We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 275

[ total of 395 entries: 1-25 | ... | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | 326-350 | 351-375 | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]
[276]  arXiv:2205.05866 (cross-list from cs.CY) [pdf]
Title: Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments
Comments: Presented at 17th Midwest Association for Information Systems Conference (MWAIS 2022)At: Omaha, NE, USA
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[277]  arXiv:2205.06039 (cross-list from cs.LO) [pdf, other]
Title: Reactive Synthesis of Smart Contract Control Flows
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[278]  arXiv:2205.06073 (cross-list from cs.IT) [pdf, ps, other]
Title: Consensus Capacity of Noisy Broadcast Channels
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[279]  arXiv:2205.06117 (cross-list from cs.LG) [pdf, other]
Title: Secure Aggregation for Federated Learning in Flower
Comments: Accepted to appear in the 2nd International Workshop on Distributed Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[280]  arXiv:2205.06200 (cross-list from cs.HC) [pdf, other]
Title: Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot
Comments: Accepted paper at the 2022 International Conference on Evaluation and Assessment in Software Engineering (EASE)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[281]  arXiv:2205.06369 (cross-list from cs.LG) [pdf, other]
Title: How to Combine Membership-Inference Attacks on Multiple Updated Models
Comments: 31 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[282]  arXiv:2205.06469 (cross-list from cs.LG) [pdf, other]
Title: l-Leaks: Membership Inference Attacks with Logits
Comments: 10pages,6figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[283]  arXiv:2205.06716 (cross-list from cs.LG) [pdf, other]
Title: A Vision Inspired Neural Network for Unsupervised Anomaly Detection in Unordered Data
Authors: Nassir Mohammad
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[284]  arXiv:2205.06765 (cross-list from cs.LG) [pdf, other]
Title: EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2205.06900 (cross-list from cs.LG) [pdf, other]
Title: Universal Post-Training Backdoor Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[286]  arXiv:2205.06937 (cross-list from cs.HC) [pdf]
Title: Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption
Comments: 41 pages, including the stage algorithm programmed on Mturk, the survey flow and specific items used, and a link to download the five informational handouts used for the control condition and the 2FA intervention conditions
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[287]  arXiv:2205.07060 (cross-list from cs.AI) [pdf, other]
Title: GAN-Aimbots: Using Machine Learning for Cheating in First Person Shooters
Comments: Accepted to IEEE Transactions on Games. Source code available at this https URL
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[288]  arXiv:2205.07073 (cross-list from cs.CV) [pdf, other]
Title: An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[289]  arXiv:2205.07109 (cross-list from cs.LG) [pdf, other]
Title: Unsupervised Abnormal Traffic Detection through Topological Flow Analysis
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[290]  arXiv:2205.07123 (cross-list from cs.CL) [pdf, other]
Title: The VoicePrivacy 2020 Challenge Evaluation Plan
Comments: arXiv admin note: text overlap with arXiv:2203.12468
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[291]  arXiv:2205.07228 (cross-list from cs.SE) [pdf, other]
Title: Automation Slicing and Testing for in-App Deep Learning Models
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[292]  arXiv:2205.07460 (cross-list from cs.LG) [pdf, other]
Title: Diffusion Models for Adversarial Purification
Comments: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[293]  arXiv:2205.07502 (cross-list from cs.AI) [pdf, other]
Title: KGRGRL: A User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning
Comments: 8 pages, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[294]  arXiv:2205.07626 (cross-list from cs.LG) [pdf, other]
Title: Attacking and Defending Deep Reinforcement Learning Policies
Authors: Chao Wang
Comments: nine pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[295]  arXiv:2205.07711 (cross-list from cs.SD) [pdf, other]
Title: Transferability of Adversarial Attacks on Synthetic Speech Detection
Comments: 5 pages, submit to Interspeech2022
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[296]  arXiv:2205.07828 (cross-list from cs.IT) [pdf, ps, other]
Title: Digital Blind Box: Random Symmetric Private Information Retrieval
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Databases (cs.DB); Signal Processing (eess.SP)
[297]  arXiv:2205.07859 (cross-list from cs.LG) [pdf, other]
Title: Btech thesis report on adversarial attack detection and purification of adverserially attacked images
Authors: Dvij Kalaria
Comments: Btech thesis report of Dvij Kalaria, Indian Institute of Technology Kharagpur. arXiv admin note: substantial text overlap with arXiv:2111.15518; substantial text overlap with arXiv:1911.05268 by other authors
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[298]  arXiv:2205.07864 (cross-list from cs.LG) [pdf, other]
Title: Privacy Enhancement for Cloud-Based Few-Shot Learning
Comments: 14 pages, 13 figures, 3 tables. Preprint. Accepted in IEEE WCCI 2022 International Joint Conference on Neural Networks (IJCNN)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[299]  arXiv:2205.07890 (cross-list from cs.LG) [pdf, other]
Title: On the Difficulty of Defending Self-Supervised Learning against Model Extraction
Comments: Accepted at ICML 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[300]  arXiv:2205.08397 (cross-list from cs.DS) [pdf, other]
Title: Improved Utility Analysis of Private CountSketch
Comments: To appear at NeurIPS 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[ total of 395 entries: 1-25 | ... | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | 326-350 | 351-375 | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2305, contact, help  (Access key information)