Auspex: Building Threat Modeling Tradecraft into an Artificial
Intelligence-based Copilot
http://arxiv.org/abs/2503.09586v1
Differentially Private Equilibrium Finding in Polymatrix Games
http://arxiv.org/abs/2503.09538v1
RESTRAIN: Reinforcement Learning-Based Secure Framework for
Trigger-Action IoT Environment
http://arxiv.org/abs/2503.09513v1
Automatic Association of Quality Requirements and Quantifiable Metrics
for Cloud Security Certification
http://arxiv.org/abs/2503.09460v1
Sparse Autoencoder as a Zero-Shot Classifier for Concept Erasing in
Text-to-Image Diffusion Models
http://arxiv.org/abs/2503.09446v1
CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards
CWE Detection
http://arxiv.org/abs/2503.09433v1
Mitigating Membership Inference Vulnerability in Personalized Federated
Learning
http://arxiv.org/abs/2503.09414v1
Faithful and Privacy-Preserving Implementation of Average Consensus
http://arxiv.org/abs/2503.09381v1
Quantum Computing and Cybersecurity Education: A Novel Curriculum for
Enhancing Graduate STEM Learning
http://arxiv.org/abs/2503.09375v1
Membership Inference Attacks fueled by Few-Short Learning to detect
privacy leakage tackling data integrity
http://arxiv.org/abs/2503.09365v1
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs
Using Cyber Security Data
http://arxiv.org/abs/2503.09334v1
Heuristic-Based Address Clustering in Cardano Blockchain
http://arxiv.org/abs/2503.09327v1
RaceTEE: A Practical Privacy-Preserving Off-Chain Smart Contract
Execution Architecture
http://arxiv.org/abs/2503.09317v1
Detecting and Preventing Data Poisoning Attacks on AI Models
http://arxiv.org/abs/2503.09302v1
Prompt Inference Attack on Distributed Large Language Model Inference
Frameworks
http://arxiv.org/abs/2503.09291v1
Differential Privacy Personalized Federated Learning Based on
Dynamically Sparsified Client Updates
http://arxiv.org/abs/2503.09192v1
Exploiting Unstructured Sparsity in Fully Homomorphic Encrypted DNNs
http://arxiv.org/abs/2503.09184v1
Blockchain Data Analytics: Review and Challenges
http://arxiv.org/abs/2503.09165v1
Simulation of Two-Qubit Grover Algorithm in MBQC with Universal Blind
Quantum Computation
http://arxiv.org/abs/2503.09099v1
C^2 ATTACK: Towards Representation Backdoor on CLIP via Concept
Confusion
http://arxiv.org/abs/2503.09095v1
Probing Network Decisions: Capturing Uncertainties and Unveiling
Vulnerabilities Without Label Information
http://arxiv.org/abs/2503.09068v1
Probing Latent Subspaces in LLM for AI Security: Identifying and
Manipulating Adversarial States
http://arxiv.org/abs/2503.09066v1
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural
Networks
http://arxiv.org/abs/2503.09049v1
Performance Evaluation of Threshold Signing Schemes in Cryptography
http://arxiv.org/abs/2503.09047v1
A Hybrid Neural Network with Smart Skip Connections for High-Precision,
Low-Latency EMG-Based Hand Gesture Recognition
http://arxiv.org/abs/2503.09041v1
Image Encryption Using DNA Encoding, Snake Permutation and Chaotic
Substitution Techniques
http://arxiv.org/abs/2503.09038v1
Prompt Inversion Attack against Collaborative Inference of Large
Language Models
http://arxiv.org/abs/2503.09022v1
KNighter: Transforming Static Analysis with LLM-Synthesized Checkers
http://arxiv.org/abs/2503.09002v1
JBFuzz: Jailbreaking LLMs Efficiently and Effectively Using Fuzzing