We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jul 2021, skipping first 225

[ total of 299 entries: 1-25 | ... | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-299 ]
[ showing 25 entries per page: fewer | more | all ]
[226]  arXiv:2107.04296 (cross-list from cs.LG) [pdf, other]
Title: Differentially private training of neural networks with Langevin dynamics for calibrated predictive uncertainty
Comments: Accepted to the ICML 2021 Theory and Practice of Differential Privacy Workshop
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[227]  arXiv:2107.04435 (cross-list from cs.LG) [pdf, other]
Title: Learning to Detect Adversarial Examples Based on Class Scores
Comments: Accepted at the 44th German Conference on Artificial Intelligence (KI 2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[228]  arXiv:2107.04594 (cross-list from cs.NI) [pdf, ps, other]
Title: Convergence of 5G with Internet of Things for Enhanced Privacy
Comments: 11 pages, 2 Figures and 4 Tables
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[229]  arXiv:2107.04764 (cross-list from cs.LG) [pdf, other]
Title: Hack The Box: Fooling Deep Learning Abstraction-Based Monitors
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[230]  arXiv:2107.04833 (cross-list from cs.NI) [pdf, ps, other]
Title: Attack-Aware Synchronization-Free Data Timestamping in LoRaWAN
Comments: This paper has been accepted by ACM Transactions on Sensor Networks (TOSN)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[231]  arXiv:2107.05156 (cross-list from cs.IT) [pdf, ps, other]
Title: On the Hamming Weight Distribution of Subsequences of Pseudorandom Sequences
Comments: The paper has been accepted for publication in IEEE International Symposium on Information Theory (ISIT), 2021
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[232]  arXiv:2107.05166 (cross-list from cs.LG) [pdf, other]
Title: Stateful Detection of Model Extraction Attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[233]  arXiv:2107.05225 (cross-list from cs.PL) [pdf, ps, other]
Title: Compositional Vulnerability Detection with Insecurity Separation Logic (Extended Version)
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[234]  arXiv:2107.05243 (cross-list from cs.CL) [pdf, other]
Title: Putting words into the system's mouth: A targeted attack on neural machine translation using monolingual data poisoning
Comments: Findings of ACL, to appear
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[235]  arXiv:2107.05774 (cross-list from cs.IT) [pdf, ps, other]
Title: Primitive Rateless Codes
Comments: Accepted for publication in IEEE Transaction on Communications, July 2021
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[236]  arXiv:2107.05780 (cross-list from cs.CV) [pdf, other]
Title: Detect and Defense Against Adversarial Examples in Deep Learning using Natural Scene Statistics and Adaptive Denoising
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[237]  arXiv:2107.06242 (cross-list from cs.IT) [pdf, other]
Title: Low Rate Protograph-Based LDPC Codes for Continuous Variable Quantum Key Distribution
Comments: Accepted for publication at ISWCS 2021 (Special session on coding for communications and security)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[238]  arXiv:2107.06732 (cross-list from cs.CY) [pdf, other]
Title: Opportunities and challenges of Blockchain-Oriented systems in the tourism industry
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[239]  arXiv:2107.06790 (cross-list from cs.DC) [pdf, other]
Title: Governing Decentralized Complex Queries Through a DAO
Journal-ref: Proceedings of the Conference on Information Technology for Social Good (GoodIT 2021)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[240]  arXiv:2107.06922 (cross-list from cs.DC) [pdf, other]
Title: A Byzantine Fault-Tolerant Consensus Library for Hyperledger Fabric
Comments: IEEE International Conference on Blockchain and Cryptocurrency, this https URL
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[241]  arXiv:2107.06944 (cross-list from cs.LG) [pdf, other]
Title: On the impossibility of non-trivial accuracy under fairness constraints
Comments: 7 pages and 6 more of detailed supplementary material
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[242]  arXiv:2107.07043 (cross-list from cs.LG) [pdf, ps, other]
Title: GGT: Graph-Guided Testing for Adversarial Sample Detection of Deep Neural Network
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[243]  arXiv:2107.07240 (cross-list from cs.LG) [pdf, other]
Title: Subnet Replacement: Deployment-stage backdoor attack against deep neural networks in gray-box setting
Comments: 6 pages, 3 figures, ICLR 2021 Workshop on Security and Safety in Machine Learning System
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[244]  arXiv:2107.07334 (cross-list from cs.HC) [pdf, other]
Title: Tournesol: A quest for a large, secure and trustworthy database of reliable human judgments
Comments: 27 pages, 13 figures
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[245]  arXiv:2107.08077 (cross-list from cs.GT) [pdf, other]
Title: The Convergence Rates of Blockchain Mining Games: A Markovian Approach
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[246]  arXiv:2107.08357 (cross-list from cs.CL) [pdf, other]
Title: As Easy as 1, 2, 3: Behavioural Testing of NMT Systems for Numerical Translation
Comments: Findings of ACL, to appear
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[247]  arXiv:2107.08364 (cross-list from cs.SE) [pdf, other]
Title: A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Comments: Accepted for publication in the ACM Computing Surveys journal (CSUR), 2022
Journal-ref: ACM Comput. Surv., 55, 5 (2022), Article 100
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[248]  arXiv:2107.08461 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Bayesian Neural Networks on Accuracy, Privacy and Reliability
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[249]  arXiv:2107.08490 (cross-list from cs.DC) [pdf, other]
Title: System-Wide Security for Offline Payment Terminals
Comments: 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2021)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[250]  arXiv:2107.08676 (cross-list from cs.IT) [pdf, ps, other]
Title: Influence of a Set of Variables on a Boolean Function
Subjects: Information Theory (cs.IT); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[ total of 299 entries: 1-25 | ... | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-299 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)