We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2019, skipping first 250

[ total of 269 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-269 ]
[ showing 25 entries per page: fewer | more | all ]
[251]  arXiv:1904.12843 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Training for Free!
Comments: Accepted to NeurIPS 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[252]  arXiv:1904.13000 (cross-list from cs.LG) [pdf, ps, other]
Title: Adversarial Training and Robustness for Multiple Perturbations
Comments: Accepted at NeurIPS 2019, 23 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[253]  arXiv:1904.13093 (cross-list from cs.DC) [pdf, other]
Title: Please, do not decentralize the Internet with (permissionless) blockchains!
Comments: 11 pages, 1 figure, ICDCS 2019
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[254]  arXiv:1904.13094 (cross-list from cs.LG) [pdf, other]
Title: Detecting Adversarial Examples through Nonlinear Dimensionality Reduction
Comments: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN) 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[255]  arXiv:1904.13352 (cross-list from cs.GT) [pdf, other]
Title: Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[256]  arXiv:1904.00459 (cross-list from math.ST) [pdf, other]
Title: Differentially Private Inference for Binomial Data
Comments: 25 pages before references; 39 pages total. 8 figures. arXiv admin note: text overlap with arXiv:1805.09236
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR)
[257]  arXiv:1904.01869 (cross-list from math.OC) [pdf, other]
Title: Securing State Estimation Under Sensor and Actuator Attacks: Theory and Design
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[258]  arXiv:1904.05441 (cross-list from eess.AS) [pdf, other]
Title: ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection
Journal-ref: Proc. Interspeech 2019
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[259]  arXiv:1904.06303 (cross-list from quant-ph) [pdf, ps, other]
Title: QFactory: classically-instructed remote secret qubits preparation
Comments: 51 pages, 4 figures
Journal-ref: ASIACRYPT 2019. In: Galbraith S., Moriai S. (eds) Advances in Cryptology - ASIACRYPT 2019. Lecture Notes in Computer Science, vol 11921. Springer, Cham
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[260]  arXiv:1904.06320 (cross-list from quant-ph) [pdf, ps, other]
Title: Computationally-secure and composable remote state preparation
Comments: 43 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[261]  arXiv:1904.07330 (cross-list from math.NT) [pdf, ps, other]
Title: New Kloosterman sum identities from the Helleseth-Zinoviev result on $ Z_{4}$-linear Goethals codes
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[262]  arXiv:1904.07453 (cross-list from eess.AS) [pdf, other]
Title: Spoof detection using time-delay shallow neural network and feature switching
Journal-ref: 2019 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), 1011--1017
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD)
[263]  arXiv:1904.10134 (cross-list from eess.AS) [pdf, other]
Title: Replay attack detection with complementary high-resolution information using end-to-end DNN for the ASVspoof 2019 Challenge
Comments: Accepted for oral presentation at Interspeech 2019, code available at this https URL
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[264]  arXiv:1904.10344 (cross-list from quant-ph) [pdf, other]
Title: Quantum rebound capacity
Comments: v2: published version, 7 pages, 2 figures, see companion paper at arXiv:1703.03706
Journal-ref: Phys. Rev. A 100, 030302 (2019)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT); High Energy Physics - Theory (hep-th); Mathematical Physics (math-ph)
[265]  arXiv:1904.10710 (cross-list from quant-ph) [pdf, other]
Title: Modeling and Simulation of Practical Quantum Secure Communication Network
Comments: 20 pages, 6 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[266]  arXiv:1904.10883 (cross-list from physics.soc-ph) [pdf, ps, other]
Title: Pulse strategy for suppressing spreading on networks
Comments: 8 pages, 1 figure
Journal-ref: EPL 2019
Subjects: Physics and Society (physics.soc-ph); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[267]  arXiv:1904.11114 (cross-list from quant-ph) [pdf, ps, other]
Title: Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets
Comments: Publisher's Open Access PDF. arXiv admin note: text overlap with arXiv:1811.05217
Journal-ref: Designs, Codes and Cryptography, vol.88, no.9, pp.1893-1907, Sept. 2020
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[268]  arXiv:1904.11405 (cross-list from quant-ph) [pdf, other]
Title: Dimensionality Distinguishers
Comments: 14 pages
Journal-ref: Quantum Information Processing (2019) 18:171
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[269]  arXiv:1904.11477 (cross-list from quant-ph) [pdf, other]
Title: Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 269 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-269 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)