Gao, Linying Tian, Dong Zheng
Subjects: Cryptography and Security (cs.CR)
[163] arXiv:2403.09513 [pdf, html, other]
Title: AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting
Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao
Comments: Multimodal Large Language Models Defense, 25 Pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[164] arXiv:2403.09541 [pdf, html, other]
Title: RANDAO-based RNG: Last Revealer Attacks in Ethereum 2.0 Randomness and a Potential Solution
Do Hai Son, Tran Thi Thuy Quynh, Le Quang Minh
Subjects: Cryptography and Security (cs.CR)
[165] arXiv:2403.09562 [pdf, html, other]
Title: PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps
Ruixuan Liu, Tianhao Wang, Yang Cao, Li Xiong
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR)
[166] arXiv:2403.09603 [pdf, html, other]
Title: Optimistic Verifiable Training by Controlling Hardware Nondeterminism
Megha Srivastava, Simran Arora, Dan Boneh
Comments: 11 pages, 5 figures, Neural Information Processing Systems (NeurIPS) 2024,
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[167] arXiv:2403.09735 [pdf, other]
Title: A Sophisticated Framework for the Accurate Detection of Phishing Websites
Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[168] arXiv:2403.09751 [pdf, other]
Title: What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[169] arXiv:2403.09752 [pdf, html, other]
Title: Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems
Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia
Comments: 40 pages, 13 figures, 6 tables, journal paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[170] arXiv:2403.09795 [pdf, other]
Title: Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention
Ellie Prosser, Matthew Edwards
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[171] arXiv:2403.09880 [pdf, other]
Title: How To Save Fees in Bitcoin Smart Contracts: a Simple Optimistic Off-chain Protocol
Dario Maddaloni, Riccardo Marchesin, Roberto Zunino
Subjects: Cryptography and Security (cs.CR)
[172] arXiv:2403.09954 [pdf, other]
Title: Search-based Ordered Password Generation of Autoregressive Neural Networks
Min Jin, Junbin Ye, Rongxuan Shen, Huaxing Lu
Comments: This paper is in Peer Review
Subjects: Cryptography and Security (cs.CR)
[173] arXiv:2403.10000 [pdf, html, other]
Title: Federated Learning with Anomaly Detection via Gradient and Reconstruction Analysis
Zahir Alsulaimawi
Subjects: Cryptography and Security (cs.CR)
[174] arXiv:2403.10005 [pdf, html, other]
Title: Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks
Zahir Alsulaimawi
Subjects: Cryptography and Security (cs.CR)
[175] arXiv:2403.10021 [pdf, html, other]
Title: Time-Frequency Jointed Imperceptible Adversarial Attack to Brainprint Recognition with Deep Learning Models
Hangjie Yi, Yuhang Ming, Dongjun Liu, Wanzeng Kong
Comments: This work is accepted by ICME 2024
Subjects: Cryptography and Security (cs.CR)
Total of 522 entries : 1-25 76-100 101-125 126-150 151-175 176-200 201-225 226-250 ... 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack