Skip to main content
CenXiv.org
This website is in trial operation, support us!
We gratefully acknowledge support from all contributors.
Contribute
Donate
cenxiv logo > cs.CR

Help | Advanced Search

Cryptography and Security

Authors and titles for April 2024

Total of 556 entries : 1-50 51-100 101-150 151-200 ... 551-556
Showing up to 50 entries per page: fewer | more | all
[1] arXiv:2404.00056 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Fingerprinting web servers through Transformer-encoded HTTP response headers
Title: 通过Transformer编码的HTTP响应头指纹识别网络服务器
Patrick Darwinkel
Comments: Based on a bachelor's thesis. Submission to arXiv approved by supervisor
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG) ; Networking and Internet Architecture (cs.NI)
[2] arXiv:2404.00062 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Modelling the Impact of Quantum Circuit Imperfections on Networks and Computer Applications
Title: 建模量子电路不完善对网络和计算机应用的影响
Savo Glisic
Subjects: Cryptography and Security (cs.CR) ; Quantum Physics (quant-ph)
[3] arXiv:2404.00068 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors
Title: 基于关键风险因素的网络安全威胁数据驱动预测分析
Fatama Tuz Johora (1), Md Shahedul Islam Khan (2), Esrath Kanon (1), Mohammad Abu Tareq Rony (3), Md Zubair (4), (5)Iqbal H. Sarker ((1) Department of Computer Science and Engineering, University of Chittagong, Chattogram, Bangladesh, (2) Department of School of Electronics and Information, Northwestern Polytechnical University, Xi'an, Shaanxi, China (3) Department of Statistics, Noakhali Science and Technology University, Noakhali, Bangladesh (4) Department of Computer Science and Engineering, Chittagong University of Engineering & Technology, Chattogram, Bangladesh (5) Centre for Securing Digital Futures, Edith Cowan University, Perth, WA, Australia)
Comments: The paper contains 15 pages, 7 tables and 6 figures
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG)
[4] arXiv:2404.00076 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks
Title: 一种使用脏标签翻转攻击的反向标签后门方法
Orson Mengara
Comments: Accept by "IEEE Access" let's take a look at our global approach to the DNN(s) model(s) deployment chain in production: Danger NLP-Speech (Trigger universal approach)
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Computation and Language (cs.CL) ; Machine Learning (cs.LG) ; Signal Processing (eess.SP)
[5] arXiv:2404.00108 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Efficient Data-Free Model Stealing with Label Diversity
Title: 基于标签多样性的高效无数据模型窃取
Yiyong Liu, Rui Wen, Michael Backes, Yang Zhang
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:2404.00125 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Memristor-Based Lightweight Encryption
Title: 基于忆阻器的轻量级加密
Muhammad Ali Siddiqi, Jan Andrés Galvan Hernández, Anteneh Gebregiorgis, Rajendra Bishnoi, Christos Strydis, Said Hamdioui, Mottaqiallah Taouil
Journal-ref: Proceedings of the 2023 26th Euromicro Conference on Digital System Design (DSD)
Subjects: Cryptography and Security (cs.CR) ; Hardware Architecture (cs.AR) ; Emerging Technologies (cs.ET)
[7] arXiv:2404.00139 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Security Risks Concerns of Generative AI in the IoT
Title: 生成式AI在物联网中的安全风险问题
Honghui Xu, Yingshu Li, Olusesi Balogun, Shaoen Wu, Yue Wang, Zhipeng Cai
Comments: 6 pages, 2 figures
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[8] arXiv:2404.00190 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: GuaranTEE: Towards Attestable and Private ML with CCA
Title: GuaranTEE:面向CCA的可认证和私有机器学习
Sandra Siby, Sina Abdollahi, Mohammad Maheri, Marios Kogias, Hamed Haddadi
Comments: Accepted at the 4th Workshop on Machine Learning and Systems (EuroMLSys '24)
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:2404.00196 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Combined Static Analysis and Machine Learning Prediction for Application Debloating
Title: 结合静态分析和机器学习预测的应用程序去膨胀
Chris Porter, Sharjeel Khan, Kangqi Ni, Santosh Pande
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:2404.00235 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Information Security and Privacy in the Digital World: Some Selected Topics
Title: 数字世界中的信息安全与隐私:一些选定的主题
Jaydip Sen, Joceli Mayer, Subhasis Dasgupta, Subrata Nandi, Srinivasan Krishnaswamy, Pinaki Mitra, Mahendra Pratap Singh, Naga Prasanthi Kundeti, Chandra Sekhara Rao MVP, Sudha Sree Chekuri, Seshu Babu Pallapothu, Preethi Nanjundan, Jossy P. George, Abdelhadi El Allahi, Ilham Morino, Salma AIT Oussous, Siham Beloualid, Ahmed Tamtaoui, Abderrahim Bajit
Comments: Published by IntechOpen, London Uk in Nov 2023, the book contains 8 chapters spanning over 131 pages. arXiv admin note: text overlap with arXiv:2307.02055, arXiv:2304.00258
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG)
[11] arXiv:2404.00423 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Keep your memory dump shut: Unveiling data leaks in password managers
Title: 保持你的内存转储关闭:揭示密码管理器中的数据泄露
Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:2404.00473 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Privacy Backdoors: Stealing Data with Corrupted Pretrained Models
Title: 隐私后门:通过损坏的预训练模型窃取数据
Shanglun Feng, Florian Tramèr
Comments: Code at https://github.com/ShanglunFengatETHZ/PrivacyBackdoor
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG)
[13] arXiv:2404.00538 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Eclipse Attack Detection on a Blockchain Network as a Non-Parametric Change Detection Problem
Title: 区块链网络上的日食攻击检测作为非参数变化检测问题
Anurag Gupta, Vikram Krishnamurthy, Brian M. Sadler
Subjects: Cryptography and Security (cs.CR) ; Applications (stat.AP)
[14] arXiv:2404.00602 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: 1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost
Title: 1对n无意识签名:安全性的重新审视与一种高效通信成本的通用构造
Masayuki Tezuka, Keisuke Tanaka
Journal-ref: ICISC 2023
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:2404.00644 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: SoK: Liquid Staking Tokens (LSTs) and Emerging Trends in Restaking
Title: SoK:流动质押代币(LSTs)及再质押中的新兴趋势
Krzysztof Gogol, Yaron Velner, Benjamin Kraner, Claudio Tessone
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:2404.00673 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures
Title: 隐私保护模型解释的综述:隐私风险、攻击和对策
Thanh Tam Nguyen, Thanh Trung Huynh, Zhao Ren, Thanh Toan Nguyen, Phi Le Nguyen, Hongzhi Yin, Quoc Viet Hung Nguyen
Comments: Revision
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Computers and Society (cs.CY) ; Machine Learning (cs.LG)
[17] arXiv:2404.00696 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Privacy Re-identification Attacks on Tabular GANs
Title: 基于表格GAN的隐私重新识别攻击
Abdallah Alshantti, Adil Rasheed, Frank Westad
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG)
[18] arXiv:2404.00869 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training
Title: 面向自动化生成智能电网网络空间安全实验和培训的网络空间靶场
Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalbarczyk, S.M. Suhail Hussain, Ee-chien Chang
Comments: Published at DSN 2023 Industry Track
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2404.01101 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: UFID: A Unified Framework for Input-level Backdoor Detection on Diffusion Models
Title: UFID:一种用于扩散模型输入级后门检测的统一框架
Zihan Guan, Mengxuan Hu, Sheng Li, Anil Vullikanti
Comments: 18 pages,24 figures
Subjects: Cryptography and Security (cs.CR) ; Computer Vision and Pattern Recognition (cs.CV) ; Machine Learning (cs.LG)
[20] arXiv:2404.01106 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
Title: MagLive:使用磁性模式变化在智能手机上进行鲁棒的语音活体检测
Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, Xianhao Chen
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2404.01109 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks
Title: 一种增量混合自适应网络基础的入侵检测系统在软件定义网络中用于检测隐蔽攻击
Abdullah H Alqahtani
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[22] arXiv:2404.01135 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Enhancing Reasoning Capacity of SLM using Cognitive Enhancement
Title: 使用认知增强方法提升SLM的推理能力
Jonathan Pan, Swee Liang Wong, Xin Wei Chia, Yidi Yuan
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[23] arXiv:2404.01177 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Poisoning Decentralized Collaborative Recommender System and Its Countermeasures
Title: 中毒去中心化协作推荐系统及其对策
Ruiqi Zheng, Liang Qu, Tong Chen, Kai Zheng, Yuhui Shi, Hongzhi Yin
Subjects: Cryptography and Security (cs.CR) ; Information Retrieval (cs.IR)
[24] arXiv:2404.01231 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models
Title: 隐私后门:通过污染预训练模型增强成员推理
Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG)
[25] arXiv:2404.01318 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: JailbreakBench: An Open Robustness Benchmark for Jailbreaking Large Language Models
Title: JailbreakBench:针对破解大型语言模型的开放鲁棒性基准
Patrick Chao, Edoardo Debenedetti, Alexander Robey, Maksym Andriushchenko, Francesco Croce, Vikash Sehwag, Edgar Dobriban, Nicolas Flammarion, George J. Pappas, Florian Tramer, Hamed Hassani, Eric Wong
Comments: The camera-ready version of JailbreakBench v1.0 (accepted at NeurIPS 2024 Datasets and Benchmarks Track): more attack artifacts, more test-time defenses, a more accurate jailbreak judge (Llama-3-70B with a custom prompt), a larger dataset of human preferences for selecting a jailbreak judge (300 examples), an over-refusal evaluation dataset, a semantic refusal judge based on Llama-3-8B
Subjects: Cryptography and Security (cs.CR) ; Machine Learning (cs.LG)
[26] arXiv:2404.01606 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Haina Storage: A Decentralized Secure Storage Framework Based on Improved Blockchain Structure
Title: 海娜存储:一种基于改进区块链结构的去中心化安全存储框架
Zijian Zhou, Caimei Wang, Xiaoheng Deng, Jianhao Lu, Qilue Wen, Chen Zhang, Hong Li
Comments: 24 pages, 21 figures
Subjects: Cryptography and Security (cs.CR) ; Distributed, Parallel, and Cluster Computing (cs.DC)
[27] arXiv:2404.01619 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Making Privacy-preserving Federated Graph Analytics with Strong Guarantees Practical (for Certain Queries)
Title: 具有强保证的隐私保护联邦图分析的实用化(针对某些查询)
Kunlong Liu, Trinabh Gupta
Comments: to be published in SACMAT 2024
Subjects: Cryptography and Security (cs.CR) ; Social and Information Networks (cs.SI)
[28] arXiv:2404.01625 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: AAA: an Adaptive Mechanism for Locally Differential Private Mean Estimation
Title: AAA:一种用于局部差分隐私均值估计的自适应机制
Fei Wei, Ergute Bao, Xiaokui Xiao, Yin Yang, Bolin Ding
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:2404.01689 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: A Lightweight Security Solution for Mitigation of Hatchetman Attack in RPL-based 6LoWPAN
Title: 基于RPL的6LoWPAN中Hatchetman攻击的轻量级安全解决方案
Girish Sharma, Jyoti Grover, Abhishek Verma
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2404.01760 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Security for adversarial wiretap channels
Title: 对抗性窃听信道的安全性
Esther Hänggi, Iyán Méndez Veiga, Ligong Wang
Comments: 25 pages
Subjects: Cryptography and Security (cs.CR) ; Information Theory (cs.IT)
[31] arXiv:2404.01803 (cross-list from cs.CR) [cn-pdf, pdf, other]
Title: Systematic Solutions to Login and Authentication Security Problems: A Dual-Password Login-Authentication Mechanism
Title: 登录和认证安全问题的系统解决方案:一种双密码登录认证机制
Suyun Borjigin
Comments: 11 pages, 3 figures, 28 conferences
Subjects: Cryptography and Security (cs.CR) ; Emerging Technologies (cs.ET) ; Systems and Control (eess.SY)
[32] arXiv:2404.01808 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Software-Defined Cryptography: A Design Feature of Cryptographic Agility
Title: 软件定义密码学:密码灵活性的设计特性
Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:2404.01833 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack
Title: 好的,现在写一篇关于该内容的文章:高潮多轮LLM越狱攻击
Mark Russinovich, Ahmed Salem, Ronen Eldan
Comments: Accepted at USENIX Security 2025
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI)
[34] arXiv:2404.01910 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Multicore DRAM Bank-& Row-Conflict Bomb for Timing Attacks in Mixed-Criticality Systems
Title: 多核 DRAM 存储体和行冲突炸弹用于混合关键性系统的定时攻击
Antonio Savino, Gautam Gala, Marcello Cinque, Gerhard Fohler
Comments: To appear in the proceedings of the 27th IEEE international Symposium on Real-time Distributed Computing (ISORC)
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:2404.02062 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Digital Forgetting in Large Language Models: A Survey of Unlearning Methods
Title: 大型语言模型中的数字遗忘:遗忘方法的综述
Alberto Blanco-Justicia, Najeeb Jebreel, Benet Manzanares, David Sánchez, Josep Domingo-Ferrer, Guillem Collell, Kuan Eeik Tan
Comments: 70 pages
Journal-ref: Artificial Intelligence Review, vol. 58, art. no. 90, 2025
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Machine Learning (cs.LG)
[36] arXiv:2404.02138 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Topic-Based Watermarks for Large Language Models
Title: 基于主题的水印用于大型语言模型
Alexander Nemecek, Yuzhou Jiang, Erman Ayday
Comments: Algorithms and new evaluations, 8 pages
Subjects: Cryptography and Security (cs.CR) ; Computation and Language (cs.CL) ; Machine Learning (cs.LG)
[37] arXiv:2404.02150 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: From Seaweed to Security: The Emergence of Alginate in Compromising IoT Fingerprint Sensors
Title: 从海藻到安全:海藻酸盐在破坏物联网指纹传感器中的出现
Pouria Rad, Gokila Dorai, Mohsen Jozani
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:2404.02151 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks
Title: 通过简单的自适应攻击破解对齐安全的大型语言模型
Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion
Comments: Accepted at ICLR 2025. Updates in the v3: GPT-4o and Claude 3.5 Sonnet results, improved writing. Updates in the v2: more models (Llama3, Phi-3, Nemotron-4-340B), jailbreak artifacts for all attacks are available, evaluation with different judges (Llama-3-70B and Llama Guard 2), more experiments (convergence plots, ablation on the suffix length for random search), examples of jailbroken generation
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Machine Learning (cs.LG) ; Machine Learning (stat.ML)
[39] arXiv:2404.02291 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Towards a New Configurable and Practical Remote Automotive Security Testing Platform
Title: 迈向新的可配置且实用的远程汽车安全测试平台
Sekar Kulandaivel, Wenjuan Lu, Brandon Barry, Jorge Guajardo
Comments: 7 pages, 2 figures
Subjects: Cryptography and Security (cs.CR) ; Systems and Control (eess.SY)
[40] arXiv:2404.02344 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Generative AI-Based Effective Malware Detection for Embedded Computing Systems
Title: 基于生成式人工智能的有效恶意软件检测方法用于嵌入式计算系统
Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao
Subjects: Cryptography and Security (cs.CR) ; Computer Vision and Pattern Recognition (cs.CV)
[41] arXiv:2404.02372 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis
Title: 模糊恶意软件检测:通过内存分析研究现实场景
S M Rakib Hasan, Aakar Dhakal
Comments: Accepted and Presented at IEEE-ICTP2023, Dhaka, Bangladesh
Subjects: Cryptography and Security (cs.CR) ; Computation and Language (cs.CL) ; Machine Learning (cs.LG)
[42] arXiv:2404.02406 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Exploring Backdoor Vulnerabilities of Chat Models
Title: 探索聊天模型的后门漏洞
Yunzhuo Hao, Wenkai Yang, Yankai Lin
Comments: Code and data are available at https://github.com/hychaochao/Chat-Models-Backdoor-Attacking
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Computation and Language (cs.CL)
[43] arXiv:2404.02425 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Novel_Authentication_Protocols_Tailored_for_Ambient_IoT_Devices_in_3GPP_5G_Networks
Title: 针对3GPP 5G网络中环境物联网设备的新型认证协议
Xiongpeng Ren, Jin Cao, Hui Li, Yinghui Zhang
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:2404.02440 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks
Title: 设计一种具有抵御机器学习攻击能力的光子物理不可克隆函数
Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR) ; Optics (physics.optics)
[45] arXiv:2404.02519 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Differentially Private Verification of Survey-Weighted Estimates
Title: 差分隐私的调查加权估计验证
Tong Lin, Jerome P. Reiter
Comments: 21 pages including references, 5 figures
Subjects: Cryptography and Security (cs.CR) ; Methodology (stat.ME)
[46] arXiv:2404.02608 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation
Title: LightFAt:通过轻量级PMU基于的控制流验证缓解控制流爆炸
Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel
Comments: This official version of this paper will appear in the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:2404.02637 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Vocabulary Attack to Hijack Large Language Model Applications
Title: 词汇攻击以劫持大型语言模型应用
Patrick Levi, Christoph P. Neumann
Journal-ref: Proc of the 15th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2024), Venice, Italy, April 2024, pp. 19-24, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Distributed, Parallel, and Cluster Computing (cs.DC)
[48] arXiv:2404.02832 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: "Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages
Title: “对抗性钓鱼网页在现实中是一种威胁吗?” 理解用户对对抗性网页的感知
Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:2404.02889 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: Steganographic Passport: An Owner and User Verifiable Credential for Deep Model IP Protection Without Retraining
Title: 隐写护照:一种无需重新训练的深度模型知识产权保护的所有者和用户可验证凭证
Qi Cui, Ruohan Meng, Chaohui Xu, Chip-Hong Chang
Subjects: Cryptography and Security (cs.CR) ; Computer Vision and Pattern Recognition (cs.CV)
[50] arXiv:2404.02923 (cross-list from cs.CR) [cn-pdf, pdf, html, other]
Title: An Unsupervised Adversarial Autoencoder for Cyber Attack Detection in Power Distribution Grids
Title: 一种用于配电电网网络攻击检测的无监督对抗自编码器
Mehdi Jabbari Zideh, Mohammad Reza Khalghani, Sarika Khushalani Solanki
Subjects: Cryptography and Security (cs.CR) ; Artificial Intelligence (cs.AI) ; Machine Learning (cs.LG) ; Systems and Control (eess.SY)
Total of 556 entries : 1-50 51-100 101-150 151-200 ... 551-556
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack

京ICP备2025123034号