CINXE.COM

Cryptography and Security Mar 2025

<!DOCTYPE html> <html lang="en"> <head> <title>Cryptography and Security Mar 2025</title> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="apple-touch-icon" sizes="180x180" href="/static/browse/0.3.4/images/icons/apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="/static/browse/0.3.4/images/icons/favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="/static/browse/0.3.4/images/icons/favicon-16x16.png"> <link rel="manifest" href="/static/browse/0.3.4/images/icons/site.webmanifest"> <link rel="mask-icon" href="/static/browse/0.3.4/images/icons/safari-pinned-tab.svg" color="#5bbad5"> <meta name="msapplication-TileColor" content="#da532c"> <meta name="theme-color" content="#ffffff"> <link rel="stylesheet" type="text/css" media="screen" href="/static/browse/0.3.4/css/arXiv.css?v=20241206" /> <link rel="stylesheet" type="text/css" media="print" href="/static/browse/0.3.4/css/arXiv-print.css?v=20200611" /> <link rel="stylesheet" type="text/css" media="screen" href="/static/browse/0.3.4/css/browse_search.css" /> <script language="javascript" src="/static/browse/0.3.4/js/accordion.js" /></script> <script src="/static/browse/0.3.4/js/mathjaxToggle.min.js" type="text/javascript"></script> <script type="text/javascript" language="javascript">mathjaxToggle();</script> </head> <body class="with-cu-identity"> <div class="flex-wrap-footer"> <header> <a href="#content" class="is-sr-only">Skip to main content</a> <!-- start desktop header --> <div class="columns is-vcentered is-hidden-mobile" id="cu-identity"> <div class="column" id="cu-logo"> <a href="https://www.cornell.edu/"><img src="/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg" alt="Cornell University" /></a> </div><div class="column" id="support-ack"> <span id="support-ack-url">We gratefully acknowledge support from the Simons Foundation, <a href="https://info.arxiv.org/about/ourmembers.html">member institutions</a>, and all contributors.</span> <a href="https://info.arxiv.org/about/donate.html" class="btn-header-donate">Donate</a> </div> </div> <div id="header" class="is-hidden-mobile"> <a aria-hidden="true" tabindex="-1" href="/IgnoreMe"></a> <div class="header-breadcrumbs"> <a href="/"><img src="/static/browse/0.3.4/images/arxiv-logo-one-color-white.svg" alt="arxiv logo" style="height:40px;"/></a> <span>&gt;</span> <a href="/list/cs.CR/recent">cs.CR</a> </div> <div class="search-block level-right"> <form class="level-item mini-search" method="GET" action="https://arxiv.org/search"> <div class="field has-addons"> <div class="control"> <input class="input is-small" type="text" name="query" placeholder="Search..." aria-label="Search term or terms" /> <p class="help"><a href="https://info.arxiv.org/help">Help</a> | <a href="https://arxiv.org/search/advanced">Advanced Search</a></p> </div> <div class="control"> <div class="select is-small"> <select name="searchtype" aria-label="Field to search"> <option value="all" selected="selected">All fields</option> <option value="title">Title</option> <option value="author">Author</option> <option value="abstract">Abstract</option> <option value="comments">Comments</option> <option value="journal_ref">Journal reference</option> <option value="acm_class">ACM classification</option> <option value="msc_class">MSC classification</option> <option value="report_num">Report number</option> <option value="paper_id">arXiv identifier</option> <option value="doi">DOI</option> <option value="orcid">ORCID</option> <option value="author_id">arXiv author ID</option> <option value="help">Help pages</option> <option value="full_text">Full text</option> </select> </div> </div> <input type="hidden" name="source" value="header"> <button class="button is-small is-cul-darker">Search</button> </div> </form> </div> </div><!-- /end desktop header --> <div class="mobile-header"> <div class="columns is-mobile"> <div class="column logo-arxiv"><a href="https://arxiv.org/"><img src="/static/browse/0.3.4/images/arxiv-logomark-small-white.svg" alt="arXiv logo" style="height:60px;" /></a></div> <div class="column logo-cornell"><a href="https://www.cornell.edu/"> <picture> <source media="(min-width: 501px)" srcset="/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg 400w" sizes="400w" /> <source srcset="/static/browse/0.3.4/images/icons/cu/cornell_seal_simple_black.svg 2x" /> <img src="/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg" alt="Cornell University Logo" /> </picture> </a></div> <div class="column nav" id="toggle-container" role="menubar"> <button class="toggle-control"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-white"><title>open search</title><path d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"/></svg></button> <div class="mobile-toggle-block toggle-target"> <form class="mobile-search-form" method="GET" action="https://arxiv.org/search"> <div class="field has-addons"> <input class="input" type="text" name="query" placeholder="Search..." aria-label="Search term or terms" /> <input type="hidden" name="source" value="header"> <input type="hidden" name="searchtype" value="all"> <button class="button">GO</button> </div> </form> </div> <button class="toggle-control"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512" class="icon filter-white" role="menu"><title>open navigation menu</title><path d="M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"/ ></svg></button> <div class="mobile-toggle-block toggle-target"> <nav class="mobile-menu" aria-labelledby="mobilemenulabel"> <h2 id="mobilemenulabel">quick links</h2> <ul> <li><a href="https://arxiv.org/login">Login</a></li> <li><a href="https://info.arxiv.org/help">Help Pages</a></li> <li><a href="https://info.arxiv.org/about">About</a></li> </ul> </nav> </div> </div> </div> </div><!-- /end mobile-header --> </header> <main> <div id="content"> <div id='content-inner'> <div id='dlpage'> <h1>Cryptography and Security</h1> <h2>Authors and titles for March 2025 </h2> <div class='paging'>Total of 421 entries : <span>1-50</span> <a href=/list/cs.CR/current?skip=50&amp;show=50>51-100</a> <a href=/list/cs.CR/current?skip=100&amp;show=50>101-150</a> <a href=/list/cs.CR/current?skip=150&amp;show=50>151-200</a> <span>...</span> <a href=/list/cs.CR/current?skip=400&amp;show=50>401-421</a> </div> <div class='morefewer'>Showing up to 50 entries per page: <a href=/list/cs.CR/current?skip=0&amp;show=25 rel="nofollow"> fewer</a> | <a href=/list/cs.CR/current?skip=0&amp;show=100 rel="nofollow"> more</a> | <a href=/list/cs.CR/current?skip=0&amp;show=2000 rel="nofollow"> all</a> </div> <dl id='articles'> <dt> <a name='item1'>[1]</a> <a href ="/abs/2503.00061" title="Abstract" id="2503.00061"> arXiv:2503.00061 </a> [<a href="/pdf/2503.00061" title="Download PDF" id="pdf-2503.00061" aria-labelledby="pdf-2503.00061">pdf</a>, <a href="https://arxiv.org/html/2503.00061v2" title="View HTML" id="html-2503.00061" aria-labelledby="html-2503.00061" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00061" title="Other formats" id="oth-2503.00061" aria-labelledby="oth-2503.00061">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Adaptive Attacks Break Defenses Against Indirect Prompt Injection Attacks on LLM Agents </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhan,+Q">Qiusi Zhan</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Fang,+R">Richard Fang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Panchal,+H+S">Henil Shalin Panchal</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kang,+D">Daniel Kang</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 17 pages, 5 figures, 6 tables (NAACL 2025 Findings) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item2'>[2]</a> <a href ="/abs/2503.00062" title="Abstract" id="2503.00062"> arXiv:2503.00062 </a> [<a href="/pdf/2503.00062" title="Download PDF" id="pdf-2503.00062" aria-labelledby="pdf-2503.00062">pdf</a>, <a href="https://arxiv.org/html/2503.00062v1" title="View HTML" id="html-2503.00062" aria-labelledby="html-2503.00062" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00062" title="Other formats" id="oth-2503.00062" aria-labelledby="oth-2503.00062">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wang,+W">Weiqi Wang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhang,+C">Chenhan Zhang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tian,+Z">Zhiyi Tian</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Liu,+S">Shushu Liu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yu,+S">Shui Yu</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item3'>[3]</a> <a href ="/abs/2503.00065" title="Abstract" id="2503.00065"> arXiv:2503.00065 </a> [<a href="/pdf/2503.00065" title="Download PDF" id="pdf-2503.00065" aria-labelledby="pdf-2503.00065">pdf</a>, <a href="/format/2503.00065" title="Other formats" id="oth-2503.00065" aria-labelledby="oth-2503.00065">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> ADAGE: Active Defenses Against GNN Extraction </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Xu,+J">Jing Xu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Boenisch,+F">Franziska Boenisch</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Dziedzic,+A">Adam Dziedzic</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item4'>[4]</a> <a href ="/abs/2503.00066" title="Abstract" id="2503.00066"> arXiv:2503.00066 </a> [<a href="/pdf/2503.00066" title="Download PDF" id="pdf-2503.00066" aria-labelledby="pdf-2503.00066">pdf</a>, <a href="https://arxiv.org/html/2503.00066v1" title="View HTML" id="html-2503.00066" aria-labelledby="html-2503.00066" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00066" title="Other formats" id="oth-2503.00066" aria-labelledby="oth-2503.00066">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> CrowdAL: Towards a Blockchain-empowered Active Learning System in Crowd Data Labeling </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hou,+S">Shaojie Hou</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wang,+Y">Yuandou Wang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhao,+Z">Zhiming Zhao</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> Published in 2024 IEEE 20th International Conference on e-Science (e-Science) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item5'>[5]</a> <a href ="/abs/2503.00070" title="Abstract" id="2503.00070"> arXiv:2503.00070 </a> [<a href="/pdf/2503.00070" title="Download PDF" id="pdf-2503.00070" aria-labelledby="pdf-2503.00070">pdf</a>, <a href="/format/2503.00070" title="Other formats" id="oth-2503.00070" aria-labelledby="oth-2503.00070">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Systematic Review of Cybersecurity in Banking: Evolution from Pre-Industry 4.0 to Post-Industry 4.0 in Artificial Intelligence, Blockchain, Policies and Practice </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tran,+T+N">Tue Nhi Tran</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Computational Engineering, Finance, and Science (cs.CE) </div> </div> </dd> <dt> <a name='item6'>[6]</a> <a href ="/abs/2503.00140" title="Abstract" id="2503.00140"> arXiv:2503.00140 </a> [<a href="/pdf/2503.00140" title="Download PDF" id="pdf-2503.00140" aria-labelledby="pdf-2503.00140">pdf</a>, <a href="https://arxiv.org/html/2503.00140v1" title="View HTML" id="html-2503.00140" aria-labelledby="html-2503.00140" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00140" title="Other formats" id="oth-2503.00140" aria-labelledby="oth-2503.00140">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Approaching the Harm of Gradient Attacks While Only Flipping Labels </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=El-Kabid,+A">Abdessamad El-Kabid</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=El-Mhamdi,+E">El-Mahdi El-Mhamdi</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 17 pages, 25 figures </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Machine Learning (cs.LG); Machine Learning (stat.ML) </div> </div> </dd> <dt> <a name='item7'>[7]</a> <a href ="/abs/2503.00145" title="Abstract" id="2503.00145"> arXiv:2503.00145 </a> [<a href="/pdf/2503.00145" title="Download PDF" id="pdf-2503.00145" aria-labelledby="pdf-2503.00145">pdf</a>, <a href="https://arxiv.org/html/2503.00145v1" title="View HTML" id="html-2503.00145" aria-labelledby="html-2503.00145" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00145" title="Other formats" id="oth-2503.00145" aria-labelledby="oth-2503.00145">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> AMuLeT: Automated Design-Time Testing of Secure Speculation Countermeasures </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Fu,+B">Bo Fu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tenenbaum,+L">Leo Tenenbaum</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Adler,+D">David Adler</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Klein,+A">Assaf Klein</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gogia,+A">Arpit Gogia</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Alameldeen,+A+R">Alaa R. Alameldeen</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Guarnieri,+M">Marco Guarnieri</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Silberstein,+M">Mark Silberstein</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Oleksenko,+O">Oleksii Oleksenko</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Saileshwar,+G">Gururaj Saileshwar</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> To be published in Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS&#39;25) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Hardware Architecture (cs.AR) </div> </div> </dd> <dt> <a name='item8'>[8]</a> <a href ="/abs/2503.00164" title="Abstract" id="2503.00164"> arXiv:2503.00164 </a> [<a href="/pdf/2503.00164" title="Download PDF" id="pdf-2503.00164" aria-labelledby="pdf-2503.00164">pdf</a>, <a href="https://arxiv.org/html/2503.00164v1" title="View HTML" id="html-2503.00164" aria-labelledby="html-2503.00164" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00164" title="Other formats" id="oth-2503.00164" aria-labelledby="oth-2503.00164">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Transforming Cyber Defense: Harnessing Agentic and Frontier AI for Proactive, Ethical Threat Intelligence </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tallam,+K">Krti Tallam</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item9'>[9]</a> <a href ="/abs/2503.00324" title="Abstract" id="2503.00324"> arXiv:2503.00324 </a> [<a href="/pdf/2503.00324" title="Download PDF" id="pdf-2503.00324" aria-labelledby="pdf-2503.00324">pdf</a>, <a href="https://arxiv.org/html/2503.00324v1" title="View HTML" id="html-2503.00324" aria-labelledby="html-2503.00324" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00324" title="Other formats" id="oth-2503.00324" aria-labelledby="oth-2503.00324">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mehedi,+S+T">Sk Tanzir Mehedi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Islam,+C">Chadni Islam</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ramachandran,+G">Gowri Ramachandran</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jurdak,+R">Raja Jurdak</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Software Engineering (cs.SE) </div> </div> </dd> <dt> <a name='item10'>[10]</a> <a href ="/abs/2503.00358" title="Abstract" id="2503.00358"> arXiv:2503.00358 </a> [<a href="/pdf/2503.00358" title="Download PDF" id="pdf-2503.00358" aria-labelledby="pdf-2503.00358">pdf</a>, <a href="https://arxiv.org/html/2503.00358v1" title="View HTML" id="html-2503.00358" aria-labelledby="html-2503.00358" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00358" title="Other formats" id="oth-2503.00358" aria-labelledby="oth-2503.00358">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> CRUPL: A Semi-Supervised Cyber Attack Detection with Consistency Regularization and Uncertainty-aware Pseudo-Labeling in Smart Grid </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Dash,+S+P">Smruti P. Dash</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Khandeparkar,+K+V">Kedar V. Khandeparkar</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Agrawal,+N">Nipun Agrawal</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 20 pages, 5 figures </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item11'>[11]</a> <a href ="/abs/2503.00416" title="Abstract" id="2503.00416"> arXiv:2503.00416 </a> [<a href="/pdf/2503.00416" title="Download PDF" id="pdf-2503.00416" aria-labelledby="pdf-2503.00416">pdf</a>, <a href="/format/2503.00416" title="Other formats" id="oth-2503.00416" aria-labelledby="oth-2503.00416">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Breaking the Loop: Detecting and Mitigating Denial-of-Service Vulnerabilities in Large Language Models </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yu,+J">Junzhe Yu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Liu,+Y">Yi Liu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sun,+H">Huijia Sun</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Shi,+L">Ling Shi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chen,+Y">Yuqi Chen</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Performance (cs.PF) </div> </div> </dd> <dt> <a name='item12'>[12]</a> <a href ="/abs/2503.00555" title="Abstract" id="2503.00555"> arXiv:2503.00555 </a> [<a href="/pdf/2503.00555" title="Download PDF" id="pdf-2503.00555" aria-labelledby="pdf-2503.00555">pdf</a>, <a href="https://arxiv.org/html/2503.00555v1" title="View HTML" id="html-2503.00555" aria-labelledby="html-2503.00555" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00555" title="Other formats" id="oth-2503.00555" aria-labelledby="oth-2503.00555">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Safety Tax: Safety Alignment Makes Your Large Reasoning Models Less Reasonable </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Huang,+T">Tiansheng Huang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hu,+S">Sihao Hu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ilhan,+F">Fatih Ilhan</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tekin,+S+F">Selim Furkan Tekin</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yahn,+Z">Zachary Yahn</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Xu,+Y">Yichang Xu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Liu,+L">Ling Liu</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item13'>[13]</a> <a href ="/abs/2503.00581" title="Abstract" id="2503.00581"> arXiv:2503.00581 </a> [<a href="/pdf/2503.00581" title="Download PDF" id="pdf-2503.00581" aria-labelledby="pdf-2503.00581">pdf</a>, <a href="https://arxiv.org/html/2503.00581v1" title="View HTML" id="html-2503.00581" aria-labelledby="html-2503.00581" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00581" title="Other formats" id="oth-2503.00581" aria-labelledby="oth-2503.00581">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Secure Aggregation in Federated Learning using Multiparty Homomorphic Encryption </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hosseini,+E">Erfan Hosseini</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chen,+S">Shuangyi Chen</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Khisti,+A">Ashish Khisti</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item14'>[14]</a> <a href ="/abs/2503.00615" title="Abstract" id="2503.00615"> arXiv:2503.00615 </a> [<a href="/pdf/2503.00615" title="Download PDF" id="pdf-2503.00615" aria-labelledby="pdf-2503.00615">pdf</a>, <a href="https://arxiv.org/html/2503.00615v1" title="View HTML" id="html-2503.00615" aria-labelledby="html-2503.00615" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00615" title="Other formats" id="oth-2503.00615" aria-labelledby="oth-2503.00615">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Adil,+M">Muhammad Adil</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jan,+M+A">Mian Ahmad Jan</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hakim,+S+B">Safayat Bin Hakim</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Song,+H+H">Houbing Herbert Song</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jin,+Z">Zhanpeng Jin</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> Accepted in, 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2024) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item15'>[15]</a> <a href ="/abs/2503.00638" title="Abstract" id="2503.00638"> arXiv:2503.00638 </a> [<a href="/pdf/2503.00638" title="Download PDF" id="pdf-2503.00638" aria-labelledby="pdf-2503.00638">pdf</a>, <a href="/format/2503.00638" title="Other formats" id="oth-2503.00638" aria-labelledby="oth-2503.00638">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> POSERS: Steganography-Driven Molecular Tagging Using Randomized DNA Sequences </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yazdi,+A+T">Ali Tafazoli Yazdi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Nejjar,+P">Peter Nejjar</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hochrein,+L">Lena Hochrein</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Probability (math.PR); Biomolecules (q-bio.BM) </div> </div> </dd> <dt> <a name='item16'>[16]</a> <a href ="/abs/2503.00659" title="Abstract" id="2503.00659"> arXiv:2503.00659 </a> [<a href="/pdf/2503.00659" title="Download PDF" id="pdf-2503.00659" aria-labelledby="pdf-2503.00659">pdf</a>, <a href="https://arxiv.org/html/2503.00659v1" title="View HTML" id="html-2503.00659" aria-labelledby="html-2503.00659" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00659" title="Other formats" id="oth-2503.00659" aria-labelledby="oth-2503.00659">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> CATS: A framework for Cooperative Autonomy Trust &amp; Security </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Asavisanu,+N">Namo Asavisanu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Khezresmaeilzadeh,+T">Tina Khezresmaeilzadeh</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sequeira,+R">Rohan Sequeira</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Qiu,+H">Hang Qiu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ahmad,+F">Fawad Ahmad</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Psounis,+K">Konstantinos Psounis</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Govindan,+R">Ramesh Govindan</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Networking and Internet Architecture (cs.NI) </div> </div> </dd> <dt> <a name='item17'>[17]</a> <a href ="/abs/2503.00719" title="Abstract" id="2503.00719"> arXiv:2503.00719 </a> [<a href="/pdf/2503.00719" title="Download PDF" id="pdf-2503.00719" aria-labelledby="pdf-2503.00719">pdf</a>, <a href="/format/2503.00719" title="Other formats" id="oth-2503.00719" aria-labelledby="oth-2503.00719">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Enhanced Security of Public Key Encryption with Certified Deletion </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Cheng,+X">Xiaogang Cheng</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Guo,+R">Ren Guo</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item18'>[18]</a> <a href ="/abs/2503.00742" title="Abstract" id="2503.00742"> arXiv:2503.00742 </a> [<a href="/pdf/2503.00742" title="Download PDF" id="pdf-2503.00742" aria-labelledby="pdf-2503.00742">pdf</a>, <a href="/format/2503.00742" title="Other formats" id="oth-2503.00742" aria-labelledby="oth-2503.00742">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Revolutionizing Healthcare Record Management: Secure Documentation Storage and Access through Advanced Blockchain Solutions </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Brijwani,+G+N">Geeta N. Brijwani</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ajmire,+P+E">Prafulla E Ajmire</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Junaid,+M+A+M">Mohammad Atique Mohammad Junaid</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Charasia,+S+A">Suhashini Awadhesh Charasia</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Bhende,+D">Deepali Bhende</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 12 Pages </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item19'>[19]</a> <a href ="/abs/2503.00950" title="Abstract" id="2503.00950"> arXiv:2503.00950 </a> [<a href="/pdf/2503.00950" title="Download PDF" id="pdf-2503.00950" aria-labelledby="pdf-2503.00950">pdf</a>, <a href="https://arxiv.org/html/2503.00950v1" title="View HTML" id="html-2503.00950" aria-labelledby="html-2503.00950" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.00950" title="Other formats" id="oth-2503.00950" aria-labelledby="oth-2503.00950">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Decomposition of RSA modulus applying even order elliptic curves </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Pomyka%C5%82a,+J">Jacek Pomyka艂a</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jurkiewicz,+M">Mariusz Jurkiewicz</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Number Theory (math.NT) </div> </div> </dd> <dt> <a name='item20'>[20]</a> <a href ="/abs/2503.01089" title="Abstract" id="2503.01089"> arXiv:2503.01089 </a> [<a href="/pdf/2503.01089" title="Download PDF" id="pdf-2503.01089" aria-labelledby="pdf-2503.01089">pdf</a>, <a href="/format/2503.01089" title="Other formats" id="oth-2503.01089" aria-labelledby="oth-2503.01089">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Privacy-preserving Machine Learning in Internet of Vehicle Applications: Fundamentals, Recent Advances, and Future Direction </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Islam,+N">Nazmul Islam</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zulkernine,+M">Mohammad Zulkernine</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item21'>[21]</a> <a href ="/abs/2503.01111" title="Abstract" id="2503.01111"> arXiv:2503.01111 </a> [<a href="/pdf/2503.01111" title="Download PDF" id="pdf-2503.01111" aria-labelledby="pdf-2503.01111">pdf</a>, <a href="https://arxiv.org/html/2503.01111v1" title="View HTML" id="html-2503.01111" aria-labelledby="html-2503.01111" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01111" title="Other formats" id="oth-2503.01111" aria-labelledby="oth-2503.01111">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Exploration on Real World Assets and Tokenization </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Xia,+N">Ning Xia</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhao,+X">Xiaolei Zhao</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yang,+Y">Yimin Yang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Li,+Y">Yixuan Li</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Li,+Y">Yucong Li</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 9 pages </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item22'>[22]</a> <a href ="/abs/2503.01327" title="Abstract" id="2503.01327"> arXiv:2503.01327 </a> [<a href="/pdf/2503.01327" title="Download PDF" id="pdf-2503.01327" aria-labelledby="pdf-2503.01327">pdf</a>, <a href="https://arxiv.org/html/2503.01327v1" title="View HTML" id="html-2503.01327" aria-labelledby="html-2503.01327" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01327" title="Other formats" id="oth-2503.01327" aria-labelledby="oth-2503.01327">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Victim-Centred Abuse Investigations and Defenses for Social Media Platforms </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hakami,+Z">Zaid Hakami</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Shafin,+A+A">Ashfaq Ali Shafin</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Clarke,+P+J">Peter J. Clarke</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Pissinou,+N">Niki Pissinou</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Carbunar,+B">Bogdan Carbunar</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Computers and Society (cs.CY); Human-Computer Interaction (cs.HC) </div> </div> </dd> <dt> <a name='item23'>[23]</a> <a href ="/abs/2503.01391" title="Abstract" id="2503.01391"> arXiv:2503.01391 </a> [<a href="/pdf/2503.01391" title="Download PDF" id="pdf-2503.01391" aria-labelledby="pdf-2503.01391">pdf</a>, <a href="https://arxiv.org/html/2503.01391v1" title="View HTML" id="html-2503.01391" aria-labelledby="html-2503.01391" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01391" title="Other formats" id="oth-2503.01391" aria-labelledby="oth-2503.01391">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> The Road Less Traveled: Investigating Robustness and Explainability in CNN Malware Detection </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Brosolo,+M">Matteo Brosolo</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Puthuvath,+V">Vinod Puthuvath</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Conti,+M">Mauro Conti</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item24'>[24]</a> <a href ="/abs/2503.01395" title="Abstract" id="2503.01395"> arXiv:2503.01395 </a> [<a href="/pdf/2503.01395" title="Download PDF" id="pdf-2503.01395" aria-labelledby="pdf-2503.01395">pdf</a>, <a href="https://arxiv.org/html/2503.01395v1" title="View HTML" id="html-2503.01395" aria-labelledby="html-2503.01395" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01395" title="Other formats" id="oth-2503.01395" aria-labelledby="oth-2503.01395">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Jailbreaking Generative AI: Empowering Novices to Conduct Phishing Attacks </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mishra,+R">Rina Mishra</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Varshney,+G">Gaurav Varshney</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Singh,+S">Shreya Singh</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item25'>[25]</a> <a href ="/abs/2503.01396" title="Abstract" id="2503.01396"> arXiv:2503.01396 </a> [<a href="/pdf/2503.01396" title="Download PDF" id="pdf-2503.01396" aria-labelledby="pdf-2503.01396">pdf</a>, <a href="https://arxiv.org/html/2503.01396v1" title="View HTML" id="html-2503.01396" aria-labelledby="html-2503.01396" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01396" title="Other formats" id="oth-2503.01396" aria-labelledby="oth-2503.01396">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> CorrNetDroid: Android Malware Detector leveraging a Correlation-based Feature Selection for Network Traffic features </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sharma,+Y">Yash Sharma</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Arora,+A">Anshul Arora</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Multimedia (cs.MM) </div> </div> </dd> <dt> <a name='item26'>[26]</a> <a href ="/abs/2503.01482" title="Abstract" id="2503.01482"> arXiv:2503.01482 </a> [<a href="/pdf/2503.01482" title="Download PDF" id="pdf-2503.01482" aria-labelledby="pdf-2503.01482">pdf</a>, <a href="https://arxiv.org/html/2503.01482v1" title="View HTML" id="html-2503.01482" aria-labelledby="html-2503.01482" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01482" title="Other formats" id="oth-2503.01482" aria-labelledby="oth-2503.01482">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Revisiting Locally Differentially Private Protocols: Towards Better Trade-offs in Privacy, Utility, and Attack Resistance </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Arcolezi,+H+H">H茅ber H. Arcolezi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gambs,+S">S茅bastien Gambs</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item27'>[27]</a> <a href ="/abs/2503.01538" title="Abstract" id="2503.01538"> arXiv:2503.01538 </a> [<a href="/pdf/2503.01538" title="Download PDF" id="pdf-2503.01538" aria-labelledby="pdf-2503.01538">pdf</a>, <a href="https://arxiv.org/html/2503.01538v1" title="View HTML" id="html-2503.01538" aria-labelledby="html-2503.01538" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01538" title="Other formats" id="oth-2503.01538" aria-labelledby="oth-2503.01538">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Formally Discovering and Reproducing Network Protocols Vulnerabilities </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Crochet,+C">Christophe Crochet</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Aoga,+J">John Aoga</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Legay,+A">Axel Legay</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Formal Languages and Automata Theory (cs.FL); Networking and Internet Architecture (cs.NI) </div> </div> </dd> <dt> <a name='item28'>[28]</a> <a href ="/abs/2503.01734" title="Abstract" id="2503.01734"> arXiv:2503.01734 </a> [<a href="/pdf/2503.01734" title="Download PDF" id="pdf-2503.01734" aria-labelledby="pdf-2503.01734">pdf</a>, <a href="https://arxiv.org/html/2503.01734v1" title="View HTML" id="html-2503.01734" aria-labelledby="html-2503.01734" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01734" title="Other formats" id="oth-2503.01734" aria-labelledby="oth-2503.01734">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Adversarial Agents: Black-Box Evasion Attacks with Reinforcement Learning </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Domico,+K">Kyle Domico</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Ferrand,+J+N">Jean-Charles Noirot Ferrand</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Sheatsley,+R">Ryan Sheatsley</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Pauley,+E">Eric Pauley</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hanna,+J">Josiah Hanna</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=McDaniel,+P">Patrick McDaniel</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI) </div> </div> </dd> <dt> <a name='item29'>[29]</a> <a href ="/abs/2503.01758" title="Abstract" id="2503.01758"> arXiv:2503.01758 </a> [<a href="/pdf/2503.01758" title="Download PDF" id="pdf-2503.01758" aria-labelledby="pdf-2503.01758">pdf</a>, <a href="https://arxiv.org/html/2503.01758v1" title="View HTML" id="html-2503.01758" aria-labelledby="html-2503.01758" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01758" title="Other formats" id="oth-2503.01758" aria-labelledby="oth-2503.01758">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Zero-Trust Artificial Intelligence Model Security Based on Moving Target Defense and Content Disarm and Reconstruction </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gilkarov,+D">Daniel Gilkarov</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Dubin,+R">Ran Dubin</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI) </div> </div> </dd> <dt> <a name='item30'>[30]</a> <a href ="/abs/2503.01799" title="Abstract" id="2503.01799"> arXiv:2503.01799 </a> [<a href="/pdf/2503.01799" title="Download PDF" id="pdf-2503.01799" aria-labelledby="pdf-2503.01799">pdf</a>, <a href="https://arxiv.org/html/2503.01799v1" title="View HTML" id="html-2503.01799" aria-labelledby="html-2503.01799" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01799" title="Other formats" id="oth-2503.01799" aria-labelledby="oth-2503.01799">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> PhishVQC: Optimizing Phishing URL Detection with Correlation Based Feature Selection and Variational Quantum Classifier </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Shahriyar,+M+F">Md. Farhan Shahriyar</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tanbhir,+G">Gazi Tanbhir</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chy,+A+M+R">Abdullah Md Raihan Chy</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tanzin,+M+A+A+A">Mohammed Abdul Al Arafat Tanzin</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mashrafi,+M+J">Md. Jisan Mashrafi</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> This paper has been accepted and presented at the 3rd International Conference on Intelligent Systems Advanced Computing and Communication (ISACC 2025) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item31'>[31]</a> <a href ="/abs/2503.01811" title="Abstract" id="2503.01811"> arXiv:2503.01811 </a> [<a href="/pdf/2503.01811" title="Download PDF" id="pdf-2503.01811" aria-labelledby="pdf-2503.01811">pdf</a>, <a href="https://arxiv.org/html/2503.01811v1" title="View HTML" id="html-2503.01811" aria-labelledby="html-2503.01811" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01811" title="Other formats" id="oth-2503.01811" aria-labelledby="oth-2503.01811">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> AutoAdvExBench: Benchmarking autonomous exploitation of adversarial example defenses </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Carlini,+N">Nicholas Carlini</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Rando,+J">Javier Rando</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Debenedetti,+E">Edoardo Debenedetti</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Nasr,+M">Milad Nasr</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Tram%C3%A8r,+F">Florian Tram猫r</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item32'>[32]</a> <a href ="/abs/2503.01839" title="Abstract" id="2503.01839"> arXiv:2503.01839 </a> [<a href="/pdf/2503.01839" title="Download PDF" id="pdf-2503.01839" aria-labelledby="pdf-2503.01839">pdf</a>, <a href="https://arxiv.org/html/2503.01839v1" title="View HTML" id="html-2503.01839" aria-labelledby="html-2503.01839" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01839" title="Other formats" id="oth-2503.01839" aria-labelledby="oth-2503.01839">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Jailbreaking Safeguarded Text-to-Image Models via Large Language Models </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jiang,+Z">Zhengyuan Jiang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hu,+Y">Yuepeng Hu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yang,+Y">Yuchen Yang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Cao,+Y">Yinzhi Cao</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gong,+N+Z">Neil Zhenqiang Gong</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Computer Vision and Pattern Recognition (cs.CV) </div> </div> </dd> <dt> <a name='item33'>[33]</a> <a href ="/abs/2503.01908" title="Abstract" id="2503.01908"> arXiv:2503.01908 </a> [<a href="/pdf/2503.01908" title="Download PDF" id="pdf-2503.01908" aria-labelledby="pdf-2503.01908">pdf</a>, <a href="https://arxiv.org/html/2503.01908v1" title="View HTML" id="html-2503.01908" aria-labelledby="html-2503.01908" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01908" title="Other formats" id="oth-2503.01908" aria-labelledby="oth-2503.01908">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> UDora: A Unified Red Teaming Framework against LLM Agents by Dynamically Hijacking Their Own Reasoning </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhang,+J">Jiawei Zhang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yang,+S">Shuang Yang</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Li,+B">Bo Li</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item34'>[34]</a> <a href ="/abs/2503.01915" title="Abstract" id="2503.01915"> arXiv:2503.01915 </a> [<a href="/pdf/2503.01915" title="Download PDF" id="pdf-2503.01915" aria-labelledby="pdf-2503.01915">pdf</a>, <a href="https://arxiv.org/html/2503.01915v1" title="View HTML" id="html-2503.01915" aria-labelledby="html-2503.01915" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.01915" title="Other formats" id="oth-2503.01915" aria-labelledby="oth-2503.01915">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Datenschutzkonformer LLM-Einsatz: Eine Open-Source-Referenzarchitektur </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Lambert,+M">Marian Lambert</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Schuster,+T">Thomas Schuster</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=D%C3%B6ring,+N">Nico D枚ring</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Kr%C3%BCger,+R">Robin Kr眉ger</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> in German language </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item35'>[35]</a> <a href ="/abs/2503.01944" title="Abstract" id="2503.01944"> arXiv:2503.01944 </a> [<a href="/pdf/2503.01944" title="Download PDF" id="pdf-2503.01944" aria-labelledby="pdf-2503.01944">pdf</a>, <a href="/format/2503.01944" title="Other formats" id="oth-2503.01944" aria-labelledby="oth-2503.01944">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Protecting DeFi Platforms against Non-Price Flash Loan Attacks </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Alhaidari,+A">Abdulrahman Alhaidari</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Palanisamy,+B">Balaji Palanisamy</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Krishnamurthy,+P">Prashant Krishnamurthy</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> Accepted paper to appear in the 15th ACM Conference on Data and Application Security and Privacy (CODASPY 2025) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item36'>[36]</a> <a href ="/abs/2503.02017" title="Abstract" id="2503.02017"> arXiv:2503.02017 </a> [<a href="/pdf/2503.02017" title="Download PDF" id="pdf-2503.02017" aria-labelledby="pdf-2503.02017">pdf</a>, <a href="/format/2503.02017" title="Other formats" id="oth-2503.02017" aria-labelledby="oth-2503.02017">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> A Lightweight and Secure Deep Learning Model for Privacy-Preserving Federated Learning in Intelligent Enterprises </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Fotohi,+R">Reza Fotohi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Aliee,+F+S">Fereidoon Shams Aliee</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Farahani,+B">Bahar Farahani</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 11 pages, 7 figures, IEEE Internet of Things Journal (2024) </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item37'>[37]</a> <a href ="/abs/2503.02018" title="Abstract" id="2503.02018"> arXiv:2503.02018 </a> [<a href="/pdf/2503.02018" title="Download PDF" id="pdf-2503.02018" aria-labelledby="pdf-2503.02018">pdf</a>, <a href="https://arxiv.org/html/2503.02018v1" title="View HTML" id="html-2503.02018" aria-labelledby="html-2503.02018" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02018" title="Other formats" id="oth-2503.02018" aria-labelledby="oth-2503.02018">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Advancing Obfuscation Strategies to Counter China&#39;s Great Firewall: A Technical and Policy Perspective </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Li,+L">Li Li</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item38'>[38]</a> <a href ="/abs/2503.02019" title="Abstract" id="2503.02019"> arXiv:2503.02019 </a> [<a href="/pdf/2503.02019" title="Download PDF" id="pdf-2503.02019" aria-labelledby="pdf-2503.02019">pdf</a>, <a href="https://arxiv.org/html/2503.02019v1" title="View HTML" id="html-2503.02019" aria-labelledby="html-2503.02019" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02019" title="Other formats" id="oth-2503.02019" aria-labelledby="oth-2503.02019">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> SLAP: Secure Location-proof and Anonymous Privacy-preserving Spectrum Access </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Darzi,+S">Saleh Darzi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yavuz,+A+A">Attila A. Yavuz</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 8 pages, Accepted in SVCC 2025: Silicon Valley Cybersecurity Conference </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item39'>[39]</a> <a href ="/abs/2503.02065" title="Abstract" id="2503.02065"> arXiv:2503.02065 </a> [<a href="/pdf/2503.02065" title="Download PDF" id="pdf-2503.02065" aria-labelledby="pdf-2503.02065">pdf</a>, <a href="https://arxiv.org/html/2503.02065v1" title="View HTML" id="html-2503.02065" aria-labelledby="html-2503.02065" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02065" title="Other formats" id="oth-2503.02065" aria-labelledby="oth-2503.02065">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Survey Perspective: The Role of Explainable AI in Threat Intelligence </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Rastogi,+N">Nidhi Rastogi</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Dhanuka,+D">Devang Dhanuka</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Saxena,+A">Amulya Saxena</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Mairal,+P">Pranjal Mairal</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Nguyen,+L">Le Nguyen</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 5 pages, SIGIR Symposium on IR in Practice (SIRIP), 2025 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI); Information Retrieval (cs.IR) </div> </div> </dd> <dt> <a name='item40'>[40]</a> <a href ="/abs/2503.02097" title="Abstract" id="2503.02097"> arXiv:2503.02097 </a> [<a href="/pdf/2503.02097" title="Download PDF" id="pdf-2503.02097" aria-labelledby="pdf-2503.02097">pdf</a>, <a href="https://arxiv.org/html/2503.02097v1" title="View HTML" id="html-2503.02097" aria-labelledby="html-2503.02097" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02097" title="Other formats" id="oth-2503.02097" aria-labelledby="oth-2503.02097">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Bomfather: An eBPF-based Kernel-level Monitoring Framework for Accurate Identification of Unknown, Unused, and Dynamically Loaded Dependencies in Modern Software Supply Chains </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Naveen">Naveen Srinivasan</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Naveen,+N">Nathan Naveen</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Naveen,+N">Neil Naveen</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Operating Systems (cs.OS); Software Engineering (cs.SE) </div> </div> </dd> <dt> <a name='item41'>[41]</a> <a href ="/abs/2503.02402" title="Abstract" id="2503.02402"> arXiv:2503.02402 </a> [<a href="/pdf/2503.02402" title="Download PDF" id="pdf-2503.02402" aria-labelledby="pdf-2503.02402">pdf</a>, <a href="https://arxiv.org/html/2503.02402v1" title="View HTML" id="html-2503.02402" aria-labelledby="html-2503.02402" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02402" title="Other formats" id="oth-2503.02402" aria-labelledby="oth-2503.02402">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Landauer,+M">Max Landauer</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Alton,+L">Leonhard Alton</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Lindorfer,+M">Martina Lindorfer</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Skopik,+F">Florian Skopik</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Wurzenberger,+M">Markus Wurzenberger</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Hotwagner,+W">Wolfgang Hotwagner</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item42'>[42]</a> <a href ="/abs/2503.02441" title="Abstract" id="2503.02441"> arXiv:2503.02441 </a> [<a href="/pdf/2503.02441" title="Download PDF" id="pdf-2503.02441" aria-labelledby="pdf-2503.02441">pdf</a>, <a href="https://arxiv.org/html/2503.02441v1" title="View HTML" id="html-2503.02441" aria-labelledby="html-2503.02441" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02441" title="Other formats" id="oth-2503.02441" aria-labelledby="oth-2503.02441">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Through the Static: Demystifying Malware Visualization via Explainability </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Brosolo,+M">Matteo Brosolo</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Puthuvath,+V">Vinod Puthuvath</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Conti,+M">Mauro Conti</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item43'>[43]</a> <a href ="/abs/2503.02455" title="Abstract" id="2503.02455"> arXiv:2503.02455 </a> [<a href="/pdf/2503.02455" title="Download PDF" id="pdf-2503.02455" aria-labelledby="pdf-2503.02455">pdf</a>, <a href="https://arxiv.org/html/2503.02455v1" title="View HTML" id="html-2503.02455" aria-labelledby="html-2503.02455" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02455" title="Other formats" id="oth-2503.02455" aria-labelledby="oth-2503.02455">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Privacy Preservation Techniques (PPTs) in IoT Systems: A Scoping Review and Future Directions </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Alalade,+E">Emmanuel Alalade</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Matrawy,+A">Ashraf Matrawy</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 21 pages, 10 figures, journal </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item44'>[44]</a> <a href ="/abs/2503.02499" title="Abstract" id="2503.02499"> arXiv:2503.02499 </a> [<a href="/pdf/2503.02499" title="Download PDF" id="pdf-2503.02499" aria-labelledby="pdf-2503.02499">pdf</a>, <a href="https://arxiv.org/html/2503.02499v1" title="View HTML" id="html-2503.02499" aria-labelledby="html-2503.02499" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02499" title="Other formats" id="oth-2503.02499" aria-labelledby="oth-2503.02499">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Attack Tree Distance: a practical examination of tree difference measurement within cyber security </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Schiele,+N+D">Nathan D. Schiele</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gadyatskaya,+O">Olga Gadyatskaya</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> This is an incomplete draft that was stolen and plagiarized. When a completed version is finished, it will be published as a version 2 here on arxiv </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item45'>[45]</a> <a href ="/abs/2503.02559" title="Abstract" id="2503.02559"> arXiv:2503.02559 </a> [<a href="/pdf/2503.02559" title="Download PDF" id="pdf-2503.02559" aria-labelledby="pdf-2503.02559">pdf</a>, <a href="https://arxiv.org/html/2503.02559v1" title="View HTML" id="html-2503.02559" aria-labelledby="html-2503.02559" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02559" title="Other formats" id="oth-2503.02559" aria-labelledby="oth-2503.02559">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> TFHE-SBC: Software Designs for Fully Homomorphic Encryption over the Torus on Single Board Computers </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Matsumoto,+M">Marin Matsumoto</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Nozaki,+A">Ai Nozaki</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Takase,+H">Hideki Takase</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Oguchi,+M">Masato Oguchi</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item46'>[46]</a> <a href ="/abs/2503.02574" title="Abstract" id="2503.02574"> arXiv:2503.02574 </a> [<a href="/pdf/2503.02574" title="Download PDF" id="pdf-2503.02574" aria-labelledby="pdf-2503.02574">pdf</a>, <a href="https://arxiv.org/html/2503.02574v1" title="View HTML" id="html-2503.02574" aria-labelledby="html-2503.02574" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02574" title="Other formats" id="oth-2503.02574" aria-labelledby="oth-2503.02574">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> LLM-Safety Evaluations Lack Robustness </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Beyer,+T">Tim Beyer</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Xhonneux,+S">Sophie Xhonneux</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Geisler,+S">Simon Geisler</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Gidel,+G">Gauthier Gidel</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Schwinn,+L">Leo Schwinn</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=G%C3%BCnnemann,+S">Stephan G眉nnemann</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Artificial Intelligence (cs.AI) </div> </div> </dd> <dt> <a name='item47'>[47]</a> <a href ="/abs/2503.02702" title="Abstract" id="2503.02702"> arXiv:2503.02702 </a> [<a href="/pdf/2503.02702" title="Download PDF" id="pdf-2503.02702" aria-labelledby="pdf-2503.02702">pdf</a>, <a href="https://arxiv.org/html/2503.02702v2" title="View HTML" id="html-2503.02702" aria-labelledby="html-2503.02702" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02702" title="Other formats" id="oth-2503.02702" aria-labelledby="oth-2503.02702">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> RedChronos: A Large Language Model-Based Log Analysis System for Insider Threat Detection in Enterprises </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Li,+C">Chenyu Li</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhu,+Z">Zhengjia Zhu</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=He,+J">Jiyan He</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Zhang,+X">Xiu Zhang</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Machine Learning (cs.LG) </div> </div> </dd> <dt> <a name='item48'>[48]</a> <a href ="/abs/2503.02706" title="Abstract" id="2503.02706"> arXiv:2503.02706 </a> [<a href="/pdf/2503.02706" title="Download PDF" id="pdf-2503.02706" aria-labelledby="pdf-2503.02706">pdf</a>, <a href="https://arxiv.org/html/2503.02706v1" title="View HTML" id="html-2503.02706" aria-labelledby="html-2503.02706" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02706" title="Other formats" id="oth-2503.02706" aria-labelledby="oth-2503.02706">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Optimisation of cyber insurance coverage with selection of cost effective security controls </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Uuganbayar,+G">Ganbayar Uuganbayar</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Yautsiukhin,+A">Artsiom Yautsiukhin</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Martinelli,+F">Fabio Martinelli</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Massacci,+F">Fabio Massacci</a></div> <div class='list-comments mathjax'><span class='descriptor'>Comments:</span> 38 pages, 7 tables, 6 figures, 10 algorithms </div> <div class='list-journal-ref'><span class='descriptor'>Journal-ref:</span> Computers &amp; Security Volume 101, February 2021 </div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span> </div> </div> </dd> <dt> <a name='item49'>[49]</a> <a href ="/abs/2503.02772" title="Abstract" id="2503.02772"> arXiv:2503.02772 </a> [<a href="/pdf/2503.02772" title="Download PDF" id="pdf-2503.02772" aria-labelledby="pdf-2503.02772">pdf</a>, <a href="https://arxiv.org/html/2503.02772v2" title="View HTML" id="html-2503.02772" aria-labelledby="html-2503.02772" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02772" title="Other formats" id="oth-2503.02772" aria-labelledby="oth-2503.02772">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> ESSPI: ECDSA/Schnorr Signed Program Input for BitVMX </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Lerner,+S+D">Sergio Demian Lerner</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Jonas,+M">Martin Jonas</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Futoransky,+A">Ariel Futoransky</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Distributed, Parallel, and Cluster Computing (cs.DC) </div> </div> </dd> <dt> <a name='item50'>[50]</a> <a href ="/abs/2503.02780" title="Abstract" id="2503.02780"> arXiv:2503.02780 </a> [<a href="/pdf/2503.02780" title="Download PDF" id="pdf-2503.02780" aria-labelledby="pdf-2503.02780">pdf</a>, <a href="https://arxiv.org/html/2503.02780v1" title="View HTML" id="html-2503.02780" aria-labelledby="html-2503.02780" rel="noopener noreferrer" target="_blank">html</a>, <a href="/format/2503.02780" title="Other formats" id="oth-2503.02780" aria-labelledby="oth-2503.02780">other</a>] </dt> <dd> <div class='meta'> <div class='list-title mathjax'><span class='descriptor'>Title:</span> Quantitative Resilience Modeling for Autonomous Cyber Defense </div> <div class='list-authors'><a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Cadet,+X">Xavier Cadet</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Boboila,+S">Simona Boboila</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Koh,+E">Edward Koh</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Chin,+P">Peter Chin</a>, <a href="https://arxiv.org/search/cs?searchtype=author&amp;query=Oprea,+A">Alina Oprea</a></div> <div class='list-subjects'><span class='descriptor'>Subjects:</span> <span class="primary-subject">Cryptography and Security (cs.CR)</span>; Machine Learning (cs.LG); Multiagent Systems (cs.MA) </div> </div> </dd> </dl> <div class='paging'>Total of 421 entries : <span>1-50</span> <a href=/list/cs.CR/current?skip=50&amp;show=50>51-100</a> <a href=/list/cs.CR/current?skip=100&amp;show=50>101-150</a> <a href=/list/cs.CR/current?skip=150&amp;show=50>151-200</a> <span>...</span> <a href=/list/cs.CR/current?skip=400&amp;show=50>401-421</a> </div> <div class='morefewer'>Showing up to 50 entries per page: <a href=/list/cs.CR/current?skip=0&amp;show=25 rel="nofollow"> fewer</a> | <a href=/list/cs.CR/current?skip=0&amp;show=100 rel="nofollow"> more</a> | <a href=/list/cs.CR/current?skip=0&amp;show=2000 rel="nofollow"> all</a> </div> </div> </div> </div> </main> <footer style="clear: both;"> <div class="columns is-desktop" role="navigation" aria-label="Secondary" style="margin: -0.75em -0.75em 0.75em -0.75em"> <!-- Macro-Column 1 --> <div class="column" style="padding: 0;"> <div class="columns"> <div class="column"> <ul style="list-style: none; line-height: 2;"> <li><a href="https://info.arxiv.org/about">About</a></li> <li><a href="https://info.arxiv.org/help">Help</a></li> </ul> </div> <div class="column"> <ul style="list-style: none; line-height: 2;"> <li> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-black" role="presentation"><title>contact arXiv</title><desc>Click here to contact arXiv</desc><path d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"/></svg> <a href="https://info.arxiv.org/help/contact.html"> Contact</a> </li> <li> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-black" role="presentation"><title>subscribe to arXiv mailings</title><desc>Click here to subscribe</desc><path d="M476 3.2L12.5 270.6c-18.1 10.4-15.8 35.6 2.2 43.2L121 358.4l287.3-253.2c5.5-4.9 13.3 2.6 8.6 8.3L176 407v80.5c0 23.6 28.5 32.9 42.5 15.8L282 426l124.6 52.2c14.2 6 30.4-2.9 33-18.2l72-432C515 7.8 493.3-6.8 476 3.2z"/></svg> <a href="https://info.arxiv.org/help/subscribe"> Subscribe</a> </li> </ul> </div> </div> </div> <!-- End Macro-Column 1 --> <!-- Macro-Column 2 --> <div class="column" style="padding: 0;"> <div class="columns"> <div class="column"> <ul style="list-style: none; line-height: 2;"> <li><a href="https://info.arxiv.org/help/license/index.html">Copyright</a></li> <li><a href="https://info.arxiv.org/help/policies/privacy_policy.html">Privacy Policy</a></li> </ul> </div> <div class="column sorry-app-links"> <ul style="list-style: none; line-height: 2;"> <li><a href="https://info.arxiv.org/help/web_accessibility.html">Web Accessibility Assistance</a></li> <li> <p class="help"> <a class="a11y-main-link" href="https://status.arxiv.org" target="_blank">arXiv Operational Status <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 256 512" class="icon filter-dark_grey" role="presentation"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"/></svg></a><br> Get status notifications via <a class="is-link" href="https://subscribe.sorryapp.com/24846f03/email/new" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" class="icon filter-black" role="presentation"><path d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"/></svg>email</a> or <a class="is-link" href="https://subscribe.sorryapp.com/24846f03/slack/new" target="_blank"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512" class="icon filter-black" role="presentation"><path d="M94.12 315.1c0 25.9-21.16 47.06-47.06 47.06S0 341 0 315.1c0-25.9 21.16-47.06 47.06-47.06h47.06v47.06zm23.72 0c0-25.9 21.16-47.06 47.06-47.06s47.06 21.16 47.06 47.06v117.84c0 25.9-21.16 47.06-47.06 47.06s-47.06-21.16-47.06-47.06V315.1zm47.06-188.98c-25.9 0-47.06-21.16-47.06-47.06S139 32 164.9 32s47.06 21.16 47.06 47.06v47.06H164.9zm0 23.72c25.9 0 47.06 21.16 47.06 47.06s-21.16 47.06-47.06 47.06H47.06C21.16 243.96 0 222.8 0 196.9s21.16-47.06 47.06-47.06H164.9zm188.98 47.06c0-25.9 21.16-47.06 47.06-47.06 25.9 0 47.06 21.16 47.06 47.06s-21.16 47.06-47.06 47.06h-47.06V196.9zm-23.72 0c0 25.9-21.16 47.06-47.06 47.06-25.9 0-47.06-21.16-47.06-47.06V79.06c0-25.9 21.16-47.06 47.06-47.06 25.9 0 47.06 21.16 47.06 47.06V196.9zM283.1 385.88c25.9 0 47.06 21.16 47.06 47.06 0 25.9-21.16 47.06-47.06 47.06-25.9 0-47.06-21.16-47.06-47.06v-47.06h47.06zm0-23.72c-25.9 0-47.06-21.16-47.06-47.06 0-25.9 21.16-47.06 47.06-47.06h117.84c25.9 0 47.06 21.16 47.06 47.06 0 25.9-21.16 47.06-47.06 47.06H283.1z"/></svg>slack</a> </p> </li> </ul> </div> </div> </div> <!-- end MetaColumn 2 --> <!-- End Macro-Column 2 --> </div> </footer> </div> <script src="/static/base/1.0.1/js/member_acknowledgement.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10