Secure and reversible face anonymization with diffusion models
Pol Labarbarie, Vincent Itier, William Puech
https://arxiv.org/abs/2510.01031 https://arxiv.…
A Gentle Introduction to Blind signatures: From RSA to Lattice-based Cryptography
Aditya Bhardwaj, P\'eter Kutas
https://arxiv.org/abs/2509.02189 https://
Making Characters Count. A Computational Approach to Scribal Profiling in 14th-Century Middle Dutch Manuscripts from the Carthusian Monastery of Herne
Caroline Vandyck, Wouter Haverals, Mike Kestemont
https://arxiv.org/abs/2509.00067
Identification of post-COVID-19 symptoms using brain structural MRI features: a machine learning approach
Abdi Reza
https://arxiv.org/abs/2510.00195 https://
On many platforms, we are no longer the customers, but instead have become the product. Our data, even if anonymised, is sold on to actors we never intended it to reach, who can then target us with content and advertising. This includes deliberately harmful content that leads to real-world violence, spreads misinformation, wreaks havoc on our psychological wellbeing and seeks to undermine social cohesion.
Sir T.B.L.
LLUAD: Low-Latency User-Anonymized DNS
Philip Sj\"osv\"ard, Hongyu Jin, Panos Papadimitratos
https://arxiv.org/abs/2509.24174 https://arxiv.org/p…
Speaker Anonymisation for Speech-based Suicide Risk Detection
Ziyun Cui, Sike Jia, Yang Lin, Yinan Duan, Diyang Qu, Runsen Chen, Chao Zhang, Chang Lei, Wen Wu
https://arxiv.org/abs/2509.22148
Single-Round Deterministic Quantum Anonymous Veto Using Bell States
Ravi Sangwan, Harishankar Mishra, Henry Sukumar, Gudapati Naresh Raghava
https://arxiv.org/abs/2509.15951 htt…
Eliminating Exponential Key Growth in PRG-Based Distributed Point Functions
Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon
https://arxiv.org/abs/2509.22022 https://