Cryptography and Security Papers Profile
Cryptography and Security Papers

@FSFG

Followers
287
Following
1
Media
0
Statuses
10K

Cryptography and security including authentication, public key cryptosytems and proof-carrying code submissions to https://t.co/jPDNjU6jMd (not affiliated with arXiv)

Joined November 2010
Don't wanna be here? Send us removal request.
@FSFG
Cryptography and Security Papers
3 hours
A Systematization of Security Vulnerabilities in Computer Use Agents.
0
0
0
@FSFG
Cryptography and Security Papers
3 hours
FrameShift: Learning to Resize Fuzzer Inputs Without Breaking Them.
0
0
0
@FSFG
Cryptography and Security Papers
4 hours
Layered, Overlapping, and Inconsistent: A Large-Scale Analysis of the Multiple Privacy Policies and Controls of U.S. Banks.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
Novel Blockchain-based Protocols for Electronic Voting and Auctions.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
On Jailbreaking Quantized Language Models Through Fault Injection Attacks.
0
0
0
@FSFG
Cryptography and Security Papers
8 hours
Holographic Projection and Cyber Attack Surface: A Physical Analogy for Digital Security.
0
0
0
@FSFG
Cryptography and Security Papers
13 hours
LLM-Driven Auto Configuration for Transient IoT Device Collaboration.
0
0
0
@FSFG
Cryptography and Security Papers
13 hours
Improving LLM Reasoning for Vulnerability Detection via Group Relative Policy Optimization.
0
0
0
@FSFG
Cryptography and Security Papers
13 hours
A Multi-Resolution Dynamic Game Framework for Cross-Echelon Decision-Making in Cyber Warfare.
0
0
0
@FSFG
Cryptography and Security Papers
18 hours
Intrinsic Fingerprint of LLMs: Continue Training is NOT All You Need to Steal A Model!.
0
0
0
@FSFG
Cryptography and Security Papers
18 hours
Deterministic Cryptographic Seed Generation via Cyclic Modular Inversion over $\mathbb{Z}/3^p\mathbb{Z}$.
0
0
0
@FSFG
Cryptography and Security Papers
18 hours
Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench.
0
0
0
@FSFG
Cryptography and Security Papers
22 hours
Aim High, Stay Private: Differentially Private Synthetic Data Enables Public Release of Behavioral Health Information with High Utility.
0
0
0
@FSFG
Cryptography and Security Papers
22 hours
Reinforcement Learning for Automated Cybersecurity Penetration Testing.
0
1
0
@FSFG
Cryptography and Security Papers
23 hours
Unveiling Privacy Policy Complexity: An Exploratory Study Using Graph Mining, Machine Learning, and Natural Language Processing.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
A Novel Active Learning Approach to Label One Million Unknown Malware Variants.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
A Representation Engineering Perspective on the Effectiveness of Multi-Turn Jailbreaks.
0
0
0
@FSFG
Cryptography and Security Papers
1 day
Bittensor Protocol: The Bitcoin in Decentralized Artificial Intelligence? A Critical and Empirical Analysis.
0
0
0
@FSFG
Cryptography and Security Papers
3 days
On the Feasibility of Poisoning Text-to-Image AI Models via Adversarial Mislabeling.
0
0
0
@FSFG
Cryptography and Security Papers
3 days
CyGym: A Simulation-Based Game-Theoretic Analysis Framework for Cybersecurity.
0
0
0