We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2019, skipping first 200

[ total of 237 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-237 ]
[ showing 50 entries per page: fewer | more | all ]
[201]  arXiv:1912.07942 (cross-list from cs.LG) [pdf, other]
Title: Analyzing Information Leakage of Updates to Natural Language Models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[202]  arXiv:1912.08590 (cross-list from cs.NI) [pdf, other]
Title: How India Censors the Web
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[203]  arXiv:1912.08951 (cross-list from cs.DS) [pdf, other]
Title: The power of synergy in differential privacy: Combining a small curator with local randomizers
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[204]  arXiv:1912.08987 (cross-list from cs.LG) [pdf, other]
Title: Model Weight Theft With Just Noise Inputs: The Curious Case of the Petulant Attacker
Comments: Presented at the Security and Privacy of Machine Learning Workshop, 36th International Conference on Machine Learning (ICML 2019), Long Beach, California, USA
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[205]  arXiv:1912.09059 (cross-list from cs.CV) [pdf, other]
Title: $n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[206]  arXiv:1912.09264 (cross-list from cs.DS) [pdf, other]
Title: Improved quantum algorithm for the random subset sum problem
Authors: Yang Li, Hongbo Li
Comments: arXiv admin note: text overlap with arXiv:1907.04295 by other authors
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[207]  arXiv:1912.09555 (cross-list from cs.SI) [pdf, other]
Title: Imbalance measure and proactive channel rebalancing algorithm for the Lightning Network
Comments: 8 Pages + references. 9 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[208]  arXiv:1912.09855 (cross-list from cs.LG) [pdf, other]
Title: Explainability and Adversarial Robustness for RNNs
Comments: Accepted at IEEE BigDataService 2020
Journal-ref: 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)
[209]  arXiv:1912.09899 (cross-list from cs.LG) [pdf, other]
Title: Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing
Comments: ICLR 2020, code is available at this: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[210]  arXiv:1912.10013 (cross-list from cs.LG) [pdf, other]
Title: secml: A Python Library for Secure and Explainable Machine Learning
Comments: Accepted for publication to SoftwareX. Published version can be found at: this https URL
Journal-ref: SoftwareX 18 (2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computer Science and Game Theory (cs.GT); Machine Learning (stat.ML)
[211]  arXiv:1912.10070 (cross-list from cs.MM) [pdf, other]
Title: Destruction of Image Steganography using Generative Adversarial Networks
Comments: 8 pages
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV); Signal Processing (eess.SP); Machine Learning (stat.ML)
[212]  arXiv:1912.10185 (cross-list from cs.CV) [pdf, other]
Title: Jacobian Adversarially Regularized Networks for Robustness
Comments: ICLR 2020 Camera Ready
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[213]  arXiv:1912.10298 (cross-list from cs.NI) [src]
Title: Content Addressed P2P File System for the Web with Blockchain-Based Meta-Data Integrity
Comments: Inaccuracies and inconsistencies in paper
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[214]  arXiv:1912.10413 (cross-list from cs.MM) [pdf, ps, other]
Title: Hiding Data in Images Using Cryptography and Deep Neural Network
Comments: 20 pages, 9 figures, 5 tables
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[215]  arXiv:1912.10979 (cross-list from cs.LG) [pdf, other]
Title: Privacy Attacks on Network Embeddings
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
[216]  arXiv:1912.11852 (cross-list from cs.CV) [pdf, other]
Title: Benchmarking Adversarial Robustness
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[217]  arXiv:1912.12060 (cross-list from cs.SI) [pdf, other]
Title: Characterizing and Detecting Money Laundering Activities on the Bitcoin Network
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[218]  arXiv:1912.12170 (cross-list from cs.CV) [pdf, other]
Title: Mitigating large adversarial perturbations on X-MAS (X minus Moving Averaged Samples)
Comments: X-MAS is the essential condition for the proposed mitigation as well as human beings. The codes and data for evaluation are available in this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[219]  arXiv:1912.12640 (cross-list from cs.CV) [pdf, other]
Title: Copy Move Source-Target Disambiguation through Multi-Branch CNNs
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[220]  arXiv:1912.12716 (cross-list from cs.LG) [pdf, other]
Title: Federated Variance-Reduced Stochastic Gradient Descent with Robustness to Byzantine Attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[221]  arXiv:1912.12982 (cross-list from cs.SE) [pdf, other]
Title: Scalable Online Vetting of Android Apps for Measuring Declared SDK Versions and Their Consistency with API Calls
Comments: This article extends our preliminary conference version at WASA'17, see this https URL and arXiv:1702.04872
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[222]  arXiv:1912.13204 (cross-list from cs.LG) [pdf, other]
Title: A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms
Comments: 8 pages, 13 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)
[223]  arXiv:1912.13501 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Set Intersection: A Multi-Message Symmetric Private Information Retrieval Perspective
Comments: Submitted for publication
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Databases (cs.DB); Signal Processing (eess.SP)
[224]  arXiv:1912.00990 (cross-list from quant-ph) [pdf, ps, other]
Title: Classical Verification of Quantum Computations with Efficient Verifier
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[225]  arXiv:1912.02771 (cross-list from stat.ML) [pdf, other]
Title: Label-Consistent Backdoor Attacks
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[226]  arXiv:1912.03498 (cross-list from quant-ph) [pdf, ps, other]
Title: Quasi-deterministic secure quantum communication using non-maximally entangled states
Journal-ref: Int J Theor Phys, 60, 164 (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[227]  arXiv:1912.04439 (cross-list from stat.ML) [pdf, other]
Title: Privacy-preserving data sharing via probabilistic modelling
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[228]  arXiv:1912.04769 (cross-list from quant-ph) [pdf, ps, other]
Title: Post-quantum Zero Knowledge in Constant Rounds
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[229]  arXiv:1912.05547 (cross-list from quant-ph) [pdf, other]
Title: Forging quantum data: classically defeating an IQP-based quantum test
Comments: 8 pages, 2 figures. v2: revisions to exposition and discussion; references updated; no changes to main results. v3: update DOIs of references
Journal-ref: Quantum 7, 1107 (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[230]  arXiv:1912.06134 (cross-list from math.NT) [pdf, ps, other]
Title: Computing the 2-adic complexity of two classes of Ding-Helleseth generalized cyclotomic sequences of period of twin prime products
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[231]  arXiv:1912.06751 (cross-list from math.GR) [pdf, other]
Title: Some group-theoretical results on Feistel Networks in a long-key scenario
Comments: Accepted for publication in Advances in Mathematics of Communications
Journal-ref: Advances in Mathematics of Communications, 2020, 14(4), pp. 727-743
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[232]  arXiv:1912.07641 (cross-list from math.OC) [pdf, other]
Title: On privacy preserving data release of linear dynamic networks
Authors: Yang Lu, Minghui Zhu
Comments: 18 pages, 5 figures, journal
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[233]  arXiv:1912.08677 (cross-list from physics.class-ph) [pdf, other]
Title: Random number generation & distribution out of thin (or thick) air
Comments: 18 pages, 9 figures
Journal-ref: J. Opt. 22 075705 (2020)
Subjects: Classical Physics (physics.class-ph); Cryptography and Security (cs.CR)
[234]  arXiv:1912.08939 (cross-list from quant-ph) [pdf, other]
Title: Practical Relativistic Zero-Knowledge for NP
Comments: Submitted to ITC 2020
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[235]  arXiv:1912.10602 (cross-list from stat.ME) [pdf, other]
Title: Study on upper limit of sample sizes for a two-level test in NIST SP800-22
Authors: Hiroshi Haramoto
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[236]  arXiv:1912.11279 (cross-list from stat.ML) [pdf, ps, other]
Title: Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[237]  arXiv:1912.13445 (cross-list from stat.ML) [pdf, other]
Title: Robust Aggregation for Federated Learning
Journal-ref: IEEE Transactions on Signal Processing 70 (2022): 1142-1154
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 237 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-237 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)