We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Nov 2021, skipping first 255

[ total of 338 entries: 1-25 | ... | 181-205 | 206-230 | 231-255 | 256-280 | 281-305 | 306-330 | 331-338 ]
[ showing 25 entries per page: fewer | more | all ]
[256]  arXiv:2111.03777 (cross-list from cs.CL) [pdf, other]
Title: Privacy attacks for automatic speech recognition acoustic models in a federated learning framework
Comments: Submitted to ICASSP 2022
Journal-ref: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, pp. 6972-6976
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[257]  arXiv:2111.04089 (cross-list from cs.DS) [pdf, other]
Title: Sampling from Log-Concave Distributions with Infinity-Distance Guarantees
Comments: This is the full version of a paper which was accepted to NeurIPS 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Probability (math.PR); Machine Learning (stat.ML)
[258]  arXiv:2111.04157 (cross-list from cs.IT) [pdf, ps, other]
Title: Extractors: Low Entropy Requirements Colliding With Non-Malleability
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[259]  arXiv:2111.04314 (cross-list from cs.LG) [pdf, other]
Title: Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning
Comments: 21 pages, 12 figures, NeurIPS 2021 Datasets and Benchmarks Track
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[260]  arXiv:2111.04371 (cross-list from cs.CV) [pdf, other]
Title: Geometrically Adaptive Dictionary Attack on Face Recognition
Comments: Accepted at WACV 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[261]  arXiv:2111.04404 (cross-list from cs.LG) [pdf, other]
Title: Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[262]  arXiv:2111.04439 (cross-list from cs.CY) [pdf, other]
Title: Addressing Privacy Threats from Machine Learning
Authors: Mary Anne Smart
Comments: 3 pages. Human Centered AI Workshop @ NeurIPS 2021 accepted submission
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[263]  arXiv:2111.04550 (cross-list from cs.LG) [pdf, other]
Title: ARFED: Attack-Resistant Federated averaging based on outlier elimination
Journal-ref: Future Generation Computer Systems, Volume 141, April 2023, Pages 626-650
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[264]  arXiv:2111.04671 (cross-list from cs.CY) [pdf, other]
Title: Equity and Privacy: More Than Just a Tradeoff
Comments: 3 pages, 1 figure. Published in IEEE Security & Privacy ( Volume: 19, Issue: 6, Nov.-Dec. 2021)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[265]  arXiv:2111.04706 (cross-list from cs.LG) [pdf, other]
Title: Bayesian Framework for Gradient Leakage
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[266]  arXiv:2111.04727 (cross-list from cs.LG) [pdf, ps, other]
Title: Efficiently Learning Any One Hidden Layer ReLU Network From Queries
Comments: To appear in Advances in Neural Information Processing Systems (NeurIPS 2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[267]  arXiv:2111.04862 (cross-list from cs.CV) [pdf, other]
Title: Explaining Face Presentation Attack Detection Using Natural Language
Comments: To Appear in the Proceedings of the IEEE International Conference on Automatic Face and Gesture Recognition 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[268]  arXiv:2111.05454 (cross-list from cs.LG) [pdf, other]
Title: DP-REC: Private & Communication-Efficient Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[269]  arXiv:2111.05792 (cross-list from cs.LG) [pdf, other]
Title: HARPO: Learning to Subvert Online Behavioral Advertising
Comments: Accepted at NDSS'22
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[270]  arXiv:2111.06628 (cross-list from cs.LG) [pdf, other]
Title: Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash
Comments: Accepted by ACM FAccT 2022 as Oral
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[271]  arXiv:2111.07035 (cross-list from cs.LG) [pdf, other]
Title: Measuring the Contribution of Multiple Model Representations in Detecting Adversarial Instances
Comments: Correction: replaced "model-wise" with "unit-wise" in the first sentence of Section 3.2
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[272]  arXiv:2111.07348 (cross-list from cs.LG) [pdf, other]
Title: Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor Discovery
Comments: Machine Learning for Health (ML4H) - Extended Abstract
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[273]  arXiv:2111.07380 (cross-list from cs.LG) [pdf, other]
Title: Eluding Secure Aggregation in Federated Learning via Model Inconsistency
Comments: An abridged version of this paper appears in the proceedings of ACM Conference on Computer and Communications Security 2022 (CCS '22)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[274]  arXiv:2111.07424 (cross-list from cs.CV) [pdf, other]
Title: Generating Band-Limited Adversarial Surfaces Using Neural Networks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[275]  arXiv:2111.07492 (cross-list from cs.CV) [pdf, other]
Title: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks
Comments: Accepted at NeurIPS 2021. The missing square term in Eqn.(13), as well as many other mistakes of the previous version, have been fixed in the current version
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[276]  arXiv:2111.07970 (cross-list from cs.CL) [pdf, other]
Title: Triggerless Backdoor Attack for NLP Tasks with Clean Labels
Comments: Accepted to appear at the main conference of NAACL 2022
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[277]  arXiv:2111.08209 (cross-list from cs.HC) [pdf, other]
Title: Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda
Authors: Carolina Carreira (INESC-ID and IST, University of Lisbon, Portugal), João F. Ferreira (INESC-ID and IST, University of Lisbon, Portugal), Alexandra Mendes (HASLab, INESC TEC and Universidade da Beira Interior, Portugal), Nicolas Christin (Carnegie Mellon University, Pittsburgh, Pennsylvania, USA)
Comments: In Proceedings AppFM 2021, arXiv:2111.07538
Journal-ref: EPTCS 349, 2021, pp. 77-84
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[278]  arXiv:2111.08477 (cross-list from cs.IT) [pdf, other]
Title: On Reverse Elastic Channels and the Asymmetry of Commitment Capacity under Channel Elasticity
Comments: 16 pages, 3 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[279]  arXiv:2111.08562 (cross-list from cs.GT) [pdf, ps, other]
Title: Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System
Comments: 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)
Journal-ref: 2021 IEEE DAPPS, 2021, pp. 1-10
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[280]  arXiv:2111.08591 (cross-list from cs.LG) [pdf, other]
Title: Robustness of Bayesian Neural Networks to White-Box Adversarial Attacks
Comments: Accepted at the fourth IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE 2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 338 entries: 1-25 | ... | 181-205 | 206-230 | 231-255 | 256-280 | 281-305 | 306-330 | 331-338 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2406, contact, help  (Access key information)