Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 ... 201-225 226-250 251-275 276-300 301-325 326-350 351-375 ... 501-522
Showing up to 25 entries per page: fewer | more | all
[276] arXiv:2403.15638 [pdf, html, other]
Title: Differentially Private Next-Token Prediction of Large Language Models
James Flemings, Meisam Razaviyayn, Murali Annavaram
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[277] arXiv:2403.15723 [pdf, html, other]
Title: A hybrid LLM workflow can help identify user privilege related variables in programs of any size
Haizhou Wang, Zhilong Wang, Peng Liu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[278] arXiv:2403.15884 [pdf, html, other]
Title: UPSS: a User-centric Private Storage System with its applications
Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[279] arXiv:2403.16060 [pdf, other]
Title: Port Forwarding Services Are Forwarding Security Risks
Haoyuan Wang, Yue Xue, Xuan Feng, Chao Zhou, Xianghang Mi
Subjects: Cryptography and Security (cs.CR)
[280] arXiv:2403.16083 [pdf, html, other]
Title: Quantifying Arbitrage in Automated Market Makers: An Empirical Study of Ethereum ZK Rollups
Krzysztof Gogol, Johnnatan Messias, Deborah Miori, Claudio Tessone, Benjamin Livshits
Comments: In proceedings of Marble 2024
Subjects: Cryptography and Security (cs.CR)
[281] arXiv:2403.16149 [pdf, other]
Title: Analyzing Consumer IoT Traffic from Security and Privacy Perspectives: a Comprehensive Survey
Yan Jia, Yuxin Song, Zihou Liu, Qingyin Tan, Yang Song, Yu Zhang, Zheli Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[282] arXiv:2403.16196 [pdf, html, other]
Title: Behind the (Digital Crime) Scenes: An MSC Model
Mario Raciti, Giampaolo Bella
Comments: Accepted in 12th International Symposium on Digital Forensics and Security (ISDFS 2024). 979-8-3503-3036-6/24/$31.00 copyright 2024 IEEE
Subjects: Cryptography and Security (cs.CR)
[283] arXiv:2403.16304 [pdf, other]
Title: SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned
Omar Alrawi, Miuyin Yong Wong, Athanasios Avgetidis, Kevin Valakuzhy, Boladji Vinny Adjibi, Konstantinos Karakatsanis, Mustaque Ahamad, Doug Blough, Fabian Monrose, Manos Antonakakis
Subjects: Cryptography and Security (cs.CR)
[284] arXiv:2403.16473 [pdf, html, other]
Title: Plaintext-Free Deep Learning for Privacy-Preserving Medical Image Analysis via Frequency Information Embedding
Mengyu Sun, Ziyuan Yang, Maosong Ran, Zhiwen Wang, Hui Yu, Yi Zhang
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[285] arXiv:2403.16757 [pdf, other]
Title: Bi-objective Optimization in Role Mining
Jason Crampton, Eduard Eiben, Gregory Gutin, Daniel Karapetyan, Diptapriyo Majumdar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computational Complexity (cs.CC)
[286] arXiv:2403.16860 [pdf, html, other]
Title: CipherFormer: Efficient Transformer Private Inference with Low Round Complexity
Weize Wang, Yi Kuang
Comments: Accepted by CSCWD 2024 (27th International Conference on Computer Supported Cooperative Work in Design)
Subjects: Cryptography and Security (cs.CR)
[287] arXiv:2403.16903 [pdf, html, other]
Title: Towards Secure and Trusted-by-Design Smart Contracts
Zaynah Dargaye, Önder Gürcan, Florent Kirchner, Sara Tucci-Piergiovanni
Comments: 17 pages, 1 algorithm, The 29th Francophone Days of Application Languages - JFLA 2018
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[288] arXiv:2403.17068 [pdf, html, other]
Title: Semantic Ranking for Automated Adversarial Technique Annotation in Security Text
Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov
Subjects: Cryptography and Security (cs.CR)
[289] arXiv:2403.17081 [pdf, html, other]
Title: Machine Learning on Blockchain Data: A Systematic Mapping Study
Georgios Palaiokrassas, Sarah Bouraga, Leandros Tassiulas
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[290] arXiv:2403.17160 [pdf, html, other]
Title: CYGENT: A cybersecurity conversational agent with log summarization powered by GPT-3
Prasasthy Balasubramanian, Justin Seby, Panos Kostakos
Comments: 7 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[291] arXiv:2403.17296 [pdf, html, other]
Title: Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation
Hamza Saleem, Amir Ziashahabi, Muhammad Naveed, Salman Avestimehr
Comments: Accepted at Privacy Enhancing Technologies Symposium (PETS) 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[292] arXiv:2403.17303 [pdf, html, other]
Title: Two Birds with One Stone: Differential Privacy by Low-power SRAM Memory
Jianqing Liu, Na Gong, Hritom Das
Comments: 15 pages, with 2 pages of Appendix
Journal-ref: IEEE Transactions on Dependable and Secure Computing, 2024
Subjects: Cryptography and Security (cs.CR)
[293] arXiv:2403.17336 [pdf, html, other]
Title: Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang
Comments: Accepted by USENIX Security 2024
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[294] arXiv:2403.17414 [pdf, html, other]
Title: The Privacy Policy Permission Model: A Unified View of Privacy Policies
Maryam Majedi, Ken Barker
Comments: 23 pages + 2 pages references + 11 Pages Appendix, 19 figures,Published in teh Trasactions on Data Privacy in April 2021
Journal-ref: Transactions on Data Privacy, volume 14, number 1, pages 1-36, year 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[295] arXiv:2403.17458 [pdf, html, other]
Title: Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[296] arXiv:2403.17494 [pdf, html, other]
Title: FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids
Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti
Journal-ref: Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2024, Lecture Notes in Computer Science, 14828, 503--524
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[297] arXiv:2403.17524 [pdf, html, other]
Title: Provably Secure Disambiguating Neural Linguistic Steganography
Yuang Qi, Kejiang Chen, Kai Zeng, Weiming Zhang, Nenghai Yu
Comments: 12 pages. Accepted by IEEE Transactions on Dependable and Secure Computing (TDSC)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[298] arXiv:2403.17571 [pdf, html, other]
Title: Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux based IoT Systems
Salko Korac, Leandros Maglaras, Naghmeh Moradpoor, Bill Buchanan, Berk Canberk
Subjects: Cryptography and Security (cs.CR)
[299] arXiv:2403.17648 [pdf, html, other]
Title: Healthcare Data Governance, Privacy, and Security -- A Conceptual Framework
Amen Faridoon, M. Tahar Kechadi
Subjects: Cryptography and Security (cs.CR)
[300] arXiv:2403.17674 [pdf, html, other]
Title: Depending on yourself when you should: Mentoring LLM with RL agents to become the master in cybersecurity games
Yikuan Yan, Yaolun Zhang, Keman Huang
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
Total of 522 entries : 1-25 ... 201-225 226-250 251-275 276-300 301-325 326-350 351-375 ... 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack