source: export.arxiv.org/rss/cs.CR
maintainer: @tmaehara.bsky.social
A Research and Development Portfolio of GNN Centric Malware Detection, Explainability, and Dataset Curation
https://arxiv.org/abs/2511.20801
A Research and Development Portfolio of GNN Centric Malware Detection, Explainability, and Dataset Curation
https://arxiv.org/abs/2511.20801
Private Data Imputation
https://arxiv.org/abs/2511.20832
Private Data Imputation
https://arxiv.org/abs/2511.20832
Supporting Students in Navigating LLM-Generated Insecure Code
https://arxiv.org/abs/2511.20878
Supporting Students in Navigating LLM-Generated Insecure Code
https://arxiv.org/abs/2511.20878
A Taxonomy of Pix Fraud in Brazil: Attack Methodologies, AI-Driven Amplification, and Defensive Strategies
https://arxiv.org/abs/2511.20902
A Taxonomy of Pix Fraud in Brazil: Attack Methodologies, AI-Driven Amplification, and Defensive Strategies
https://arxiv.org/abs/2511.20902
Securing the Model Context Protocol (MCP): Risks, Controls, and Governance
https://arxiv.org/abs/2511.20920
Securing the Model Context Protocol (MCP): Risks, Controls, and Governance
https://arxiv.org/abs/2511.20920
Readout-Side Bypass for Residual Hybrid Quantum-Classical Models
https://arxiv.org/abs/2511.20922
Readout-Side Bypass for Residual Hybrid Quantum-Classical Models
https://arxiv.org/abs/2511.20922
Road Network-Aware Personalized Trajectory Protection with Differential Privacy under Spatiotemporal Correlations
https://arxiv.org/abs/2511.21020
Road Network-Aware Personalized Trajectory Protection with Differential Privacy under Spatiotemporal Correlations
https://arxiv.org/abs/2511.21020
CAHS-Attack: CLIP-Aware Heuristic Search Attack Method for Stable Diffusion
https://arxiv.org/abs/2511.21180
CAHS-Attack: CLIP-Aware Heuristic Search Attack Method for Stable Diffusion
https://arxiv.org/abs/2511.21180
AuthenLoRA: Entangling Stylization with Imperceptible Watermarks for Copyright-Secure LoRA Adapters
https://arxiv.org/abs/2511.21216
AuthenLoRA: Entangling Stylization with Imperceptible Watermarks for Copyright-Secure LoRA Adapters
https://arxiv.org/abs/2511.21216
Data Exfiltration by Compression Attack: Definition and Evaluation on Medical Image Data
https://arxiv.org/abs/2511.21227
Data Exfiltration by Compression Attack: Definition and Evaluation on Medical Image Data
https://arxiv.org/abs/2511.21227
Illuminating the Black Box: Real-Time Monitoring of Backdoor Unlearning in CNNs via Explainable AI
https://arxiv.org/abs/2511.21291
Illuminating the Black Box: Real-Time Monitoring of Backdoor Unlearning in CNNs via Explainable AI
https://arxiv.org/abs/2511.21291
Empirical Assessment of the Code Comprehension Effort Needed to Attack Programs Protected with Obfuscation
https://arxiv.org/abs/2511.21301
Empirical Assessment of the Code Comprehension Effort Needed to Attack Programs Protected with Obfuscation
https://arxiv.org/abs/2511.21301
Constructing and Benchmarking: a Labeled Email Dataset for Text-Based Phishing and Spam Detection Framework
https://arxiv.org/abs/2511.21448
Constructing and Benchmarking: a Labeled Email Dataset for Text-Based Phishing and Spam Detection Framework
https://arxiv.org/abs/2511.21448
MAD-DAG: Protecting Blockchain Consensus from MEV
https://arxiv.org/abs/2511.21552
MAD-DAG: Protecting Blockchain Consensus from MEV
https://arxiv.org/abs/2511.21552
TAB-DRW: A DFT-based Robust Watermark for Generative Tabular Data
https://arxiv.org/abs/2511.21600
TAB-DRW: A DFT-based Robust Watermark for Generative Tabular Data
https://arxiv.org/abs/2511.21600
EAGER: Edge-Aligned LLM Defense for Robust, Efficient, and Accurate Cybersecurity Question Answering
https://arxiv.org/abs/2511.19523
EAGER: Edge-Aligned LLM Defense for Robust, Efficient, and Accurate Cybersecurity Question Answering
https://arxiv.org/abs/2511.19523
AttackPilot: Autonomous Inference Attacks Against ML Services With LLM-Based Agents
https://arxiv.org/abs/2511.19536
AttackPilot: Autonomous Inference Attacks Against ML Services With LLM-Based Agents
https://arxiv.org/abs/2511.19536
SPQR: A Standardized Benchmark for Modern Safety Alignment Methods in Text-to-Image Diffusion Models
https://arxiv.org/abs/2511.19558
SPQR: A Standardized Benchmark for Modern Safety Alignment Methods in Text-to-Image Diffusion Models
https://arxiv.org/abs/2511.19558
IRSDA: An Agent-Orchestrated Framework for Enterprise Intrusion Response
https://arxiv.org/abs/2511.19644
IRSDA: An Agent-Orchestrated Framework for Enterprise Intrusion Response
https://arxiv.org/abs/2511.19644
Synthetic Data: AI's New Weapon Against Android Malware
https://arxiv.org/abs/2511.19649
Synthetic Data: AI's New Weapon Against Android Malware
https://arxiv.org/abs/2511.19649
Accuracy and Efficiency Trade-Offs in LLM-Based Malware Detection and Explanation: A Comparative Study of Parameter Tuning vs. Full Fine-Tuning
https://arxiv.org/abs/2511.19654
Accuracy and Efficiency Trade-Offs in LLM-Based Malware Detection and Explanation: A Comparative Study of Parameter Tuning vs. Full Fine-Tuning
https://arxiv.org/abs/2511.19654
BASICS: Binary Analysis and Stack Integrity Checker System for Buffer Overflow Mitigation
https://arxiv.org/abs/2511.19670
BASICS: Binary Analysis and Stack Integrity Checker System for Buffer Overflow Mitigation
https://arxiv.org/abs/2511.19670
CrypTorch: PyTorch-based Auto-tuning Compiler for Machine Learning with Multi-party Computation
https://arxiv.org/abs/2511.19711
CrypTorch: PyTorch-based Auto-tuning Compiler for Machine Learning with Multi-party Computation
https://arxiv.org/abs/2511.19711
Prompt Fencing: A Cryptographic Approach to Establishing Security Boundaries in Large Language Model Prompts
https://arxiv.org/abs/2511.19727
Prompt Fencing: A Cryptographic Approach to Establishing Security Boundaries in Large Language Model Prompts
https://arxiv.org/abs/2511.19727
Cross-LLM Generalization of Behavioral Backdoor Detection in AI Agent Supply Chains
https://arxiv.org/abs/2511.19874
Cross-LLM Generalization of Behavioral Backdoor Detection in AI Agent Supply Chains
https://arxiv.org/abs/2511.19874