We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jul 2021, skipping first 250

[ total of 299 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-275 | 276-299 ]
[ showing 25 entries per page: fewer | more | all ]
[251]  arXiv:2107.08760 (cross-list from cs.SE) [pdf, other]
Title: CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software
Authors: Guru Prasad Bhandari, Amara Naseer, Leon Moonen (Simula Research Laboratory, Norway)
Comments: Accepted for publication in Proceedings of the 17th International Conference on Predictive Models and Data Analytics in Software Engineering (PROMISE '21), August 19-20, 2021, Athens, Greece
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252]  arXiv:2107.08763 (cross-list from cs.LG) [pdf, other]
Title: Renyi Differential Privacy of the Subsampled Shuffle Model in Distributed Learning
Comments: arXiv admin note: text overlap with arXiv:2105.05180
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[253]  arXiv:2107.08928 (cross-list from cs.LG) [pdf, other]
Title: Introducing a Family of Synthetic Datasets for Research on Bias in Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[254]  arXiv:2107.09323 (cross-list from cs.LG) [pdf, other]
Title: Transfer Learning for Credit Card Fraud Detection: A Journey from Research to Production
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[255]  arXiv:2107.09707 (cross-list from cs.GT) [pdf, other]
Title: A Cooperative Optimal Mining Model for Bitcoin
Comments: 8 pages, 2 figures, Accepted to 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA)
[256]  arXiv:2107.09802 (cross-list from cs.LG) [pdf, other]
Title: Private Alternating Least Squares: Practical Private Matrix Completion with Tighter Rates
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[257]  arXiv:2107.09830 (cross-list from cs.IT) [pdf, ps, other]
Title: On the Modulus in Matching Vector Codes
Comments: The Computer Journal
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[258]  arXiv:2107.09886 (cross-list from cs.DB) [pdf, other]
Title: Understanding the Scalability of Hyperledger Fabric
Comments: 10 pages, BCDL 2019 in conjunction with ACM VLDB. Los Angeles, USA, 26-30 Aug 2019
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[259]  arXiv:2107.09898 (cross-list from cs.LG) [pdf, other]
Title: Defending against Reconstruction Attack in Vertical Federated Learning
Comments: Accepted to International Workshop on Federated Learning for User Privacy and Data Confidentiality in Conjunction with ICML 2021 (FL-ICML'21)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[260]  arXiv:2107.09937 (cross-list from cs.LG) [pdf, other]
Title: Fast and Scalable Adversarial Training of Kernel SVM via Doubly Stochastic Gradients
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[261]  arXiv:2107.10457 (cross-list from cs.LG) [pdf, other]
Title: Ready for Emerging Threats to Recommender Systems? A Graph Convolution-based Generative Shilling Attack
Comments: 16 pages, 21 figures, Information Sciences - Journal - Elsevier
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Social and Information Networks (cs.SI)
[262]  arXiv:2107.10480 (cross-list from cs.LG) [pdf, other]
Title: Unsupervised Detection of Adversarial Examples with Model Explanations
Authors: Gihyuk Ko, Gyumin Lim
Comments: AdvML@KDD'21
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[263]  arXiv:2107.10599 (cross-list from cs.LG) [pdf, other]
Title: Towards Explaining Adversarial Examples Phenomenon in Artificial Neural Networks
Comments: submitted to 25th International Conference on Pattern Recognition (ICPR)
Journal-ref: In 2020 25th International Conference on Pattern Recognition (ICPR)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[264]  arXiv:2107.10873 (cross-list from cs.LG) [pdf, other]
Title: On the Certified Robustness for Ensemble Models and Beyond
Comments: ICLR 2022. 51 pages, 10 pages for main text. Forum and code: this https URL
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[265]  arXiv:2107.10881 (cross-list from cs.DC) [pdf, other]
Title: Layer 2 Blockchain Scaling: a Survey
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[266]  arXiv:2107.11136 (cross-list from cs.LG) [pdf, other]
Title: High Dimensional Differentially Private Stochastic Optimization with Heavy-tailed Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[267]  arXiv:2107.11205 (cross-list from cs.CC) [pdf, other]
Title: On Boolean Functions with Low Polynomial Degree and Higher Order Sensitivity
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[268]  arXiv:2107.11526 (cross-list from cs.LG) [pdf, ps, other]
Title: On the Sample Complexity of Privately Learning Axis-Aligned Rectangles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[269]  arXiv:2107.11592 (cross-list from cs.DB) [pdf, other]
Title: Blockchain Transaction Processing
Journal-ref: Encyclopedia of Big Data Technologies 2019
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[270]  arXiv:2107.11630 (cross-list from cs.LG) [pdf, other]
Title: Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them
Authors: Florian Tramèr
Comments: ICML 2022 (Long Talk)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[271]  arXiv:2107.11671 (cross-list from cs.LG) [pdf, ps, other]
Title: Adversarial training may be a double-edged sword
Comments: Presented as a RobustML workshop paper at ICLR 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[272]  arXiv:2107.11903 (cross-list from cs.CY) [pdf, ps, other]
Title: Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections
Comments: 16 pages
Journal-ref: Electronic Voting, E-Vote-ID 2021, Lecture Notes in Computer Science 12900 (2021) 47-62
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[273]  arXiv:2107.12342 (cross-list from cs.LG) [pdf, other]
Title: Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning
Comments: Accepted to PPML (ACM CCS) 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[274]  arXiv:2107.12473 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Attacks with Time-Scale Representations
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[275]  arXiv:2107.12490 (cross-list from cs.LG) [pdf, other]
Title: LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[ total of 299 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-275 | 276-299 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)