ACE: A Security Architecture for LLM-Integrated App Systems
http://arxiv.org/abs/2504.20984v1
Conformal-DP: Differential Privacy on Riemannian Manifolds via Conformal
Transformation
http://arxiv.org/abs/2504.20941v1
DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable
Memory and Differential Information Flow Tracking assisted Processor Fuzzing
http://arxiv.org/abs/2504.20934v1
Bipartite Randomized Response Mechanism for Local Differential Privacy
http://arxiv.org/abs/2504.20926v1
GiBy: A Giant-Step Baby-Step Classifier For Anomaly Detection In
Industrial Control Systems
http://arxiv.org/abs/2504.20906v1
Dual Explanations via Subgraph Matching for Malware Detection
http://arxiv.org/abs/2504.20904v1
New Capacity Bounds for PIR on Graph and Multigraph-Based Replicated
Storage
http://arxiv.org/abs/2504.20888v1
Quantifying the Noise of Structural Perturbations on Graph Adversarial
Attacks
http://arxiv.org/abs/2504.20869v1
Mitigating the Structural Bias in Graph Adversarial Defenses
http://arxiv.org/abs/2504.20848v1
DP-SMOTE: Integrating Differential Privacy and Oversampling Technique to
Preserve Privacy in Smart Homes
http://arxiv.org/abs/2504.20827v1
Secure Coding with AI, From Creation to Inspection
http://arxiv.org/abs/2504.20814v1
Unlocking User-oriented Pages: Intention-driven Black-box Scanner for
Real-world Web Applications
http://arxiv.org/abs/2504.20801v1
did:self A registry-less DID method
http://arxiv.org/abs/2504.20767v1
Enhancing Vulnerability Reports with Automated and Augmented Description
Summarization
http://arxiv.org/abs/2504.20726v1
Building Trust in Healthcare with Privacy Techniques: Blockchain in the
Cloud
http://arxiv.org/abs/2504.20700v1
DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic
Signal
http://arxiv.org/abs/2504.20689v1
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations
in Ransomware Attacks
http://arxiv.org/abs/2504.20681v1
Protocol Dialects as Formal Patterns: A Composable Theory of Lingos --
Technical report
http://arxiv.org/abs/2504.20637v1
A Novel Cipher for Enhancing MAVLink Security: Design, Security
Analysis, and Performance Evaluation Using a Drone Testbed
http://arxiv.org/abs/2504.20626v1
The Hidden Risks of LLM-Generated Web Application Code: A
Security-Centric Evaluation of Code Generation Capabilities in Large Language
Models
http://arxiv.org/abs/2504.20612v1
ReCIT: Reconstructing Full Private Data from Gradient in
Parameter-Efficient Fine-Tuning of Large Language Models
http://arxiv.org/abs/2504.20570v1
VIMU: Effective Physics-based Realtime Detection and Recovery against
Stealthy Attacks on UAVs
http://arxiv.org/abs/2504.20569v1
Mutual Information Minimization for Side-Channel Attack Resistance via
Optimal Noise Injection
http://arxiv.org/abs/2504.20556v1
Efficient patient-centric EMR sharing block tree
http://arxiv.org/abs/2504.20544v1
Starfish: Rebalancing Multi-Party Off-Chain Payment Channels
http://arxiv.org/abs/2504.20536v1
TriniMark: A Robust Generative Speech Watermarking Method for
Trinity-Level Attribution
http://arxiv.org/abs/2504.20532v1
Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM
Reasoning via Adaptive Token Compression
http://arxiv.org/abs/2504.20493v1
Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains
through Stealthy Code Changes
http://arxiv.org/abs/2504.20485v1
Robustness via Referencing: D