Iyiola E. Olatunji, Franziska Boenisch, Jing Xu, Adam Dziedzic
Adversarial Attacks and Defenses on Graph-aware Large Language Models (LLMs)
https://arxiv.org/abs/2508.04894
@arxiv-cs-cr.bsky.social
Computer Science -- Cryptography and Security (cs.CR) source: export.arxiv.org/rss/cs.CR maintainer: @tmaehara.bsky.social
Iyiola E. Olatunji, Franziska Boenisch, Jing Xu, Adam Dziedzic
Adversarial Attacks and Defenses on Graph-aware Large Language Models (LLMs)
https://arxiv.org/abs/2508.04894
Mohammad Ferry Husnil Arif, Muhammad Imran
On the Classical Hardness of the Semidirect Discrete Logarithm Problem in Finite Groups
https://arxiv.org/abs/2508.05048
Kim Hammar, Tansu Alpcan, Emil C. Lupu
Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination
https://arxiv.org/abs/2508.05188
Sharad Agarwal, Guillermo Suarez-Tangil, Marie Vasek
An Overview of 7726 User Reports: Uncovering SMS Scams and Scammer Strategies
https://arxiv.org/abs/2508.05276
Ahsan Farabi, Israt Khandaker, Nusrat Jahan, Ibrahim Khalil Shanto
ShikkhaChain: A Blockchain-Powered Academic Credential Verification System for Bangladesh
https://arxiv.org/abs/2508.05334
Xiaoli Zhuo, Xuehu Yan, Wei Yan
Grouped k-threshold random grid-based visual cryptography scheme
https://arxiv.org/abs/2508.05394
Weihong Sheng, Jiajun Chen, Bin Cai, Chunqiang Hu, Meng Han, Jiguo Yu
Local Distance Query with Differential Privacy
https://arxiv.org/abs/2508.05518
Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction
https://arxiv.org/abs/2508.05545
Xinqi Lyu, Yihao Liu, Yanjie Li, Bin Xiao
PLA: Prompt Learning Attack against Text-to-Image Generative Models
https://arxiv.org/abs/2508.03696
Arjun Juneja
RX-INT: A Kernel Engine for Real-Time Detection and Analysis of In-Memory Threats
https://arxiv.org/abs/2508.03879
Arturo S\'anchez-Matas, Pablo Escribano Ruiz, Daniel D\'iaz-L\'opez, Angel Luis Perales G\'omez, Pantaleone Nespoli, Gregorio Mart\'inez P\'erez
Simulating Cyberattacks through a Breach Attack Simulation (BAS) Platform empowered by Security Chaos Engineering (SCE)
https://arxiv.org/abs/2508.03882
Xiangzhe Xu, Guangyu Shen, Zian Su, Siyuan Cheng, Hanxi Guo, Lu Yan, Xuan Chen, Jiasheng Jiang, Xiaolong Jin, Chengpeng Wang, Zhuo Zhang, Xiangyu Zhang
ASTRA: Autonomous Spatial-Temporal Red-teaming for AI Software Assistants
https://arxiv.org/abs/2508.03936
Chengrui Sun, Hua Zhang, Haoran Gao, Zian Tian, Jianjin Zhao, qi Li, Hongliang Zhu, Zongliang Shen, Shang Wang, Anmin Fu
Isolate Trigger: Detecting and Eradicating Evade-Adaptive Backdoors
https://arxiv.org/abs/2508.04094
Borui Li, Li Yan, Junhao Han, Jianmin Liu, Lei Yu
SenseCrypt: Sensitivity-guided Selective Homomorphic Encryption for Joint Federated Learning in Cross-Device Scenarios
https://arxiv.org/abs/2508.04100
Jiajun Gu, Yuhang Yao, Shuaiqi Wang, Carlee Joe-Wong
Evaluating Selective Encryption Against Gradient Inversion Attacks
https://arxiv.org/abs/2508.04155
Md Sajidul Islam Sajid, Shihab Ahmed, Ryan Sosnoski
Secure Development of a Hooking-Based Deception Framework Against Keylogging Techniques
https://arxiv.org/abs/2508.04178
Kunlan Xiang, Haomiao Yang, Meng Hao, Haoxin Wang, Shaofeng Li, Wenbo Jiang
BadTime: An Effective Backdoor Attack on Multivariate Long-Term Time Series Forecasting
https://arxiv.org/abs/2508.04189
Saifullah Saifullah, Stefan Agne, Andreas Dengel, Sheraz Ahmed
DP-DocLDM: Differentially Private Document Image Generation using Latent Diffusion Models
https://arxiv.org/abs/2508.04208
Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa
Per-element Secure Aggregation against Data Reconstruction Attacks in Federated Learning
https://arxiv.org/abs/2508.04285
Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Aditya Mathur, Muhammad Taha Jilani
Attack Pattern Mining to Discover Hidden Threats to Industrial Control Systems
https://arxiv.org/abs/2508.04561
Marc Damie, Mihai Pop, Merijn Posthuma
Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing Technologies
https://arxiv.org/abs/2508.04583
Kirti Singh (Indian Institute of Technology Bombay, India, Institute for Development and Research in Banking Technology, Hyderabad, India), ...
4-Swap: Achieving Grief-Free and Bribery-Safe Atomic Swaps Using Four Transactions
https://arxiv.org/abs/2508.04641
Jean Michel Tine, Mohammed Aldeen, Abyad Enan, M Sabbir Salek, Long Cheng, Mashrur Chowdhury
Real-World Evaluation of Protocol-Compliant Denial-of-Service Attacks on C-V2X-based Forward Collision Warning Systems
https://arxiv.org/abs/2508.02805
Dylan Stow, Russell Barnes, Eren Kurshan, Yuan Xie
Thermal-Aware 3D Design for Side-Channel Information Leakage
https://arxiv.org/abs/2508.02816
Mengyu Zhang, Zhuotao Liu, Jingwen Huang, Xuanqi Liu
Agentic Privacy-Preserving Machine Learning
https://arxiv.org/abs/2508.02836
Anas Mabrouk, Mohamed Hatem, Mohammad Mamun, Sherif Saad
LMDG: Advancing Lateral Movement Detection Through High-Fidelity Dataset Generation
https://arxiv.org/abs/2508.02942
Baigang Chen, Dongfang Zhao
A Non-leveled and Reliable Approximate FHE Framework through Binarized Polynomial Rings
https://arxiv.org/abs/2508.02943
Rourab Paul, Paresh Baidya, Krishnendu Guha
Lightweight Fault Detection Architecture for NTT on FPGA
https://arxiv.org/abs/2508.03062
Jiewei Lai, Lan Zhang, Chen Tang, Pengcheng Sun, Xinming Wang, Yunhao Wang
Untraceable DeepFakes via Traceable Fingerprint Elimination
https://arxiv.org/abs/2508.03067
Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye
VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs
https://arxiv.org/abs/2508.03097