We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 300

[ total of 375 entries: 1-25 | ... | 226-250 | 251-275 | 276-300 | 301-325 | 326-350 | 351-375 ]
[ showing 25 entries per page: fewer | more | all ]
[301]  arXiv:2206.08829 (cross-list from cs.LG) [pdf, other]
Title: FedNew: A Communication-Efficient and Privacy-Preserving Newton-Type Method for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[302]  arXiv:2206.09075 (cross-list from cs.LG) [pdf, ps, other]
Title: Comment on Transferability and Input Transformation with Additive Noise
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[303]  arXiv:2206.09097 (cross-list from cs.LG) [pdf, ps, other]
Title: Secure Embedding Aggregation for Federated Representation Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[304]  arXiv:2206.09458 (cross-list from cs.LG) [pdf, other]
Title: A Universal Adversarial Policy for Text Classifiers
Comments: Accepted for publication in Neural Networks (2022), see this https URL
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[305]  arXiv:2206.09465 (cross-list from cs.SI) [pdf, ps, other]
Title: Cybersecurity Law: Legal Jurisdiction and Authority
Comments: This report is developed for partial fulfillment of the requirements for the degree of Juris Masters of Law at GMU's Antonin Scalia Law School
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[306]  arXiv:2206.09491 (cross-list from cs.LG) [pdf, other]
Title: On the Limitations of Stochastic Pre-processing Defenses
Comments: Accepted by Proceedings of the 36th Conference on Neural Information Processing Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[307]  arXiv:2206.09628 (cross-list from cs.LG) [pdf, other]
Title: Diversified Adversarial Attacks based on Conjugate Gradient Method
Comments: Proceedings of the 39th International Conference on Machine Learning (ICML 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[308]  arXiv:2206.09734 (cross-list from cs.CY) [pdf, ps, other]
Title: The Cost of the GDPR for Apps? Nearly Impossible to Study without Platform Data
Comments: Response to NBER preprint 'GDPR and the Lost Generation of Innovative Apps'
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[309]  arXiv:2206.09868 (cross-list from cs.LG) [pdf, other]
Title: Understanding Robust Learning through the Lens of Representation Similarities
Comments: 35 pages, 29 figures; Accepted to Neurips 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[310]  arXiv:2206.09999 (cross-list from cs.AR) [pdf, other]
Title: Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices
Comments: To appear in DSN 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[311]  arXiv:2206.10257 (cross-list from cs.GL) [pdf, ps, other]
Title: Satoshi Nakamoto and the Origins of Bitcoin -- The Profile of a 1-in-a-Billion Genius
Authors: Jens Ducrée
Comments: Main text: 84 pages Number of references: 1468 Appendix: 5 pages
Subjects: General Literature (cs.GL); Cryptography and Security (cs.CR)
[312]  arXiv:2206.10259 (cross-list from cs.LG) [pdf, ps, other]
Title: R2-AD2: Detecting Anomalies by Analysing the Raw Gradient
Comments: Accepted at ECML-PKDD 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[313]  arXiv:2206.10469 (cross-list from cs.LG) [pdf, other]
Title: The Privacy Onion Effect: Memorization is Relative
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[314]  arXiv:2206.10545 (cross-list from cs.CY) [pdf, other]
Title: The Impact of Visibility on the Right to Opt-out of Sale under CCPA
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[315]  arXiv:2206.10550 (cross-list from cs.LG) [pdf, other]
Title: (Certified!!) Adversarial Robustness for Free!
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[316]  arXiv:2206.10565 (cross-list from cs.LG) [pdf, other]
Title: sqSGD: Locally Private and Communication Efficient Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[317]  arXiv:2206.10673 (cross-list from cs.CV) [pdf, ps, other]
Title: Natural Backdoor Datasets
Comments: 18 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[318]  arXiv:2206.10858 (cross-list from cs.LG) [pdf, other]
Title: Robust Universal Adversarial Perturbations
Comments: 16 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[319]  arXiv:2206.10875 (cross-list from cs.LG) [pdf, other]
Title: Guided Diffusion Model for Adversarial Purification from Random Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[320]  arXiv:2206.10924 (cross-list from cs.CL) [pdf, ps, other]
Title: Enhancing Networking Cipher Algorithms with Natural Language
Authors: John E. Ortega
Comments: 12 pages, David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022 pp. 43-54, 2022. CS & IT - CSCP 2022 DOI: 10.5121/csit.2022.121013
Journal-ref: David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022, pp. 43-54, 2022. CS & IT
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[321]  arXiv:2206.10989 (cross-list from cs.CV) [pdf, other]
Title: Identity Documents Authentication based on Forgery Detection of Guilloche Pattern
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[322]  arXiv:2206.11187 (cross-list from cs.AI) [pdf, other]
Title: Automated Compliance Blueprint Optimization with Artificial Intelligence
Comments: 5 pages
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[323]  arXiv:2206.11433 (cross-list from cs.IR) [pdf, other]
Title: Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles
Comments: Accepted by TNNLS. 15 pages, 8 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[324]  arXiv:2206.11480 (cross-list from cs.LG) [pdf, other]
Title: A Framework for Understanding Model Extraction Attack and Defense
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[325]  arXiv:2206.11743 (cross-list from cs.IR) [pdf, other]
Title: LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization
Comments: Accepted by ACM Transactions on Information Systems (TOIS)
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[ total of 375 entries: 1-25 | ... | 226-250 | 251-275 | 276-300 | 301-325 | 326-350 | 351-375 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)