Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles about
Cryptography and Security
Leaky Thoughts: Large Reasoning Models Are Not Private Thinkers
5 days ago by
Tommaso Green
and
others
Computation and Language
,
Artificial Intelligence
PhishDebate: An LLM-Based Multi-Agent Framework for Phishing Website Detection
5 days ago by
Wenhao Li
and
others
Cryptography and Security
Linearly Homomorphic Signature with Tight Security on Lattice
5 days ago by
Heng Guo
and
others
Cryptography and Security
,
Information Theory
Version-level Third-Party Library Detection in Android Applications via Class Structural Similarity
5 days ago by
Bolin Zhou
and
others
Cryptography and Security
,
Software Engineering
deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses
5 days ago by
Georgios Androutsopoulos
and
Antonio Bianchi
at
Purdue University
Cryptography and Security
,
Machine Learning
A Novel Perturb-ability Score to Mitigate Evasion Adversarial Attacks on Flow-Based ML-NIDS
6 days ago by
Mohamed Elshehaby
and
Ashraf Matrawy
at
Carleton University
Cryptography and Security
,
Artificial Intelligence
An efficient construction of Raz's two-source randomness extractor with improved parameters
6 days ago by
Cameron Foreman
and
others
Cryptography and Security
,
Computational Complexity
On the Equivalence between Classical Position Verification and Certified Randomness
6 days ago by
Fatih Kaleoglu
and
others
Quantum Physics
,
Cryptography and Security
Cross-Chain Arbitrage: The Next Frontier of MEV in Decentralized Finance
6 days ago by
Burak Öz
and
others
Cryptography and Security
,
Computational Engineering, Finance, and Science
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework
6 days ago by
Xia Du
and
others
Computer Vision and Pattern Recognition
,
Cryptography and Security
Adversarially Robust Bloom Filters: Privacy, Reductions, and Open Problems
6 days ago by
Hayder Tirmazi
Cryptography and Security
,
Machine Learning
Side-Channel Extraction of Dataflow AI Accelerator Hardware Parameters
6 days ago by
Guillaume Lomet
and
others
Cryptography and Security
Tech-ASan: Two-stage check for Address Sanitizer
6 days ago by
Yixuan Cao
and
others
Software Engineering
,
Cryptography and Security
Blockchain-Enabled Variational Information Bottleneck for Data Extraction Based on Mutual Information in Internet of Vehicles
6 days ago by
Cui Zhang
and
others
Cryptography and Security
,
Machine Learning
Detecting Hardware Trojans in Microprocessors via Hardware Error Correction Code-based Modules
6 days ago by
Alessandro Palumbo
and
Ruben Salvador
Cryptography and Security
Evaluation Pipeline for systematically searching for Anomaly Detection Systems
6 days ago by
Florian Rokohl
and
others
Cryptography and Security
,
Artificial Intelligence
Graph Neural Networks for Jamming Source Localization
6 days ago by
Dania Herzalla
and
others
Networking and Internet Architecture
,
Cryptography and Security
Enhancing One-run Privacy Auditing with Quantile Regression-Based Membership Inference
6 days ago by
Terrance Liu
and
others
Machine Learning
,
Cryptography and Security
Offensive Robot Cybersecurity
6 days ago by
Víctor Mayoral-Vilches
Robotics
,
Cryptography and Security
Assessing Privacy Compliance of Android Third-Party SDKs
6 days ago by
Mark Huasong Meng
and
others
Cryptography and Security
,
Software Engineering
Supervised Robustness-preserving Data-free Neural Network Pruning
6 days ago by
Mark Huasong Meng
and
others
Machine Learning
,
Cryptography and Security
One-shot Face Sketch Synthesis in the Wild via Generative Diffusion Prior and Instruction Tuning
6 days ago by
Han Wu
and
others
Graphics
,
Cryptography and Security
A theory of Lending Protocols in DeFi
6 days ago by
Massimo Bartoletti
and
Enrico Lipparini
Computer Science and Game Theory
,
Cryptography and Security
FLARE: Towards Universal Dataset Purification against Backdoor Attacks
6 days ago by
Linshan Hou
and
others
Cryptography and Security
,
Artificial Intelligence
RAS-Eval: A Comprehensive Benchmark for Security Evaluation of LLM Agents in Real-World Environments
6 days ago by
Yuchuan Fu
and
others
Cryptography and Security
,
Artificial Intelligence
Facility Location Problem under Local Differential Privacy without Super-set Assumption
6 days ago by
Kevin Pfisterer
and
others
Cryptography and Security
LLM vs. SAST: A Technical Analysis on Detecting Coding Bugs of GPT4-Advanced Data Analysis
6 days ago by
Madjid Tehrani
and
others
Cryptography and Security
Wolfpack Adversarial Attack for Robust Multi-Agent Reinforcement Learning
6 days ago by
Sunwoo Lee
and
others
Machine Learning
,
Artificial Intelligence
From LLMs to MLLMs to Agents: A Survey of Emerging Paradigms in Jailbreak Attacks and Defenses within LLM Ecosystem
6 days ago by
Yanxu Mao
and
others
Cryptography and Security
Rubber Mallet: A Study of High Frequency Localized Bit Flips and Their Impact on Security
6 days ago by
Andrew Adiletta
and
others
Cryptography and Security
Load more