Optimal conversion from Rényi Differential Privacy to ff-Differential Privacy

This paper proves that the conjectured conversion rule, which maps a Rényi Differential Privacy profile to an ff-Differential Privacy trade-off function via the pointwise maximum of single-order bounds (equivalent to the intersection of RDP privacy regions), is optimal and cannot be uniformly improved upon for any valid RDP profile or Type I error level.

Anneliese Riess, Juan Felipe Gomez, Flavio du Pin Calmon, Julia Anne Schnabel, Georgios KaissisWed, 11 Ma💻 cs

Kite: How to Delegate Voting Power Privately

This paper introduces Kite, a protocol that enables private delegation of voting power in Decentralized Autonomous Organizations (DAOs) by allowing voters to delegate, revoke, or re-delegate their votes without revealing delegate identities to anyone, including the delegates themselves, while maintaining public verifiability and demonstrating practical implementation on Ethereum.

Kamilla Nazirkhanova, Vrushank Gunjur, X. Pilli Cruz-De Jesus, Dan BonehWed, 11 Ma💻 cs

VisPoison: An Effective Backdoor Attack Framework for Tabular Data Visualization Models

This paper introduces VisPoison, a backdoor attack framework that exploits text-to-visualization models for tabular data by using stealthy triggers to cause data exposure, misleading visualizations, or denial-of-service failures with over 90% success rates, thereby highlighting critical security vulnerabilities in current systems and the inadequacy of existing defenses.

Shuaimin Li, Chen Jason Zhang, Xuanang Chen, Anni Peng, Zhuoyue Wan, Yuanfeng Song, Shiwen Ni, Min Yang, Fei Hao, Raymond Chi-Wing WongWed, 11 Ma💻 cs

Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models

This paper presents a longitudinal study of GPT, Llama, and Qwen models, revealing that continuous updates and increased model sizes do not consistently enhance adversarial robustness against misclassification, jailbreaks, and hallucinations, and can sometimes exacerbate existing vulnerabilities.

Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang ZhangWed, 11 Ma💻 cs

Role Classification of Hosts within Enterprise Networks Based on Connection Patterns

This paper addresses the problem of role classification in enterprise networks by introducing two practical algorithms that group hosts based on evolving connection patterns to simplify network management and enhance monitoring accuracy, demonstrating their effectiveness through commercial implementation and significant reduction in host grouping complexity.

Godfrey Tan, Massimiliano Poletto, John Guttag, Frans KaashoekWed, 11 Ma💻 cs

The Bureaucracy of Speed: Structural Equivalence Between Memory Consistency Models and Multi-Agent Authorization Revocation

This paper proposes a Capability Coherence System (CCS) that maps memory consistency models to identity management, demonstrating through simulation that a Release Consistency-directed revocation strategy (RCC) achieves a constant bound on unauthorized operations independent of agent velocity, thereby outperforming traditional time-bounded approaches by orders of magnitude in high-speed agentic environments.

Vladyslav ParakhinWed, 11 Ma💻 cs

PixelConfig: Longitudinal Measurement and Reverse-Engineering of Meta Pixel Configurations

This paper introduces PixelConfig, a framework for reverse-engineering Meta Pixel configurations, which reveals that default settings drive widespread adoption of activity and identity tracking features capable of capturing sensitive health data, while existing tracking restriction mechanisms offer limited practical protection.

Abdullah Ghani (Lahore University of Management Sciences), Yash Vekaria (University of California, Davis), Zubair Shafiq (University of California, Davis)Wed, 11 Ma💻 cs

ProvAgent: Threat Detection Based on Identity-Behavior Binding and Multi-Agent Collaborative Attack Investigation

ProvAgent is a novel framework that enhances threat detection and investigation by integrating graph contrastive learning for high-fidelity alert generation with a multi-agent collaborative system to autonomously reconstruct complex APT attack processes, thereby overcoming the limitations of traditional human-model collaboration.

Wenhao Yan, Ning An, Linxu Li, Bingsheng Bi, Bo Jiang, Zhigang Lu, Baoxu Liu, Junrong Liu, Cong DongWed, 11 Ma💻 cs