Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for September 2024

Total of 586 entries : 1-50 ... 301-350 351-400 401-450 451-500 501-550 551-586
Showing up to 50 entries per page: fewer | more | all
[451] arXiv:2409.03635 (cross-list from quant-ph) [pdf, html, other]
Title: On the Relativistic Zero Knowledge Quantum Proofs of Knowledge
Kaiyan Shi, Kaushik Chakraborty, Wen Yu Kon, Omar Amer, Marco Pistoia, Charles Lim
Comments: 38 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[452] arXiv:2409.03735 (cross-list from cs.LG) [pdf, html, other]
Title: Investigating Privacy Bias in Training Data of Language Models
Yan Shvartzshnaider, Vasisht Duddu
Comments: 16 pages, 4 Figures, 1 Table
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[453] arXiv:2409.03899 (cross-list from cs.RO) [pdf, html, other]
Title: Achieving the Safety and Security of the End-to-End AV Pipeline
Noah T. Curran, Minkyoung Cho, Ryan Feng, Liangkai Liu, Brian Jay Tang, Pedram MohajerAnsari, Alkim Domeke, Mert D. Pesé, Kang G. Shin
Comments: Accepted to 1st Cyber Security in Cars Workshop (CSCS) at CCS
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR)
[454] arXiv:2409.03902 (cross-list from cs.LG) [pdf, html, other]
Title: WaterMAS: Sharpness-Aware Maximization for Neural Network Watermarking
Carl De Sousa Trias, Mihai Mitrea, Attilio Fiandrotti, Marco Cagnazzo, Sumanta Chaudhuri, Enzo Tartaglione
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[455] arXiv:2409.04026 (cross-list from quant-ph) [pdf, html, other]
Title: Efficient Fault-Tolerant Quantum Protocol for Differential Privacy in the Shuffle Model
Hassan Jameel Asghar, Arghya Mukherjee, Gavin K. Brennen
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[456] arXiv:2409.04242 (cross-list from eess.SY) [pdf, html, other]
Title: Unmasking Covert Intrusions: Detection of Fault-Masking Cyberattacks on Differential Protection Systems
Ahmad Mohammad Saber, Amr Youssef, Davor Svetinovic, Hatem Zeineldin, Ehab F. El-Saadany
Comments: Accepted to IEEE Transactions on Systems, Man, and Cybernetics: Systems. \c{opyright} 2024 IEEE
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[457] arXiv:2409.04387 (cross-list from stat.CO) [pdf, html, other]
Title: Best Linear Unbiased Estimate from Privatized Contingency Tables
Jordan Awan, Adam Edwards, Paul Bartholomew, Andrew Sillers
Comments: 25 pages before references and appendices, 41 pages total, 2 figures and 7 tables
Subjects: Computation (stat.CO); Cryptography and Security (cs.CR); Applications (stat.AP)
[458] arXiv:2409.04602 (cross-list from quant-ph) [pdf, html, other]
Title: Training quantum machine learning models on cloud without uploading the data
Guang Ping He
Comments: Added experimental results and the flow chart of our method
Subjects: Quantum Physics (quant-ph); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[459] arXiv:2409.04637 (cross-list from quant-ph) [pdf, html, other]
Title: Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography
Pingzhi Li, Tianlong Chen, Junyu Liu
Comments: Submission for IEEE 2024 IEEE Workshop on Quantum IntelLigence, Learning & Security (QUILLS), this https URL
Journal-ref: 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA) (pp. 499-505)
Subjects: Quantum Physics (quant-ph); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[460] arXiv:2409.04652 (cross-list from cs.LG) [pdf, html, other]
Title: Privacy-Preserving Race/Ethnicity Estimation for Algorithmic Bias Measurement in the U.S
Saikrishna Badrinarayanan, Osonde Osoba, Miao Cheng, Ryan Rogers, Sakshi Jain, Rahul Tandra, Natesh S. Pillai
Comments: Saikrishna Badrinarayanan and Osonde Osoba contributed equally to this work. Updating text to indicate limitations of sample analyses
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[461] arXiv:2409.04831 (cross-list from cs.SE) [pdf, html, other]
Title: MILE: A Mutation Testing Framework of In-Context Learning Systems
Zeming Wei, Yihao Zhang, Meng Sun
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[462] arXiv:2409.04935 (cross-list from quant-ph) [pdf, html, other]
Title: Anomaly Detection for Real-World Cyber-Physical Security using Quantum Hybrid Support Vector Machines
Tyler Cultice, Md. Saif Hassan Onim, Annarita Giani, Himanshu Thapliyal
Comments: 6 pages, 5 figures, 2 tables, under ISVLSI 2024 proceedings
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[463] arXiv:2409.04968 (cross-list from cs.CV) [pdf, html, other]
Title: Natias: Neuron Attribution based Transferable Image Adversarial Steganography
Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu
Comments: Accepted by IEEE TIFS
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[464] arXiv:2409.05153 (cross-list from cs.RO) [pdf, html, other]
Title: A Remote Control Painting System for Exterior Walls of High-Rise Buildings through Robotic System
Diganta Das, Dipanjali Kundu, Anichur Rahman, Muaz Rahman, Sadia Sazzad
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR)
[465] arXiv:2409.06008 (cross-list from cs.DC) [pdf, html, other]
Title: OciorCOOL: Faster Byzantine Agreement and Reliable Broadcast
Jinyuan Chen
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT)
[466] arXiv:2409.06069 (cross-list from cs.LG) [pdf, html, other]
Title: Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research
Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[467] arXiv:2409.06179 (cross-list from cs.MA) [pdf, html, other]
Title: Responsible Blockchain: STEADI Principles and the Actor-Network Theory-based Development Methodology (ANT-RDM)
Yibai Li, Ahmed Gomaa, Xiaobing Li
Comments: 19 pages, 1 figure, journal publication
Journal-ref: Foundations and Trends in Information Systems: Vol. 7: No. 4, pp 310-356 (2024)
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[468] arXiv:2409.06233 (cross-list from cs.HC) [pdf, html, other]
Title: VBIT: Towards Enhancing Privacy Control Over IoT Devices
Jad Al Aaraj, Olivia Figueira, Tu Le, Isabela Figueira, Rahmadi Trimananda, Athina Markopoulou
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[469] arXiv:2409.06317 (cross-list from quant-ph) [pdf, other]
Title: The Black-Box Simulation Barrier Persists in a Fully Quantum World
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Jiahui Liu
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[470] arXiv:2409.06348 (cross-list from cs.SD) [pdf, html, other]
Title: VoiceWukong: Benchmarking Deepfake Voice Detection
Ziwei Yan, Yanjie Zhao, Haoyu Wang
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[471] arXiv:2409.06594 (cross-list from cs.CC) [pdf, html, other]
Title: How to Verify Any (Reasonable) Distribution Property: Computationally Sound Argument Systems for Distributions
Tal Herman, Guy Rothblum
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[472] arXiv:2409.06805 (cross-list from cs.LG) [pdf, other]
Title: Personalized Federated Learning Techniques: Empirical Analysis
Azal Ahmad Khan, Ahmad Faraz Khan, Haider Ali, Ali Anwar
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[473] arXiv:2409.07128 (cross-list from eess.IV) [pdf, html, other]
Title: Deep Learning Techniques for Hand Vein Biometrics: A Comprehensive Review
Mustapha Hemis, Hamza Kheddar, Sami Bourouis, Nasir Saleem
Subjects: Image and Video Processing (eess.IV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[474] arXiv:2409.07215 (cross-list from stat.ML) [pdf, html, other]
Title: Is merging worth it? Securely evaluating the information gain for causal dataset acquisition
Jake Fawkes, Lucile Ter-Minassian, Desi Ivanova, Uri Shalit, Chris Holmes
Comments: Published at AISTATS 2025
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[475] arXiv:2409.07291 (cross-list from cs.LG) [pdf, html, other]
Title: Exploring User-level Gradient Inversion with a Diffusion Prior
Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang
Comments: Presented at the International Workshop on Federated Learning in the Age of Foundation Models in conjunction with NeurIPS 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[476] arXiv:2409.07389 (cross-list from stat.AP) [pdf, html, other]
Title: Dynamic Bayesian Networks, Elicitation and Data Embedding for Secure Environments
Kieran Drury, Jim Q. Smith
Comments: 34 pages, 1 figure. Submitted to Entropy journal
Subjects: Applications (stat.AP); Cryptography and Security (cs.CR); Methodology (stat.ME)
[477] arXiv:2409.07669 (cross-list from cs.SE) [pdf, html, other]
Title: A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features
Jessy Ayala, Yu-Jye Tung, Joshua Garcia
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[478] arXiv:2409.07670 (cross-list from cs.SE) [pdf, html, other]
Title: A Deep Dive Into How Open-Source Project Maintainers Review and Resolve Bug Bounty Reports
Jessy Ayala, Steven Ngo, Joshua Garcia
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[479] arXiv:2409.07717 (cross-list from cs.HC) [pdf, html, other]
Title: Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection
Sijie Zhuo, Robert Biddle, Jared Daniel Recomendable, Giovanni Russello, Danielle Lottridge
Comments: 25 pages, 6 figures, currently accepted in EuroUsec2024, but not yet published
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[480] arXiv:2409.07751 (cross-list from cs.LG) [pdf, html, other]
Title: Efficient Privacy-Preserving KAN Inference Using Homomorphic Encryption
Zhizheng Lai, Yufei Zhou, Peijia Zheng, Lin Chen
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[481] arXiv:2409.07775 (cross-list from cs.AI) [pdf, html, other]
Title: A Spatiotemporal Stealthy Backdoor Attack against Cooperative Multi-Agent Deep Reinforcement Learning
Yinbo Yu, Saihao Yan, Jiajia Liu
Comments: 6 pages, IEEE Globecom 2024
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[482] arXiv:2409.07863 (cross-list from quant-ph) [pdf, other]
Title: Collaboration Encouraging Quantum Secret Sharing Scheme with Seal Property
Xiaogang Cheng, Ren Guo
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[483] arXiv:2409.07889 (cross-list from cs.LG) [pdf, html, other]
Title: BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding
Tristan Benoit, Yunru Wang, Moritz Dannehl, Johannes Kinder
Comments: Accepted at the 34th USENIX Security Symposium (Usenix 2025). 20 pages, 5 figures. Tristan Benoit and Yunru Wang made equal contributions to this work
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[484] arXiv:2409.08111 (cross-list from cs.LG) [pdf, html, other]
Title: Towards a graph-based foundation model for network traffic analysis
Louis Van Langendonck, Ismael Castell-Uroz, Pere Barlet-Ros
Comments: Pre-print of Accepted Workshop paper to 3rd GNNet, co-located with CoNEXT'24
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[485] arXiv:2409.08161 (cross-list from cs.DC) [pdf, html, other]
Title: Validated Strong Consensus Protocol for Asynchronous Vote-based Blockchains
Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder, Yongluan Zhou
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[486] arXiv:2409.08255 (cross-list from cs.LG) [pdf, html, other]
Title: LoRID: Low-Rank Iterative Diffusion for Adversarial Purification
Geigh Zollicoffer, Minh Vu, Ben Nebgen, Juan Castorena, Boian Alexandrov, Manish Bhattarai
Comments: LA-UR-24-28834
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[487] arXiv:2409.08386 (cross-list from cs.MA) [pdf, html, other]
Title: Self-Supervised Inference of Agents in Trustless Environments
Vladyslav Larin, Ivan Nikitin, Alexander Firsov
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[488] arXiv:2409.08482 (cross-list from cs.LG) [pdf, html, other]
Title: Risks When Sharing LoRA Fine-Tuned Diffusion Model Weights
Dixi Yao
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[489] arXiv:2409.08503 (cross-list from cs.LG) [pdf, html, other]
Title: Enhancing Privacy in ControlNet and Stable Diffusion via Split Learning
Dixi Yao
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[490] arXiv:2409.08521 (cross-list from stat.ML) [pdf, html, other]
Title: Optimal Classification-based Anomaly Detection with Neural Networks: Theory and Practice
Tian-Yi Zhou, Matthew Lau, Jizhou Chen, Wenke Lee, Xiaoming Huo
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistics Theory (math.ST)
[491] arXiv:2409.08538 (cross-list from cs.LG) [pdf, html, other]
Title: An Efficient Privacy-aware Split Learning Framework for Satellite Communications
Jianfei Sun, Cong Wu, Shahid Mumtaz, Junyi Tao, Mingsheng Cao, Mei Wang, Valerio Frascolla
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[492] arXiv:2409.08786 (cross-list from cs.IT) [pdf, html, other]
Title: Modular Neural Wiretap Codes for Fading Channels
Daniel Seifert, Onur Günlü, Rafael F. Schaefer
Comments: Limit performance assessment to constant rate scenarios, add examination of equivocation rate
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[493] arXiv:2409.09406 (cross-list from cs.CV) [pdf, html, other]
Title: Real-world Adversarial Defense against Patch Attacks based on Diffusion Model
Xingxing Wei, Caixin Kang, Yinpeng Dong, Zhengyi Wang, Shouwei Ruan, Yubo Chen, Hang Su
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[494] arXiv:2409.09558 (cross-list from math.ST) [pdf, html, other]
Title: A Statistical Viewpoint on Differential Privacy: Hypothesis Testing, Representation and Blackwell's Theorem
Weijie J. Su
Comments: To appear in Annual Review of Statistics and Its Application
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[495] arXiv:2409.09661 (cross-list from cs.SE) [pdf, html, other]
Title: ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts
Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen
Comments: 4 pages, and to be accepted in ASE2024
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[496] arXiv:2409.10020 (cross-list from cs.NI) [pdf, html, other]
Title: Li-MSD: A lightweight mitigation solution for DAO insider attack in RPL-based IoT
Abhishek Verma, Sachin Kumar Verma, Avinash Chandra Pandey, Jyoti Grover, Girish Sharma
Journal-ref: Future Generation Computer Systems, 159, 327-339 (2024)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[497] arXiv:2409.10226 (cross-list from cs.DC) [pdf, html, other]
Title: Privacy-Preserving Distributed Maximum Consensus Without Accuracy Loss
Wenrui Yu, Richard Heusdens, Jun Pang, Qiongxiu Li
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Information Theory (cs.IT); Signal Processing (eess.SP)
[498] arXiv:2409.10521 (cross-list from cs.IR) [pdf, other]
Title: LSTM Recurrent Neural Networks for Cybersecurity Named Entity Recognition
Houssem Gasmi (DISP), Jannik Laval (DISP), Abdelaziz Bouras (DISP)
Journal-ref: ICSEA 2018, Luigi Lavazza; Roy Oberhauser; Radek Koci, Oct 2018, Nice, France
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[499] arXiv:2409.10533 (cross-list from cs.CV) [pdf, html, other]
Title: Ethical Challenges in Computer Vision: Ensuring Privacy and Mitigating Bias in Publicly Available Datasets
Ghalib Ahmed Tahir
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[500] arXiv:2409.10570 (cross-list from cs.LG) [pdf, html, other]
Title: Protecting Copyright of Medical Pre-trained Language Models: Training-Free Backdoor Model Watermarking
Cong Kong, Rui Xu, Weixi Chen, Jiawei Chen, Zhaoxia Yin
Comments: 9 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
Total of 586 entries : 1-50 ... 301-350 351-400 401-450 451-500 501-550 551-586
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack