We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2022, skipping first 250

[ total of 333 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | 326-333 ]
[ showing 25 entries per page: fewer | more | all ]
[251]  arXiv:2201.02993 (cross-list from cs.CL) [pdf, other]
Title: Rethink the Evaluation for Attack Strength of Backdoor Attacks in Natural Language Processing
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252]  arXiv:2201.03004 (cross-list from cs.LG) [pdf, other]
Title: Privacy-aware Early Detection of COVID-19 through Adversarial Training
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[253]  arXiv:2201.03041 (cross-list from cs.DS) [pdf, ps, other]
Title: Locality-Preserving Hashing for Shifts with Connections to Cryptography
Journal-ref: ITCS 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[254]  arXiv:2201.03045 (cross-list from cs.CV) [pdf, other]
Title: Applying Artificial Intelligence for Age Estimation in Digital Forensic Investigations
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[255]  arXiv:2201.03052 (cross-list from cs.HC) [pdf, ps, other]
Title: Measuring User Perceived Security of Mobile Banking Applications
Comments: NA
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[256]  arXiv:2201.03080 (cross-list from cs.CV) [pdf, other]
Title: The State of Aerial Surveillance: A Survey
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[257]  arXiv:2201.03139 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Generative Adversarial Networks with Model Inversion
Comments: Best Student Paper Award of 13th IEEE International Workshop on Information Forensics and Security (WIFS 2021), Montpellier, France
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[258]  arXiv:2201.03201 (cross-list from cs.CY) [pdf, other]
Title: Fusing Blockchain and AI with Metaverse: A Survey
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[259]  arXiv:2201.03204 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private $\ell_1$-norm Linear Regression with Heavy-tailed Data
Authors: Di Wang, Jinhui Xu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[260]  arXiv:2201.03330 (cross-list from cs.SI) [pdf, ps, other]
Title: Social Media Networks Attacks and their Preventive Mechanisms: A Review
Comments: 14 pages
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[261]  arXiv:2201.03380 (cross-list from cs.DS) [pdf, other]
Title: Bounded Space Differentially Private Quantiles
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Databases (cs.DB)
[262]  arXiv:2201.03869 (cross-list from cs.LG) [pdf, other]
Title: Dictionary Learning with Uniform Sparse Representations for Anomaly Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[263]  arXiv:2201.03948 (cross-list from cs.IT) [pdf, other]
Title: Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints
Authors: Onur Günlü
Comments: Appeared in the Entropy journal
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR)
[264]  arXiv:2201.03968 (cross-list from cs.GT) [pdf, other]
Title: Optimal and Differentially Private Data Acquisition: Central and Local Mechanisms
Comments: To appear in the Operations Research journal. The abstract appeared in the Proceedings of the 23rd ACM Conference on Economics and Computation (EC 2022)
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[265]  arXiv:2201.04266 (cross-list from cs.GT) [pdf, ps, other]
Title: Safe Equilibrium
Authors: Sam Ganzfried
Subjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Theoretical Economics (econ.TH)
[266]  arXiv:2201.05057 (cross-list from cs.CV) [pdf, other]
Title: On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles
Comments: 13 pages, 13 figures, accepted by CVPR 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[267]  arXiv:2201.05286 (cross-list from cs.LG) [pdf, other]
Title: Demystifying Swarm Learning: A New Paradigm of Blockchain-based Decentralized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[268]  arXiv:2201.05819 (cross-list from cs.LG) [pdf, other]
Title: Interpretable and Effective Reinforcement Learning for Attacking against Graph-based Rumor Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[269]  arXiv:2201.06187 (cross-list from cs.NI) [pdf, other]
Title: Understanding the Decentralization of DPoS: Perspectives From Data-Driven Analysis on EOSIO
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[270]  arXiv:2201.06244 (cross-list from cs.LG) [pdf, other]
Title: EFMVFL: An Efficient and Flexible Multi-party Vertical Federated Learning without a Third Party
Comments: 9pages,2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[271]  arXiv:2201.07063 (cross-list from cs.LG) [pdf, other]
Title: How to Backdoor HyperNetwork in Personalized Federated Learning?
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[272]  arXiv:2201.07206 (cross-list from cs.LG) [pdf, other]
Title: Minimax Optimality (Probably) Doesn't Imply Distribution Learning for GANs
Comments: 32 pages, 1 figure
Subjects: Machine Learning (cs.LG); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[273]  arXiv:2201.07287 (cross-list from cs.IT) [pdf, other]
Title: Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems
Comments: 9 pages, 4 figures, 2 tables, To appear in IEEE International Symposium on Information Theory (ISIT) 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[274]  arXiv:2201.07352 (cross-list from cs.NI) [pdf, other]
Title: Analyzing Enterprise DNS Traffic to Classify Assets and Track Cyber-Health
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Journal-ref: IEEE Transactions on Network and Service Management, 2023
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[275]  arXiv:2201.07519 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Aware Human Mobility Prediction via Adversarial Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 333 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | 326-333 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)