Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 ... 126-150 151-175 176-200 201-225 226-250 251-275 276-300 ... 501-522
Showing up to 25 entries per page: fewer | more | all
[201] arXiv:2403.11171 [pdf, html, other]
Title: A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection
Hojung Yang, Suhyeon Lee, Seungjoo Kim
Comments: This paper is accepted to the IEEE International Conference on Blockchain and Cryptocurrency(ICBC) 2024
Subjects: Cryptography and Security (cs.CR)
[202] arXiv:2403.11180 [pdf, html, other]
Title: usfAD Based Effective Unknown Attack Detection Focused IDS Framework
Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder
Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[203] arXiv:2403.11303 [pdf, other]
Title: A Brief Study of Computer Network Security Technologies
Tulasi Udupa A, Sushma Jayaram, Shreya Ganesh Hegde
Subjects: Cryptography and Security (cs.CR)
[204] arXiv:2403.11445 [pdf, html, other]
Title: Budget Recycling Differential Privacy
Bo Jiang, Jian Du, Sagar Sharma, Qiang Yan
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Signal Processing (eess.SP)
[205] arXiv:2403.11519 [pdf, html, other]
Title: Efficient and Privacy-Preserving Federated Learning based on Full Homomorphic Encryption
Yuqi Guo, Lin Li, Zhongxiang Zheng, Hanrui Yun, Ruoyan Zhang, Xiaolin Chang, Zhixuan Gao
Subjects: Cryptography and Security (cs.CR)
[206] arXiv:2403.11669 [pdf, html, other]
Title: Semantic Data Representation for Explainable Windows Malware Detection Models
Peter Švec, Štefan Balogh, Martin Homola, Ján Kľuka, Tomáš Bisták
Comments: arXiv admin note: substantial text overlap with arXiv:2301.00153
Subjects: Cryptography and Security (cs.CR)
[207] arXiv:2403.11741 [pdf, other]
Title: Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era
G S Mamatha, Namya Dimri, Rasha Sinha
Subjects: Cryptography and Security (cs.CR)
[208] arXiv:2403.11798 [pdf, html, other]
Title: Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono
Subjects: Cryptography and Security (cs.CR)
[209] arXiv:2403.11830 [pdf, html, other]
Title: Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks
Andrea Venturi, Dario Stabili, Mirco Marchetti
Comments: preprint submitted to IEEE TIFS, under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[210] arXiv:2403.11859 [pdf, html, other]
Title: Towards automated formal security analysis of SAML V2.0 Web Browser SSO standard -- the POST/Artifact use case
Zvonimir Hartl, Ante Đerek
Subjects: Cryptography and Security (cs.CR)
[211] arXiv:2403.11981 [pdf, html, other]
Title: Certified Robustness to Clean-Label Poisoning Using Diffusion Denoising
Sanghyun Hong, Nicholas Carlini, Alexey Kurakin
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[212] arXiv:2403.12196 [pdf, html, other]
Title: Leveraging Large Language Models to Detect npm Malicious Packages
Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams
Comments: 13 pages, 2 Figure, 6 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[213] arXiv:2403.12239 [pdf, html, other]
Title: Large language models in 6G security: challenges and opportunities
Tri Nguyen, Huong Nguyen, Ahmad Ijaz, Saeid Sheikhi, Athanasios V. Vasilakos, Panos Kostakos
Comments: 29 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[214] arXiv:2403.12252 [pdf, html, other]
Title: Parasitic Circus:On the Feasibility of Golden Free PCB Verification
Maryam Saadat Safa, Patrick Schaumont, Shahin Tajik
Subjects: Cryptography and Security (cs.CR)
[215] arXiv:2403.12363 [pdf, html, other]
Title: E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet
Cong Dong, Jiahai Yang, Yun Li, Yue Wu, Yufan Chen, Chenglong Li, Haoran Jiao, Xia Yin, Yuling Liu
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[216] arXiv:2403.12503 [pdf, html, other]
Title: Securing Large Language Models: Threats, Vulnerabilities and Responsible Practices
Sara Abdali, Richard Anarfi, CJ Barberan, Jia He, Erfan Shayegani
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[217] arXiv:2403.12541 [pdf, html, other]
Title: Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks
Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang, Liang Hou, Wenmao Liu, Xuhong Zhang, Jianwei Ying
Subjects: Cryptography and Security (cs.CR)
[218] arXiv:2403.12568 [pdf, html, other]
Title: Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices
Xueshuo Xie, Haoxu Wang, Zhaolong Jian, Tao Li, Wei Wang, Zhiwei Xu, Guiling Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[219] arXiv:2403.12644 [pdf, other]
Title: When Does Your Brain Know You? Segment Length and Its Impact on EEG-based Biometric Authentication Accuracy
Nibras Abo Alzahab, Lorenzo Scalise, Marco Baldi
Comments: 11 pages, 4 figures, conferance
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Neurons and Cognition (q-bio.NC)
[220] arXiv:2403.12671 [pdf, html, other]
Title: Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering
Jakub Res, Ivan Homoliak, Martin Perešíni, Aleš Smrčka, Kamil Malinka, Petr Hanacek
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[221] arXiv:2403.12723 [pdf, html, other]
Title: Python Fuzzing for Trustworthy Machine Learning Frameworks
Ilya Yegorov, Eli Kobrin, Darya Parygina, Alexey Vishnyakov, Andrey Fedotov
Journal-ref: Journal of Mathematical Sciences, 2024 Springer Nature Switzerland AG, Vol. 285, No. 2, October, 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[222] arXiv:2403.12812 [pdf, html, other]
Title: The Emergence of Hardware Fuzzing: A Critical Review of its Significance
Raghul Saravanan, Sai Manoj Pudukotai Dinakarrao
Subjects: Cryptography and Security (cs.CR)
[223] arXiv:2403.13010 [pdf, html, other]
Title: A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats
Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder
Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[224] arXiv:2403.13013 [pdf, html, other]
Title: Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis
Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder
Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[225] arXiv:2403.13017 [pdf, html, other]
Title: Impart: An Imperceptible and Effective Label-Specific Backdoor Attack
Jingke Zhao, Zan Wang, Yongwei Wang, Lanjun Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
Total of 522 entries : 1-25 ... 126-150 151-175 176-200 201-225 226-250 251-275 276-300 ... 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack