PrivInfer: Privacy-Preserving Inference for Black-box Large Language
  Model
Avatar
Kejiang Chen
66 views
Charge Manipulation Attacks Against Smart Electric Vehicle Charging
  Stations and Deep Learning-based Detection Mechanisms
Avatar
Hamidreza Jahangir
33 views
Towards Understanding and Characterizing the Arbitrage Bot Scam In the
  Wild
Avatar
Kai Li
40 views
REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative
  Large Language Models
Avatar
Ruisi Zhang
36 views
Privacy-Preserving Hierarchical Anonymization Framework over Encrypted
  Data
Avatar
Jing Jia
34 views
Toward Unbiased Multiple-Target Fuzzing with Path Diversity
Avatar
Huanyao Rong
62 views
Large-Plaintext Functional Bootstrapping in FHE with Small Bootstrapping
  Keys
Avatar
Dengfa Liu
35 views
Bridging BRC-20 to Ethereum

Bridging BRC-20 to Ethereum

Cryptography and Security
Avatar
Guangsheng Yu
43 views
Empowering SMPC: Bridging the Gap Between Scalability, Memory Efficiency
  and Privacy in Neural Network Inference
Avatar
Ramya Burra
36 views
Fast Summary-based Whole-program Analysis to Identify Unsafe Memory
  Accesses in Rust
Avatar
Jie Zhou
42 views
A Multilayered Security Infrastructure for Connected Vehicles -- First
  Lessons from the Field
Avatar
Timo Ha¨ckel
39 views
How to Rationally Select Your Delegatee in PoS
Avatar
Yuzhe Zhang
33 views
Injective Rank Metric Trapdoor Functions with Homogeneous Errors
Avatar
Etienne Burle
39 views
Privacy-Preserving Encrypted Low-Dose CT Denoising
Avatar
Ziyuan Yang
41 views
DocCert: Nostrification, Document Verification and Authenticity
  Blockchain Solution
Avatar
Monther Aldwairi
30 views
Tikuna: An Ethereum Blockchain Network Security Monitoring System
Avatar
Andres Gomez Ramirez
47 views
User Inference Attacks on Large Language Models
Avatar
Nikhil Kandpal
43 views
A Systematic Evaluation of Automated Tools for Side-Channel
  Vulnerabilities Detection in Cryptographic Libraries
Avatar
Antoine Geimer
34 views
Combining Decentralized IDentifiers with Proof of Membership to Enable
  Trust in IoT Networks
Avatar
Alessandro Pino
41 views
Invisible Threats: Backdoor Attack in OCR Systems
Avatar
Mauro Conti
42 views
Harnessing the Power of LLM to Support Binary Taint Analysis
Avatar
Puzhuo Liu
58 views
2SFGL: A Simple And Robust Protocol For Graph-Based Fraud Detection
Avatar
Zhirui Pan
40 views
Code Polymorphism Meets Code Encryption: Confidentiality and
  Side-Channel Protection of Software Components
Avatar
Lionel Morel
34 views
Cybersecurity as a Crosscutting Concept Across an Undergrad Computer
  Science Curriculum: An Experience Report
Avatar
Azqa Nadeem
32 views
Prompt Backdoors in Visual Prompt Learning
Avatar
Hai Huang
41 views
Composite Backdoor Attacks Against Large Language Models
Avatar
Hai Huang
40 views
DiPmark: A Stealthy, Efficient and Resilient Watermark for Large
  Language Models
Avatar
Yihan Wu
41 views
Better Safe than Sorry: Recovering after Adversarial Majority
Avatar
Srivatsan Sridhar
48 views
A Semantic Invariant Robust Watermark for Large Language Models
Avatar
Aiwei Liu
42 views
Partition-based differentially private synthetic data generation
Avatar
Meifan Zhanga
44 views
Leveraging Diffusion-Based Image Variations for Robust Training on
  Poisoned Data
Avatar
Lukas Struppek
36 views
Top of the Heap: Efficient Memory Error Protection for Many Heap Objects
Avatar
Kaiming Huang
46 views