We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2022, skipping first 300

[ total of 333 entries: 1-25 | ... | 226-250 | 251-275 | 276-300 | 301-325 | 326-333 ]
[ showing 25 entries per page: fewer | more | all ]
[301]  arXiv:2201.11297 (cross-list from cs.DS) [pdf, other]
Title: Generation Matrix: An Embeddable Matrix Representation for Hierarchical Trees
Comments: 25 pages, 10 figures
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[302]  arXiv:2201.11303 (cross-list from cs.SE) [pdf, ps, other]
Title: Mutation Analysis: Answering the Fuzzing Challenge
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[303]  arXiv:2201.11370 (cross-list from cs.NI) [pdf, other]
Title: An IoT Blockchain Architecture Using Oracles and Smart Contracts: the Use-Case of a Food Supply Chain
Comments: This paper has been accepted for publication by IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). The final version will be published by the IEEE
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[304]  arXiv:2201.11670 (cross-list from cs.IT) [pdf, ps, other]
Title: Strong Converse Theorem for Source Encryption under Side-Channel Attacks
Comments: 9 pages, 6 figures. The short version of this paper was submitted to ISIT2022, arXiv admin note: text overlap with arXiv:1801.02563, arXiv:2102.06363
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[305]  arXiv:2201.12018 (cross-list from cs.LG) [pdf, other]
Title: Transfer Learning In Differential Privacy's Hybrid-Model
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[306]  arXiv:2201.12211 (cross-list from cs.LG) [pdf, other]
Title: Backdoors Stuck At The Frontdoor: Multi-Agent Backdoor Attacks That Backfire
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[307]  arXiv:2201.12306 (cross-list from cs.DS) [pdf, other]
Title: Statistical anonymity: Quantifying reidentification risks without reidentifying users
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Databases (cs.DB); Computation (stat.CO)
[308]  arXiv:2201.12327 (cross-list from cs.IT) [pdf, ps, other]
Title: Communication Cost of Two-Database Symmetric Private Information Retrieval: A Conditional Disclosure of Multiple Secrets Perspective
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Databases (cs.DB); Signal Processing (eess.SP)
[309]  arXiv:2201.12347 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness in Deep Learning: Attacks on Fragile Neurons
Journal-ref: Artificial Neural Networks and Machine Learning ICANN 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[310]  arXiv:2201.12383 (cross-list from cs.LG) [pdf, other]
Title: Bounding Training Data Reconstruction in Private (Deep) Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[311]  arXiv:2201.12406 (cross-list from cs.LG) [pdf, other]
Title: Syfer: Neural Obfuscation for Private Data Release
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[312]  arXiv:2201.12648 (cross-list from cs.LG) [pdf, other]
Title: Private Boosted Decision Trees via Smooth Re-Weighting
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[313]  arXiv:2201.12666 (cross-list from cs.LG) [pdf, other]
Title: Challenges and approaches to privacy preserving post-click conversion prediction
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[314]  arXiv:2201.12675 (cross-list from cs.LG) [pdf, other]
Title: Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models
Comments: First two authors contributed equally. Order chosen by coin flip. Published at ICLR 2023. Implementation available at github.com/JonasGeiping/breaching
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[315]  arXiv:2201.12686 (cross-list from cs.IR) [pdf, other]
Title: Rank List Sensitivity of Recommender Systems to Interaction Perturbations
Comments: Accepted for publication at: 31st ACM International Conference on Information and Knowledge Management (CIKM 2022). Code and data at: this https URL
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[316]  arXiv:2201.12700 (cross-list from cs.LG) [pdf, other]
Title: Coordinated Attacks against Contextual Bandits: Fundamental Limits and Defense Mechanisms
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[317]  arXiv:2201.12705 (cross-list from cs.CV) [pdf, ps, other]
Title: A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[318]  arXiv:2201.13108 (cross-list from cs.IT) [pdf, other]
Title: MDS multi-twisted Reed-Solomon codes with small dimensional hull
Comments: 19 pages
Journal-ref: Published in Cryptography and Communications (2023)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Commutative Algebra (math.AC)
[319]  arXiv:2201.13178 (cross-list from cs.CV) [pdf, other]
Title: Few-Shot Backdoor Attacks on Visual Object Tracking
Comments: This work is accepted by the ICLR 2022. The first two authors contributed equally to this work. In this version, we fix some typos and errors contained in the last one. 21 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[320]  arXiv:2201.13329 (cross-list from cs.LG) [pdf, other]
Title: Can Adversarial Training Be Manipulated By Non-Robust Features?
Comments: NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[321]  arXiv:2201.13376 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Top-k Selection via Canonical Lipschitz Mechanism
Comments: 22 pages, 10 figures, 1 table
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[322]  arXiv:2201.00402 (cross-list from math.OC) [pdf, other]
Title: A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs
Subjects: Optimization and Control (math.OC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[323]  arXiv:2201.01805 (cross-list from math.RT) [pdf, other]
Title: Monoidal categories, representation gap and cryptography
Comments: 52 pages, many figures, revised version, comments welcome
Journal-ref: Trans. Amer. Math. Soc. Ser. B 11 (2024), 329-395
Subjects: Representation Theory (math.RT); Cryptography and Security (cs.CR); Group Theory (math.GR); Quantum Algebra (math.QA)
[324]  arXiv:2201.02707 (cross-list from stat.ME) [pdf, ps, other]
Title: ALPHA: Audit that Learns from Previously Hand-Audited Ballots
Authors: Philip B. Stark
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[325]  arXiv:2201.03321 (cross-list from eess.AS) [pdf, other]
Title: A Practical Guide to Logical Access Voice Presentation Attack Detection
Comments: This work will appear as one chapter for a new book called Frontiers in Fake Media Generation and Detection, edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi. The code for this chapter is available in this https URL
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[ total of 333 entries: 1-25 | ... | 226-250 | 251-275 | 276-300 | 301-325 | 326-333 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)