Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cryptography and Security

Watermarking Makes Language Models Radioactive
Avatar
teddy-furon
106 views
Enhancing Enterprise Network Security: Comparing Machine-Level and
  Process-Level Analysis for Dynamic Malware Detection
Avatar
Baskoro Adi Pratomo
88 views
Redactable and Sanitizable Signature Schemes: Applications and
  Limitations for use in Decentralized Digital Identity Systems
Avatar
Bryan Kumara
104 views
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly
  Multilingual Malware Detection
Avatar
Yifan Xia
115 views
Network Intrusion Detection with Edge-Directed Graph Multi-Head
  Attention Networks
Avatar
Jing Zhang
79 views
A near-autonomous and incremental intrusion detection system through
  active learning of known and unknown attacks
Avatar
Lynda Boukela
84 views
On the Proactive Generation of Unsafe Images From Text-To-Image Models
  Using Benign Prompts
Avatar
Yixin Wu
93 views
Challenges of Radio Frequency Fingerprinting: From Data Collection to
  Deployment
Avatar
Saeif Alhazbi
93 views
RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices
Avatar
Prakhar Sah
107 views
Toward Practical Privacy-Preserving Convolutional Neural Networks
  Exploiting Fully Homomorphic Encryption
Avatar
Jeff Smith
86 views
Joint secure communication and sensing in 6G networks
Avatar
Miroslav Mitev
79 views
B^2SFL: A Bi-level Blockchained Architecture for Secure Federated
  Learning-based Traffic Prediction
Avatar
Hao Guo
91 views
Location Estimation and Recovery using 5G Positioning: Thwarting GNSS
  Spoofing Attacks
Avatar
Aneet Kumar Dutta
97 views
On the Detection of Image-Scaling Attacks in Machine Learning
Avatar
Erwin Quiring
87 views
AutoDAN: Automatic and Interpretable Adversarial Attacks on Large
  Language Models
Avatar
Sicheng Zhu
122 views
On the Effect of Clock Frequency on Voltage and Electromagnetic Fault
  Injection
Avatar
Stefanos Koffas
97 views
Watch Nearby! Privacy Analysis of the People Nearby Service of Telegram
Avatar
Maurantonio Caprolu
103 views
Notes on Small Private Key Attacks on Common Prime RSA
Avatar
Mengce Zheng
91 views
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
Avatar
Boyang Zhang
93 views
knowCC: Knowledge, awareness of computer & cyber ethics between
  CS/non-CS university students
Avatar
Naresh Kshetri
90 views
RANDGENER: Distributed Randomness Beacon from Verifiable Delay Function
Avatar
Arup Mondal
81 views
Trenchcoat: Human-Computable Hashing Algorithms for Password Generation
Avatar
Ruthu Rooparaghunath
78 views
Tight Short-Lived Signatures

Tight Short-Lived Signatures

Cryptography and Security
Avatar
Arup Mondal
95 views
Prompt Injection Attacks and Defenses in LLM-Integrated Applications
Avatar
Yupei Liu
101 views
TwinPot: Digital Twin-assisted Honeypot for Cyber-Secure Smart Seaports
Avatar
Yagmur Yigit
87 views
Network-Aware AutoML Framework for Software-Defined Sensor Networks
Avatar
Emre Horsanali
87 views
PhishReplicant: A Language Model-based Approach to Detect Generated
  Squatting Domain Names
Avatar
Takashi Koide
98 views
On the Classification of Weierstrass Elliptic Curves over $\mathbb{Z}_n$
Avatar
Param Parekh
85 views
Revisiting Transferable Adversarial Image Examples: Attack
  Categorization, Evaluation Guidelines, and New Insights
Avatar
Zhengyu Zhao
92 views
Quantifying Privacy Risks of Prompts in Visual Prompt Learning
Avatar
Yixin Wu
87 views
Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey
  on PQ Standardization, Applications, Challenges and Opportunities
Avatar
Saleh Darzi
74 views
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy
  Defenses
Avatar
Caelin Kaplan
96 views