We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 250

[ total of 395 entries: 1-10 | ... | 221-230 | 231-240 | 241-250 | 251-260 | 261-270 | 271-280 | 281-290 | ... | 391-395 ]
[ showing 10 entries per page: fewer | more | all ]
[251]  arXiv:2205.01714 (cross-list from cs.CL) [pdf, other]
Title: Don't sweat the small stuff, classify the rest: Sample Shielding to protect text classifiers against adversarial attacks
Comments: 9 pages, 8 figures, Accepted to NAACL 2022
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252]  arXiv:2205.01772 (cross-list from cs.CV) [pdf, other]
Title: The Brazilian Data at Risk in the Age of AI?
Comments: 8 pages in Portuguese and 5 figures, Top 3 among the best papers at the ENIAC 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[253]  arXiv:2205.01797 (cross-list from cs.NI) [pdf, other]
Title: Coded Transaction Broadcasting for High-throughput Blockchains
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[254]  arXiv:2205.01863 (cross-list from cs.CL) [pdf, other]
Title: Provably Confidential Language Modelling
Comments: NAACL 2022
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[255]  arXiv:2205.01950 (cross-list from cs.LG) [pdf, other]
Title: Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation
Comments: Paper accepted at the 2022 IEEE International Joint Conference on Neural Networks (IJCNN)
Journal-ref: 2022 International Joint Conference on Neural Networks (IJCNN)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[256]  arXiv:2205.01992 (cross-list from cs.LG) [pdf, other]
Title: Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Comments: 35 pages, Accepted at ACM Computing Surveys
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[257]  arXiv:2205.02466 (cross-list from cs.LG) [pdf, other]
Title: Optimal Algorithms for Mean Estimation under Local Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[258]  arXiv:2205.02511 (cross-list from cs.CV) [pdf, other]
Title: One Picture is Worth a Thousand Words: A New Wallet Recovery Process
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[259]  arXiv:2205.02652 (cross-list from cs.LG) [pdf, other]
Title: Can collaborative learning be private, robust and scalable?
Comments: Accepted at MICCAI DeCaF 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[260]  arXiv:2205.02741 (cross-list from cs.LG) [pdf, ps, other]
Title: CE-based white-box adversarial attacks will not work using super-fitting
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 395 entries: 1-10 | ... | 221-230 | 231-240 | 241-250 | 251-260 | 261-270 | 271-280 | 281-290 | ... | 391-395 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)