We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 275

[ total of 395 entries: 1-100 | 76-175 | 176-275 | 276-375 | 376-395 ]
[ showing 100 entries per page: fewer | more | all ]
[276]  arXiv:2205.05866 (cross-list from cs.CY) [pdf, ps, other]
Title: Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments
Comments: Presented at 17th Midwest Association for Information Systems Conference (MWAIS 2022)At: Omaha, NE, USA
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[277]  arXiv:2205.06039 (cross-list from cs.LO) [pdf, other]
Title: Reactive Synthesis of Smart Contract Control Flows
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[278]  arXiv:2205.06073 (cross-list from cs.IT) [pdf, ps, other]
Title: Consensus Capacity of Noisy Broadcast Channels
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[279]  arXiv:2205.06117 (cross-list from cs.LG) [pdf, other]
Title: Secure Aggregation for Federated Learning in Flower
Comments: Accepted to appear in the 2nd International Workshop on Distributed Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[280]  arXiv:2205.06200 (cross-list from cs.HC) [pdf, other]
Title: Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot
Comments: Accepted paper at the 2022 International Conference on Evaluation and Assessment in Software Engineering (EASE)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[281]  arXiv:2205.06369 (cross-list from cs.LG) [pdf, other]
Title: How to Combine Membership-Inference Attacks on Multiple Updated Models
Comments: 31 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[282]  arXiv:2205.06469 (cross-list from cs.LG) [pdf, other]
Title: l-Leaks: Membership Inference Attacks with Logits
Comments: 10pages,6figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[283]  arXiv:2205.06716 (cross-list from cs.LG) [pdf, other]
Title: A Vision Inspired Neural Network for Unsupervised Anomaly Detection in Unordered Data
Authors: Nassir Mohammad
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[284]  arXiv:2205.06765 (cross-list from cs.LG) [pdf, other]
Title: EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2205.06900 (cross-list from cs.LG) [pdf, other]
Title: MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[286]  arXiv:2205.06937 (cross-list from cs.HC) [pdf, ps, other]
Title: Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption
Comments: 41 pages, including the stage algorithm programmed on Mturk, the survey flow and specific items used, and a link to download the five informational handouts used for the control condition and the 2FA intervention conditions
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[287]  arXiv:2205.07060 (cross-list from cs.AI) [pdf, other]
Title: GAN-Aimbots: Using Machine Learning for Cheating in First Person Shooters
Comments: Accepted to IEEE Transactions on Games. Source code available at this https URL
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[288]  arXiv:2205.07073 (cross-list from cs.CV) [pdf, other]
Title: An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[289]  arXiv:2205.07109 (cross-list from cs.LG) [pdf, other]
Title: Unsupervised Abnormal Traffic Detection through Topological Flow Analysis
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[290]  arXiv:2205.07123 (cross-list from cs.CL) [pdf, other]
Title: The VoicePrivacy 2020 Challenge Evaluation Plan
Comments: arXiv admin note: text overlap with arXiv:2203.12468
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[291]  arXiv:2205.07228 (cross-list from cs.SE) [pdf, other]
Title: Automation Slicing and Testing for in-App Deep Learning Models
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[292]  arXiv:2205.07460 (cross-list from cs.LG) [pdf, other]
Title: Diffusion Models for Adversarial Purification
Comments: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[293]  arXiv:2205.07502 (cross-list from cs.AI) [pdf, other]
Title: KGRGRL: A User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning
Comments: 8 pages, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[294]  arXiv:2205.07626 (cross-list from cs.LG) [pdf, other]
Title: Attacking and Defending Deep Reinforcement Learning Policies
Authors: Chao Wang
Comments: nine pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[295]  arXiv:2205.07711 (cross-list from cs.SD) [pdf, other]
Title: Transferability of Adversarial Attacks on Synthetic Speech Detection
Comments: 5 pages, submit to Interspeech2022
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[296]  arXiv:2205.07828 (cross-list from cs.IT) [pdf, ps, other]
Title: Digital Blind Box: Random Symmetric Private Information Retrieval
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Databases (cs.DB); Signal Processing (eess.SP)
[297]  arXiv:2205.07859 (cross-list from cs.LG) [pdf, other]
Title: Btech thesis report on adversarial attack detection and purification of adverserially attacked images
Authors: Dvij Kalaria
Comments: Btech thesis report of Dvij Kalaria, Indian Institute of Technology Kharagpur. arXiv admin note: substantial text overlap with arXiv:2111.15518; substantial text overlap with arXiv:1911.05268 by other authors
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[298]  arXiv:2205.07864 (cross-list from cs.LG) [pdf, other]
Title: Privacy Enhancement for Cloud-Based Few-Shot Learning
Comments: 14 pages, 13 figures, 3 tables. Preprint. Accepted in IEEE WCCI 2022 International Joint Conference on Neural Networks (IJCNN)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[299]  arXiv:2205.07890 (cross-list from cs.LG) [pdf, other]
Title: On the Difficulty of Defending Self-Supervised Learning against Model Extraction
Comments: Accepted at ICML 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[300]  arXiv:2205.08397 (cross-list from cs.DS) [pdf, other]
Title: Improved Utility Analysis of Private CountSketch
Comments: To appear at NeurIPS 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[301]  arXiv:2205.08512 (cross-list from cs.ET) [pdf, other]
Title: Experimental evaluation of digitally-verifiable photonic computing for blockchain and cryptocurrency
Comments: 17 pages, 7 figures
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR); Optics (physics.optics)
[302]  arXiv:2205.08514 (cross-list from cs.CL) [pdf, other]
Title: Recovering Private Text in Federated Learning of Language Models
Comments: NeurIPS 2022. Code is publicly available at this https URL v2 added discussion and evaluation of defenses
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[303]  arXiv:2205.08532 (cross-list from cs.DS) [pdf, ps, other]
Title: New Lower Bounds for Private Estimation and a Generalized Fingerprinting Lemma
Comments: NeurIPS 2022. Minor correction to the discussion of independent work
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[304]  arXiv:2205.08641 (cross-list from cs.NI) [pdf, other]
Title: An Integrated Approach for Energy Efficient Handover and Key Distribution Protocol for Secure NC-enabled Small Cells
Comments: Preprint of the paper accepted at Computer Networks
Journal-ref: Computer Networks, 206 (2022), p. 108806
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[305]  arXiv:2205.08650 (cross-list from eess.SY) [pdf, other]
Title: A Framework for Checkpointing and Recovery of Hierarchical Cyber-Physical Systems
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[306]  arXiv:2205.08782 (cross-list from cs.IT) [pdf, ps, other]
Title: Secure Coding via Gaussian Random Fields
Comments: Accepted for presentation in 2022 IEEE International Symposium on Information Theory (ISIT), 6 pages, 2 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[307]  arXiv:2205.08886 (cross-list from cs.LG) [pdf, other]
Title: GeoPointGAN: Synthetic Spatial Data with Local Label Differential Privacy
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Databases (cs.DB)
[308]  arXiv:2205.08989 (cross-list from cs.LG) [pdf, other]
Title: Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[309]  arXiv:2205.09036 (cross-list from cs.CY) [pdf, other]
Title: Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates
Journal-ref: ACM Conference on Fairness, Accountability, and Transparency, 2022
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[310]  arXiv:2205.09624 (cross-list from cs.LG) [pdf, other]
Title: Focused Adversarial Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE)
[311]  arXiv:2205.10120 (cross-list from cs.CV) [pdf, other]
Title: Privacy Preserving Image Registration
Comments: v4 Accepted at Medical Image Computing and Computer Assisted Intervention (2022) 130-140
Journal-ref: Medical Image Analysis Medical Image Analysis, Volume 94, May 2024, 103129
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[312]  arXiv:2205.10228 (cross-list from cs.CL) [pdf, other]
Title: You Don't Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers' Private Personas
Comments: Conference paper accepted by NAACL 2022
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[313]  arXiv:2205.10364 (cross-list from cs.LG) [pdf, other]
Title: Learning to Reverse DNNs from AI Programs Automatically
Comments: This paper is accepted by IJCAI 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[314]  arXiv:2205.10552 (cross-list from cs.IT) [pdf, other]
Title: Smoothing Codes and Lattices: Systematic Study and New Bounds
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[315]  arXiv:2205.10821 (cross-list from cs.IT) [pdf, other]
Title: Information Leakage in Index Coding
Comments: Published in Proceedings of IEEE Information Theory Workshop (ITW) 2021
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[316]  arXiv:2205.10827 (cross-list from cs.IT) [pdf, other]
Title: Information Leakage in Index Coding With Sensitive and Non-Sensitive Messages
Comments: Accepted by IEEE International Symposium on Information Theory (ISIT) 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[317]  arXiv:2205.10929 (cross-list from cs.OS) [pdf, other]
Title: rgpdOS: GDPR Enforcement By The Operating System
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[318]  arXiv:2205.11156 (cross-list from cs.LG) [pdf, other]
Title: Squeeze Training for Adversarial Robustness
Comments: Accepted by ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[319]  arXiv:2205.11212 (cross-list from cs.DC) [pdf, other]
Title: CircleChain: Tokenizing Products with a Role-based Scheme for a Circular Economy
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[320]  arXiv:2205.11242 (cross-list from cs.CV) [pdf, other]
Title: Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[321]  arXiv:2205.11406 (cross-list from cs.SE) [pdf, other]
Title: A Model-Driven-Engineering Approach for Detecting Privilege Escalation in IoT Systems
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[322]  arXiv:2205.11418 (cross-list from cs.IT) [pdf, ps, other]
Title: On non-monomial APcN permutations over finite fields of even characteristic
Comments: We made a revised version, where Sec 4 was revised as follows: G_alp(x) is newly introduced and Theorem 4.12 is added
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[323]  arXiv:2205.11584 (cross-list from cs.LG) [pdf, other]
Title: PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[324]  arXiv:2205.11736 (cross-list from cs.LG) [pdf, other]
Title: Towards a Defense Against Federated Backdoor Attacks Under Continuous Training
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[325]  arXiv:2205.11765 (cross-list from cs.LG) [pdf, ps, other]
Title: Byzantine-Robust Federated Learning with Optimal Statistical Rates and Privacy Guarantees
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[326]  arXiv:2205.11819 (cross-list from cs.LG) [pdf, other]
Title: Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[327]  arXiv:2205.12134 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Comments: accepted by NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[328]  arXiv:2205.12260 (cross-list from cs.CY) [pdf, other]
Title: Releasing survey microdata with exact cluster locations and additional privacy safeguards
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Applications (stat.AP); Methodology (stat.ME)
[329]  arXiv:2205.12331 (cross-list from cs.LG) [pdf, other]
Title: Certified Robustness Against Natural Language Attacks by Causal Intervention
Journal-ref: International Conference on Machine International Conference on Machine Learning, Baltimore, Maryland, USA, PMLR 162, 2022
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[330]  arXiv:2205.12412 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private AUC Computation in Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[331]  arXiv:2205.12430 (cross-list from cs.LG) [pdf, ps, other]
Title: Additive Logistic Mechanism for Privacy-Preserving Self-Supervised Learning
Comments: 15 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[332]  arXiv:2205.12543 (cross-list from cs.CV) [pdf, other]
Title: Misleading Deep-Fake Detection with GAN Fingerprints
Comments: In IEEE Deep Learning and Security Workshop (DLS) 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[333]  arXiv:2205.12551 (cross-list from cs.CV) [pdf, other]
Title: Masked Jigsaw Puzzle: A Versatile Position Embedding for Vision Transformers
Comments: Accepted to CVPR2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[334]  arXiv:2205.12628 (cross-list from cs.CL) [pdf, other]
Title: Are Large Pre-Trained Language Models Leaking Your Personal Information?
Comments: Accepted to Findings of EMNLP 2022
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[335]  arXiv:2205.12738 (cross-list from cs.IT) [pdf, ps, other]
Title: Generic Decoding in the Cover Metric
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[336]  arXiv:2205.12903 (cross-list from cs.IT) [pdf, ps, other]
Title: Information Set Decoding for Lee-Metric Codes using Restricted Balls
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[337]  arXiv:2205.13196 (cross-list from cs.CY) [pdf, other]
Title: The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act
Comments: 23 pages, 2 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[338]  arXiv:2205.13253 (cross-list from cs.CV) [pdf, other]
Title: MALICE: Manipulation Attacks on Learned Image ComprEssion
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[339]  arXiv:2205.13256 (cross-list from cs.CY) [pdf, other]
Title: A DLT enabled smart mask system to enable social compliance
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[340]  arXiv:2205.13383 (cross-list from cs.CV) [pdf, other]
Title: BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[341]  arXiv:2205.13412 (cross-list from cs.CV) [pdf, other]
Title: Physical-World Optical Adversarial Attacks on 3D Face Recognition
Comments: Submitted to CVPR 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[342]  arXiv:2205.13559 (cross-list from cs.AR) [pdf, other]
Title: HashPIM: High-Throughput SHA-3 via Memristive Digital Processing-in-Memory
Comments: Accepted to International Conference on Modern Circuits and Systems Technologies (MOCAST) 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[343]  arXiv:2205.13578 (cross-list from cs.LG) [pdf, other]
Title: Dynamic Network Reconfiguration for Entropy Maximization using Deep Reinforcement Learning
Comments: 10 pages, 6 figures, 1 appendix
Journal-ref: Proceedings of the First Learning on Graphs Conference (LoG 2022), PMLR 198:49:1-49:15
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Physics and Society (physics.soc-ph)
[344]  arXiv:2205.13613 (cross-list from cs.LG) [pdf, other]
Title: Circumventing Backdoor Defenses That Are Based on Latent Separability
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[345]  arXiv:2205.13616 (cross-list from cs.LG) [pdf, other]
Title: Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
Comments: USENIX Security 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[346]  arXiv:2205.13618 (cross-list from cs.CV) [pdf, other]
Title: Phantom Sponges: Exploiting Non-Maximum Suppression to Attack Deep Object Detectors
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[347]  arXiv:2205.13709 (cross-list from cs.LG) [pdf, other]
Title: DP-PCA: Statistically Optimal and Differentially Private PCA
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Statistics Theory (math.ST); Machine Learning (stat.ML)
[348]  arXiv:2205.13710 (cross-list from cs.LG) [pdf, other]
Title: Privacy of Noisy Stochastic Gradient Descent: More Iterations without More Privacy Loss
Comments: v2: improved exposition, slightly simplified proofs, all results unchanged
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[349]  arXiv:2205.13807 (cross-list from cs.LG) [pdf, other]
Title: fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems
Comments: To appear at the 2022 International Joint Conference on Neural Networks (IJCNN), at the 2022 IEEE World Congress on Computational Intelligence (WCCI), July 2022, Padua, Italy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[350]  arXiv:2205.13909 (cross-list from cs.LG) [pdf, other]
Title: (De-)Randomized Smoothing for Decision Stump Ensembles
Comments: NeurIPS 2022 Paper
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[351]  arXiv:2205.13941 (cross-list from cs.LG) [pdf, other]
Title: Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence
Comments: Code at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[352]  arXiv:2205.13981 (cross-list from cs.IT) [pdf, ps, other]
Title: $\mathbb{Z}_p\mathbb{Z}_{p^2}$-linear codes: rank and kernel
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[353]  arXiv:2205.14068 (cross-list from cs.IT) [pdf, other]
Title: Interleaved Prange: A New Generic Decoder for Interleaved Codes
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[354]  arXiv:2205.14298 (cross-list from cs.LG) [pdf, other]
Title: MC-GEN:Multi-level Clustering for Private Synthetic Data Generation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[355]  arXiv:2205.14592 (cross-list from cs.LG) [pdf, other]
Title: GBC: An Efficient and Adaptive Clustering Algorithm Based on Granular-Ball
Comments: 5 pages, 1 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[356]  arXiv:2205.14601 (cross-list from cs.CY) [pdf, ps, other]
Title: YASM (Yet Another Surveillance Mechanism)
Comments: 16 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[357]  arXiv:2205.14694 (cross-list from cs.LG) [pdf, other]
Title: Learning Security Strategies through Game Play and Optimal Stopping
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[358]  arXiv:2205.14758 (cross-list from cs.GT) [pdf, other]
Title: Credible, Strategyproof, Optimal, and Bounded Expected-Round Single-Item Auctions for all Distributions
Comments: 22 Pages
Journal-ref: ITCS 2022: 13th Innovations in Theoretical Computer Science Conference, 2022
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Econometrics (econ.EM)
[359]  arXiv:2205.14772 (cross-list from cs.AI) [pdf, other]
Title: Unfooling Perturbation-Based Post Hoc Explainers
Comments: Accepted to AAAI-23. See the companion blog post at this https URL 9 pages (not including references and supplemental)
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[360]  arXiv:2205.14842 (cross-list from cs.LG) [pdf, other]
Title: Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning
Comments: Accepted by TMLR
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[361]  arXiv:2205.14964 (cross-list from cs.SE) [pdf, other]
Title: Effectiveness and Scalability of Fuzzing Techniques in CI/CD Pipelines
Comments: 12 pages, 5 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[362]  arXiv:2205.15128 (cross-list from cs.LG) [pdf, other]
Title: Level Up with RealAEs: Leveraging Domain Constraints in Feature Space to Strengthen Robustness of Android Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[363]  arXiv:2205.15564 (cross-list from cs.LG) [pdf, other]
Title: Secure Federated Clustering
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[364]  arXiv:2205.15592 (cross-list from cs.LG) [pdf, ps, other]
Title: Semantic Autoencoder and Its Potential Usage for Adversarial Attack
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[365]  arXiv:2205.15757 (cross-list from cs.DC) [pdf, other]
Title: Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[366]  arXiv:2205.15896 (cross-list from cs.DC) [pdf, other]
Title: FedWalk: Communication Efficient Federated Unsupervised Node Embedding with Differential Privacy
Authors: Qiying Pan (1), Yifei Zhu (1) ((1) Shanghai Jiao Tong University)
Comments: 10 pages, 8 figures, to be published in the Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[367]  arXiv:2205.15970 (cross-list from cs.LG) [pdf, other]
Title: FedHarmony: Unlearning Scanner Bias with Distributed Data
Comments: Accepted to MICCAI 2022, Code available at: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[368]  arXiv:2205.15992 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Federated Submodel Learning with Sparsification
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[369]  arXiv:2205.00135 (cross-list from math.NT) [pdf, other]
Title: Failing to hash into supersingular isogeny graphs
Comments: 33 pages, 7 figures
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[370]  arXiv:2205.00615 (cross-list from quant-ph) [pdf, other]
Title: Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system
Comments: Our protocol has been renamed Distributed Symmetric Key Exchange (DSKE). 11 pages, 6 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[371]  arXiv:2205.01528 (cross-list from eess.AS) [pdf, other]
Title: Attentive activation function for improving end-to-end spoofing countermeasure systems
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[372]  arXiv:2205.01552 (cross-list from eess.SP) [pdf, ps, other]
Title: Physical Layer Security for 6G Systems why it is needed and how to make it happen
Authors: Arsenia Chorti
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[373]  arXiv:2205.03174 (cross-list from quant-ph) [pdf, other]
Title: Analysis of Multiple Overlapping Paths algorithms for Secure Key Exchange in Large-Scale Quantum Networks
Comments: 18 pages, 12 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[374]  arXiv:2205.03976 (cross-list from math.NT) [pdf, other]
Title: Orientations and cycles in supersingular isogeny graphs
Comments: 41 pages, 7 figures
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[375]  arXiv:2205.04220 (cross-list from quant-ph) [pdf, other]
Title: On recovering block cipher secret keys in the cold boot attack setting
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 395 entries: 1-100 | 76-175 | 176-275 | 276-375 | 376-395 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)