We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 275

[ total of 395 entries: 1-10 | ... | 246-255 | 256-265 | 266-275 | 276-285 | 286-295 | 296-305 | 306-315 | ... | 386-395 ]
[ showing 10 entries per page: fewer | more | all ]
[276]  arXiv:2205.05866 (cross-list from cs.CY) [pdf, ps, other]
Title: Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments
Comments: Presented at 17th Midwest Association for Information Systems Conference (MWAIS 2022)At: Omaha, NE, USA
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[277]  arXiv:2205.06039 (cross-list from cs.LO) [pdf, other]
Title: Reactive Synthesis of Smart Contract Control Flows
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[278]  arXiv:2205.06073 (cross-list from cs.IT) [pdf, ps, other]
Title: Consensus Capacity of Noisy Broadcast Channels
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[279]  arXiv:2205.06117 (cross-list from cs.LG) [pdf, other]
Title: Secure Aggregation for Federated Learning in Flower
Comments: Accepted to appear in the 2nd International Workshop on Distributed Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[280]  arXiv:2205.06200 (cross-list from cs.HC) [pdf, other]
Title: Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot
Comments: Accepted paper at the 2022 International Conference on Evaluation and Assessment in Software Engineering (EASE)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[281]  arXiv:2205.06369 (cross-list from cs.LG) [pdf, other]
Title: How to Combine Membership-Inference Attacks on Multiple Updated Models
Comments: 31 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[282]  arXiv:2205.06469 (cross-list from cs.LG) [pdf, other]
Title: l-Leaks: Membership Inference Attacks with Logits
Comments: 10pages,6figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[283]  arXiv:2205.06716 (cross-list from cs.LG) [pdf, other]
Title: A Vision Inspired Neural Network for Unsupervised Anomaly Detection in Unordered Data
Authors: Nassir Mohammad
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[284]  arXiv:2205.06765 (cross-list from cs.LG) [pdf, other]
Title: EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2205.06900 (cross-list from cs.LG) [pdf, other]
Title: MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 395 entries: 1-10 | ... | 246-255 | 256-265 | 266-275 | 276-285 | 286-295 | 296-305 | 306-315 | ... | 386-395 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)