Search

Your search keyword '"Computer Science - Cryptography and Security"' showing total 95,019 results

Search Constraints

Start Over You searched for: Descriptor "Computer Science - Cryptography and Security" Remove constraint Descriptor: "Computer Science - Cryptography and Security"
95,019 results on '"Computer Science - Cryptography and Security"'

Search Results

1. Private Counterfactual Retrieval With Immutable Features

2. Game Theoretic Liquidity Provisioning in Concentrated Liquidity Market Makers

3. Safe Text-to-Image Generation: Simply Sanitize the Prompt Embedding

4. Transformers -- Messages in Disguise

5. Lateral Movement Detection via Time-aware Subgraph Classification on Authentication Logs

6. MDHP-Net: Detecting Injection Attacks on In-vehicle Network using Multi-Dimensional Hawkes Process and Temporal Model

7. Reachability Analysis of the Domain Name System

8. A Hard-Label Cryptanalytic Extraction of Non-Fully Connected Deep Neural Networks using Side-Channel Attacks

9. Omnichain Web: The Universal Framework for Streamlined Chain Abstraction and Cross-Layer Interaction

10. Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting

11. EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations

12. Strategic Roadmap for Quantum- Resistant Security: A Framework for Preparing Industries for the Quantum Threat

13. Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI

14. Combining Machine Learning Defenses without Conflicts

15. Beyond Static Tools: Evaluating Large Language Models for Cryptographic Misuse Detection

16. Misbinding Raw Public Keys to Identities in TLS

17. Adversarial Attacks Using Differentiable Rendering: A Survey

18. Backdoor Mitigation by Distance-Driven Detoxification

19. Faster Differentially Private Top-$k$ Selection: A Joint Exponential Mechanism with Pruning

20. Your Fixed Watermark is Fragile: Towards Semantic-Aware Watermark for EaaS Copyright Protection

21. TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models

22. mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual Reality

23. A Survey of Machine Learning-based Physical-Layer Authentication in Wireless Communications

24. The Communication-Friendly Privacy-Preserving Machine Learning against Malicious Adversaries

25. Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite

26. Face De-identification: State-of-the-art Methods and Comparative Studies

27. Implementing an Optimized and Secured Multimedia Streaming Protocol in a Participatory Sensing Scenario

28. Cybersecurity Study Programs: What's in a Name?

29. AEAKA: An Adaptive and Efficient Authentication and Key Agreement Scheme for IoT in Cloud-Edge-Device Collaborative Environments

30. Efficient and Secure Cross-Domain Data-Sharing for Resource-Constrained Internet of Things

31. Injection Attacks Against End-to-End Encrypted Applications

32. SmartInv: Multimodal Learning for Smart Contract Invariant Inference

33. SoK: Towards a Common Understanding of Cryptographic Agility

34. Towards Secure Intelligent O-RAN Architecture: Vulnerabilities, Threats and Promising Technical Solutions using LLMs

35. Trap-MID: Trapdoor-based Defense against Model Inversion Attacks

36. A Fully Local Last-Generated Rule in a Blockchain

37. The VLLM Safety Paradox: Dual Ease in Jailbreak Attack and Defense

38. MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques

39. SAFES: Sequential Privacy and Fairness Enhancing Data Synthesis for Responsible AI

40. Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation

41. Laplace Transform Interpretation of Differential Privacy

42. Minimax Optimal Two-Sample Testing under Local Differential Privacy

43. SAFELOC: Overcoming Data Poisoning Attacks in Heterogeneous Federated Machine Learning for Indoor Localization

44. Confidence-aware Denoised Fine-tuning of Off-the-shelf Models for Certified Robustness

45. LLMStinger: Jailbreaking LLMs using RL fine-tuned LLMs

46. Federated Low-Rank Adaptation with Differential Privacy over Wireless Networks

47. A Call to Reconsider Certification Authority Authorization (CAA)

48. A Survey on Adversarial Machine Learning for Code Data: Realistic Threats, Countermeasures, and Interpretations

49. Evaluating Synthetic Command Attacks on Smart Voice Assistants

50. SCORE: Syntactic Code Representations for Static Script Malware Detection

Catalog

Books, media, physical & digital resources