Search

Your search keyword '"Computer Science - Cryptography and Security"' showing total 95,258 results

Search Constraints

Start Over You searched for: Descriptor "Computer Science - Cryptography and Security" Remove constraint Descriptor: "Computer Science - Cryptography and Security"
95,258 results on '"Computer Science - Cryptography and Security"'

Search Results

1. VLSBench: Unveiling Visual Leakage in Multimodal Safety

2. GuardSplat: Robust and Efficient Watermarking for 3D Gaussian Splatting

3. LUMIA: Linear probing for Unimodal and MultiModal Membership Inference A!acks leveraging internal LLM states

4. Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices

5. Evidence-Based Threat Modeling for ICS

6. A Comprehensive Content Verification System for ensuring Digital Integrity in the Age of Deep Fakes

7. Forensics Adapter: Adapting CLIP for Generalizable Face Forgery Detection

8. Quantized Delta Weight Is Safety Keeper

9. On the Adversarial Robustness of Instruction-Tuned Large Language Models for Code

10. FLARE: Towards Universal Dataset Purification against Backdoor Attacks

11. A Game-Theoretic Approach to the Study of Blockchain's Robustness

12. A Comparative Analysis of Vulnerability Management Tools: Evaluating Nessus, Acunetix, and Nikto for Risk Based Security Solutions

13. LADDER: Multi-objective Backdoor Attack via Evolutionary Algorithm

14. Presenting a new approach in security in inter-vehicle networks (VANET)

15. Knowledge Database or Poison Base? Detecting RAG Poisoning Attack through LLM Activations

16. Guardians of the Ledger: Protecting Decentralized Exchanges from State Derailment Defects

17. Characterizing JavaScript Security Code Smells

18. Dynamic Taint Tracking using Partial Instrumentation for Java Applications

19. On the matching arrangement of a graph,improper weight function problem and its application

20. PEFT-as-an-Attack! Jailbreaking Language Models during Federated Parameter-Efficient Fine-Tuning

21. SmartLLMSentry: A Comprehensive LLM Based Smart Contract Vulnerability Detection Framework

22. Evaluating and Improving the Robustness of Security Attack Detectors Generated by LLMs

23. InputSnatch: Stealing Input in LLM Services via Timing Side-Channel Attacks

24. Harnessing Large Language Models for Seed Generation in Greybox Fuzzing

25. Comprehensive Kernel Safety in the Spectre Era: Mitigations and Performance Evaluation (Extended Version)

26. Sharing the Path: A Threshold Scheme from Isogenies and Error Correcting Codes

27. Formal Verification of Digital Twins with TLA and Information Leakage Control

28. Fall Leaf Adversarial Attack on Traffic Sign Classification

29. Cyber-Attack Technique Classification Using Two-Stage Trained Large Language Models

30. Inference Privacy: Properties and Mechanisms

31. An indicator for effectiveness of text-to-image guardrails utilizing the Single-Turn Crescendo Attack (STCA)

32. Immune: Improving Safety Against Jailbreaks in Multi-modal LLMs via Inference-Time Alignment

33. PRSI: Privacy-Preserving Recommendation Model Based on Vector Splitting and Interactive Protocols

34. Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection

35. SoK: Watermarking for AI-Generated Content

36. Proving and Rewarding Client Diversity to Strengthen Resilience of Blockchain Networks

37. Using Malware Detection Techniques for HPC Application Classification

38. RITA: Automatic Framework for Designing of Resilient IoT Applications

39. Hidden Data Privacy Breaches in Federated Learning

40. E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems

41. Privacy-preserving Robotic-based Multi-factor Authentication Scheme for Secure Automated Delivery System

42. Leveraging A New GAN-based Transformer with ECDH Crypto-system for Enhancing Energy Theft Detection in Smart Grid

43. Optimized Tradeoffs for Private Prediction with Majority Ensembling

44. Adversarial Training in Low-Label Regimes with Margin-Based Interpolation

45. Stealthy Multi-Task Adversarial Attacks

46. Combining Threat Intelligence with IoT Scanning to Predict Cyber Attack

47. A Practical Approach to Formal Methods: An Eclipse Integrated Development Environment (IDE) for Security Protocols

48. Passive Deepfake Detection Across Multi-modalities: A Comprehensive Survey

49. MADE: Graph Backdoor Defense with Masked Unlearning

50. RealSeal: Revolutionizing Media Authentication with Real-Time Realism Scoring

Catalog

Books, media, physical & digital resources