Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2025

Total of 731 entries : 1-50 ... 401-450 451-500 501-550 551-600 601-650 651-700 701-731
Showing up to 50 entries per page: fewer | more | all
[551] arXiv:2506.01989 (cross-list from cs.LG) [pdf, html, other]
Title: Coded Robust Aggregation for Distributed Learning under Byzantine Attacks
Chengxi Li, Ming Xiao, Mikael Skoglund
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[552] arXiv:2506.02054 (cross-list from quant-ph) [pdf, other]
Title: Quantum Key Distribution by Quantum Energy Teleportation
Shlomi Dolev, Kazuki Ikeda, Yaron Oz
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[553] arXiv:2506.02089 (cross-list from cs.LG) [pdf, html, other]
Title: SALAD: Systematic Assessment of Machine Unlearning on LLM-Aided Hardware Design
Zeng Wang, Minghao Shao, Rupesh Karn, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[554] arXiv:2506.02277 (cross-list from quant-ph) [pdf, other]
Title: Parallel Repetition for Post-Quantum Arguments
Andrew Huang, Yael Tauman Kalai
Comments: Minor typos corrected
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[555] arXiv:2506.02282 (cross-list from cs.CE) [pdf, other]
Title: Singularity Blockchain Key Management via non-custodial key management
Sumit Vohra
Subjects: Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR)
[556] arXiv:2506.02456 (cross-list from cs.AI) [pdf, other]
Title: VPI-Bench: Visual Prompt Injection Attacks for Computer-Use Agents
Tri Cao, Bennett Lim, Yue Liu, Yuan Sui, Yuexin Li, Shumin Deng, Lin Lu, Nay Oo, Shuicheng Yan, Bryan Hooi
Comments: Under Review
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[557] arXiv:2506.02667 (cross-list from cs.SE) [pdf, html, other]
Title: Poster: libdebug, Build Your Own Debugger for a Better (Hello) World
Gabriele Digregorio, Roberto Alessandro Bertolini, Francesco Panebianco, Mario Polino
Journal-ref: CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[558] arXiv:2506.02761 (cross-list from cs.AI) [pdf, html, other]
Title: Rethinking Machine Unlearning in Image Generation Models
Renyang Liu, Wenjie Feng, Tianwei Zhang, Wei Zhou, Xueqi Cheng, See-Kiong Ng
Comments: Accepted by ACM CCS 2025
Journal-ref: ACM Conference on Computer and Communications Security (CCS 2025)
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[559] arXiv:2506.03196 (cross-list from cs.NI) [pdf, html, other]
Title: Graph Neural Networks for Jamming Source Localization
Dania Herzalla, Willian T. Lunardi, Martin Andreoni
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP)
[560] arXiv:2506.03207 (cross-list from cs.LG) [pdf, html, other]
Title: Fingerprinting Deep Learning Models via Network Traffic Patterns in Federated Learning
Md Nahid Hasan Shuvo, Moinul Hossain
Comments: 7 pages, 4 Figures, Accepted to publish in Proceedings of the 2025 ACM Workshop on Wireless Security and Machine Learning (WiseML 2025), July 3, 2025, Arlington, VA, USA
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[561] arXiv:2506.03234 (cross-list from cs.LG) [pdf, html, other]
Title: BadReward: Clean-Label Poisoning of Reward Models in Text-to-Image RLHF
Kaiwen Duan, Hongwei Yao, Yufei Chen, Ziyun Li, Tong Qiao, Zhan Qin, Cong Wang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[562] arXiv:2506.03467 (cross-list from cs.IT) [pdf, html, other]
Title: Differentially Private Distribution Release of Gaussian Mixture Models via KL-Divergence Minimization
Hang Liu, Anna Scaglione, Sean Peisert
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP); Methodology (stat.ME)
[563] arXiv:2506.03507 (cross-list from cs.SE) [pdf, other]
Title: Software Bill of Materials in Software Supply Chain Security A Systematic Literature Review
Eric O'Donoghue, Yvette Hastings, Ernesto Ortiz, A. Redempta Manzi Muneza
Comments: Needed further author approval
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[564] arXiv:2506.03549 (cross-list from quant-ph) [pdf, html, other]
Title: Quantum Secure Key Exchange with Position-based Credentials
Wen Yu Kon, Ignatius William Primaatmaja, Kaushik Chakraborty, Charles Lim
Comments: 27 pages, 4 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[565] arXiv:2506.03614 (cross-list from cs.CV) [pdf, html, other]
Title: VLMs Can Aggregate Scattered Training Patches
Zhanhui Zhou, Lingjie Chen, Chao Yang, Chaochao Lu
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[566] arXiv:2506.03870 (cross-list from cs.LG) [pdf, html, other]
Title: Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets
Mohd. Farhan Israk Soumik, Syed Mhamudul Hasan, Abdur R. Shahid
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[567] arXiv:2506.04105 (cross-list from quant-ph) [pdf, html, other]
Title: Spanning-tree-packing protocol for conference key propagation in quantum networks
Anton Trushechkin, Hermann Kampermann, Dagmar Bruß
Comments: 9 pages+appendix and references, 9 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[568] arXiv:2506.04453 (cross-list from eess.IV) [pdf, html, other]
Title: Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning
Hasin Us Sami, Swapneel Sen, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy, Basak Guler
Comments: 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2025)
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[569] arXiv:2506.04462 (cross-list from cs.CL) [pdf, other]
Title: Watermarking Degrades Alignment in Language Models: Analysis and Mitigation
Apurv Verma, NhatHai Phan, Shubhendu Trivedi
Comments: Published at the 1st Workshop on GenAI Watermarking (ICLR 2025). Code: this https URL
Journal-ref: 1st Workshop on GenAI Watermarking, ICLR 2025
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[570] arXiv:2506.04566 (cross-list from cs.LG) [pdf, other]
Title: Clustering and Median Aggregation Improve Differentially Private Inference
Kareem Amin, Salman Avestimehr, Sara Babakniya, Alex Bie, Weiwei Kong, Natalia Ponomareva, Umar Syed
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[571] arXiv:2506.04681 (cross-list from cs.LG) [pdf, html, other]
Title: Urania: Differentially Private Insights into AI Use
Daogao Liu, Edith Cohen, Badih Ghazi, Peter Kairouz, Pritish Kamath, Alexander Knop, Ravi Kumar, Pasin Manurangsi, Adam Sealfon, Da Yu, Chiyuan Zhang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[572] arXiv:2506.04909 (cross-list from cs.AI) [pdf, html, other]
Title: When Thinking LLMs Lie: Unveiling the Strategic Deception in Representations of Reasoning Models
Kai Wang, Yihao Zhang, Meng Sun
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[573] arXiv:2506.05022 (cross-list from cs.SE) [pdf, html, other]
Title: Tech-ASan: Two-stage check for Address Sanitizer
Yixuan Cao, Yuhong Feng, Huafeng Li, Chongyi Huang, Fangcao Jian, Haoran Li, Xu Wang
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[574] arXiv:2506.05032 (cross-list from cs.LG) [pdf, html, other]
Title: Identifying and Understanding Cross-Class Features in Adversarial Training
Zeming Wei, Yiwen Guo, Yisen Wang
Comments: ICML 2025
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Optimization and Control (math.OC)
[575] arXiv:2506.05101 (cross-list from cs.LG) [pdf, html, other]
Title: Privacy Amplification Through Synthetic Data: Insights from Linear Regression
Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard
Comments: 26 pages, ICML 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[576] arXiv:2506.05358 (cross-list from cs.CV) [pdf, html, other]
Title: Can ChatGPT Perform Image Splicing Detection? A Preliminary Study
Souradip Nath
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[577] arXiv:2506.05359 (cross-list from q-fin.ST) [pdf, html, other]
Title: Enhancing Meme Token Market Transparency: A Multi-Dimensional Entity-Linked Address Analysis for Liquidity Risk Evaluation
Qiangqiang Liu, Qian Huang, Frank Fan, Haishan Wu, Xueyan Tang
Comments: IEEE International Conference on Blockchain and Cryptocurrency (Proc. IEEE ICBC 2025)
Subjects: Statistical Finance (q-fin.ST); Cryptography and Security (cs.CR)
[578] arXiv:2506.05683 (cross-list from cs.LG) [pdf, html, other]
Title: Multi-Modal Multi-Task Federated Foundation Models for Next-Generation Extended Reality Systems: Towards Privacy-Preserving Distributed Intelligence in AR/VR/MR
Fardis Nadimi, Payam Abdisarabshali, Kasra Borazjani, Jacob Chakareski, Seyyedali Hosseinalipour
Comments: 16 pages, 4 Figures, 8 Tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[579] arXiv:2506.05908 (cross-list from cs.HC) [pdf, html, other]
Title: QualitEye: Public and Privacy-preserving Gaze Data Quality Verification
Mayar Elfares, Pascal Reisert, Ralf Küsters, Andreas Bulling
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[580] arXiv:2506.06003 (cross-list from cs.LG) [pdf, other]
Title: What Really is a Member? Discrediting Membership Inference via Poisoning
Neal Mangaokar, Ashish Hooda, Zhuohang Li, Bradley A. Malin, Kassem Fawaz, Somesh Jha, Atul Prakash, Amrita Roy Chowdhury
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[581] arXiv:2506.06018 (cross-list from cs.MM) [pdf, html, other]
Title: Optimization-Free Universal Watermark Forgery with Regenerative Diffusion Models
Chaoyi Zhu, Zaitang Li, Renyi Yang, Robert Birke, Pin-Yu Chen, Tsung-Yi Ho, Lydia Y. Chen
Subjects: Multimedia (cs.MM); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[582] arXiv:2506.06062 (cross-list from cs.CY) [pdf, html, other]
Title: Minoritised Ethnic People's Security and Privacy Concerns and Responses towards Essential Online Services
Aunam Quyoum, Mark Wong, Sebati Ghosh, Siamak F. Shahandashti
Comments: This is an e-print of a paper accepted to the USENIX Symposium on Usable Privacy and Security (SOUPS) 2025
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[583] arXiv:2506.06108 (cross-list from cs.LG) [pdf, html, other]
Title: Synthetic Tabular Data: Methods, Attacks and Defenses
Graham Cormode, Samuel Maddock, Enayat Ullah, Shripad Gade
Comments: Survey paper for accepted lecture-style tutorial at ACM KDD 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[584] arXiv:2506.06112 (cross-list from cs.LG) [pdf, html, other]
Title: Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness
Cheng-Long Wang, Qi Li, Zihang Xiang, Yinzhi Cao, Di Wang
Comments: To appear in the Proceedings of USENIX Security Symposium, 2025
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[585] arXiv:2506.06444 (cross-list from cs.LG) [pdf, html, other]
Title: Saffron-1: Safety Inference Scaling
Ruizhong Qiu, Gaotang Li, Tianxin Wei, Jingrui He, Hanghang Tong
Comments: Previous title: "Saffron-1: Towards an Inference Scaling Paradigm for LLM Safety Assurance"
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[586] arXiv:2506.06486 (cross-list from cs.LG) [pdf, html, other]
Title: A Certified Unlearning Approach without Access to Source Data
Umit Yigit Basaran, Sk Miraj Ahmed, Amit Roy-Chowdhury, Basak Guler
Comments: Accepted by ICML 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[587] arXiv:2506.06488 (cross-list from cs.LG) [pdf, other]
Title: Membership Inference Attacks for Unseen Classes
Pratiksha Thaker, Neil Kale, Zhiwei Steven Wu, Virginia Smith
Comments: Preprint
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[588] arXiv:2506.06549 (cross-list from cs.LG) [pdf, html, other]
Title: GeoClip: Geometry-Aware Clipping for Differentially Private SGD
Atefeh Gilani, Naima Tasnim, Lalitha Sankar, Oliver Kosut
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[589] arXiv:2506.06556 (cross-list from cs.LG) [pdf, html, other]
Title: SDN-Based False Data Detection With Its Mitigation and Machine Learning Robustness for In-Vehicle Networks
Long Dang, Thushari Hapuarachchi, Kaiqi Xiong, Yi Li
Comments: The 34th International Conference on Computer Communications and Networks (ICCCN 2025)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[590] arXiv:2506.06563 (cross-list from cs.CV) [pdf, html, other]
Title: Securing Traffic Sign Recognition Systems in Autonomous Vehicles
Thushari Hapuarachchi, Long Dang, Kaiqi Xiong
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[591] arXiv:2506.06691 (cross-list from cs.MM) [pdf, html, other]
Title: An Efficient Digital Watermarking Technique for Small Scale devices
Kaushik Talathi, Aparna Santra Biswas
Comments: 28 pages, 11 figures, 4 tables
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[592] arXiv:2506.06694 (cross-list from cs.LG) [pdf, html, other]
Title: Breaking Data Silos: Towards Open and Scalable Mobility Foundation Models via Generative Continual Learning
Yuan Yuan, Yukun Liu, Chonghua Han, Jie Feng, Yong Li
Comments: The 33rd ACM International Conference on Advances in Geographic Information Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[593] arXiv:2506.06825 (cross-list from cs.HC) [pdf, html, other]
Title: Identity Deepfake Threats to Biometric Authentication Systems: Public and Expert Perspectives
Shijing He, Yaxiong Lei, Zihan Zhang, Yuzhou Sun, Shujun Li, Chi Zhang, Juan Ye
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[594] arXiv:2506.06861 (cross-list from cs.LG) [pdf, html, other]
Title: Differentially Private Sparse Linear Regression with Heavy-tailed Responses
Xizhi Tian, Meng Ding, Touming Tao, Zihang Xiang, Di Wang
Comments: Accepted at ECML 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[595] arXiv:2506.06891 (cross-list from cs.LG) [pdf, html, other]
Title: Can In-Context Reinforcement Learning Recover From Reward Poisoning Attacks?
Paulius Sasnauskas, Yiğit Yalın, Goran Radanović
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[596] arXiv:2506.06916 (cross-list from cs.NI) [pdf, html, other]
Title: ARGOS: Anomaly Recognition and Guarding through O-RAN Sensing
Stavros Dimou, Guevara Noubir
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[597] arXiv:2506.06933 (cross-list from cs.LG) [pdf, html, other]
Title: Rewriting the Budget: A General Framework for Black-Box Attacks Under Cost Asymmetry
Mahdi Salmani, Alireza Abdollahpoorrostam, Seyed-Mohsen Moosavi-Dezfooli
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[598] arXiv:2506.06971 (cross-list from cs.CL) [pdf, html, other]
Title: Chain-of-Code Collapse: Reasoning Failures in LLMs via Adversarial Prompting in Code Generation
Jaechul Roh, Varun Gandhi, Shivani Anilkumar, Arin Garg
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[599] arXiv:2506.06985 (cross-list from cs.LG) [pdf, html, other]
Title: Certified Unlearning for Neural Networks
Anastasia Koloskova, Youssef Allouah, Animesh Jha, Rachid Guerraoui, Sanmi Koyejo
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[600] arXiv:2506.07022 (cross-list from cs.LG) [pdf, html, other]
Title: AlphaSteer: Learning Refusal Steering with Principled Null-Space Constraint
Leheng Sheng, Changshuo Shen, Weixiang Zhao, Junfeng Fang, Xiaohao Liu, Zhenkai Liang, Xiang Wang, An Zhang, Tat-Seng Chua
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
Total of 731 entries : 1-50 ... 401-450 451-500 501-550 551-600 601-650 651-700 701-731
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack