We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 350

[ total of 395 entries: 1-25 | ... | 276-300 | 301-325 | 326-350 | 351-375 | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]
[351]  arXiv:2205.13941 (cross-list from cs.LG) [pdf, other]
Title: Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence
Comments: Code at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[352]  arXiv:2205.13981 (cross-list from cs.IT) [pdf, ps, other]
Title: $\mathbb{Z}_p\mathbb{Z}_{p^2}$-linear codes: rank and kernel
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[353]  arXiv:2205.14068 (cross-list from cs.IT) [pdf, other]
Title: Interleaved Prange: A New Generic Decoder for Interleaved Codes
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[354]  arXiv:2205.14298 (cross-list from cs.LG) [pdf, other]
Title: MC-GEN:Multi-level Clustering for Private Synthetic Data Generation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[355]  arXiv:2205.14592 (cross-list from cs.LG) [pdf, other]
Title: GBC: An Efficient and Adaptive Clustering Algorithm Based on Granular-Ball
Comments: 5 pages, 1 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[356]  arXiv:2205.14601 (cross-list from cs.CY) [pdf, ps, other]
Title: YASM (Yet Another Surveillance Mechanism)
Comments: 16 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[357]  arXiv:2205.14694 (cross-list from cs.LG) [pdf, other]
Title: Learning Security Strategies through Game Play and Optimal Stopping
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[358]  arXiv:2205.14758 (cross-list from cs.GT) [pdf, other]
Title: Credible, Strategyproof, Optimal, and Bounded Expected-Round Single-Item Auctions for all Distributions
Comments: 22 Pages
Journal-ref: ITCS 2022: 13th Innovations in Theoretical Computer Science Conference, 2022
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Econometrics (econ.EM)
[359]  arXiv:2205.14772 (cross-list from cs.AI) [pdf, other]
Title: Unfooling Perturbation-Based Post Hoc Explainers
Comments: Accepted to AAAI-23. See the companion blog post at this https URL 9 pages (not including references and supplemental)
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[360]  arXiv:2205.14842 (cross-list from cs.LG) [pdf, other]
Title: Efficient Reward Poisoning Attacks on Online Deep Reinforcement Learning
Comments: Accepted by TMLR
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[361]  arXiv:2205.14964 (cross-list from cs.SE) [pdf, other]
Title: Effectiveness and Scalability of Fuzzing Techniques in CI/CD Pipelines
Comments: 12 pages, 5 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[362]  arXiv:2205.15128 (cross-list from cs.LG) [pdf, other]
Title: Level Up with RealAEs: Leveraging Domain Constraints in Feature Space to Strengthen Robustness of Android Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[363]  arXiv:2205.15564 (cross-list from cs.LG) [pdf, other]
Title: Secure Federated Clustering
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[364]  arXiv:2205.15592 (cross-list from cs.LG) [pdf, ps, other]
Title: Semantic Autoencoder and Its Potential Usage for Adversarial Attack
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[365]  arXiv:2205.15757 (cross-list from cs.DC) [pdf, other]
Title: Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[366]  arXiv:2205.15896 (cross-list from cs.DC) [pdf, other]
Title: FedWalk: Communication Efficient Federated Unsupervised Node Embedding with Differential Privacy
Authors: Qiying Pan (1), Yifei Zhu (1) ((1) Shanghai Jiao Tong University)
Comments: 10 pages, 8 figures, to be published in the Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[367]  arXiv:2205.15970 (cross-list from cs.LG) [pdf, other]
Title: FedHarmony: Unlearning Scanner Bias with Distributed Data
Comments: Accepted to MICCAI 2022, Code available at: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[368]  arXiv:2205.15992 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Federated Submodel Learning with Sparsification
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[369]  arXiv:2205.00135 (cross-list from math.NT) [pdf, other]
Title: Failing to hash into supersingular isogeny graphs
Comments: 33 pages, 7 figures
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[370]  arXiv:2205.00615 (cross-list from quant-ph) [pdf, other]
Title: Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system
Comments: Our protocol has been renamed Distributed Symmetric Key Exchange (DSKE). 11 pages, 6 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[371]  arXiv:2205.01528 (cross-list from eess.AS) [pdf, other]
Title: Attentive activation function for improving end-to-end spoofing countermeasure systems
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[372]  arXiv:2205.01552 (cross-list from eess.SP) [pdf, ps, other]
Title: Physical Layer Security for 6G Systems why it is needed and how to make it happen
Authors: Arsenia Chorti
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[373]  arXiv:2205.03174 (cross-list from quant-ph) [pdf, other]
Title: Analysis of Multiple Overlapping Paths algorithms for Secure Key Exchange in Large-Scale Quantum Networks
Comments: 18 pages, 12 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[374]  arXiv:2205.03976 (cross-list from math.NT) [pdf, other]
Title: Orientations and cycles in supersingular isogeny graphs
Comments: 41 pages, 7 figures
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[375]  arXiv:2205.04220 (cross-list from quant-ph) [pdf, other]
Title: On recovering block cipher secret keys in the cold boot attack setting
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 395 entries: 1-25 | ... | 276-300 | 301-325 | 326-350 | 351-375 | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)