We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 315

[ total of 375 entries: 1-10 | ... | 286-295 | 296-305 | 306-315 | 316-325 | 326-335 | 336-345 | 346-355 | ... | 366-375 ]
[ showing 10 entries per page: fewer | more | all ]
[316]  arXiv:2206.10565 (cross-list from cs.LG) [pdf, other]
Title: sqSGD: Locally Private and Communication Efficient Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[317]  arXiv:2206.10673 (cross-list from cs.CV) [pdf, ps, other]
Title: Natural Backdoor Datasets
Comments: 18 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[318]  arXiv:2206.10858 (cross-list from cs.LG) [pdf, other]
Title: Robust Universal Adversarial Perturbations
Comments: 16 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[319]  arXiv:2206.10875 (cross-list from cs.LG) [pdf, other]
Title: Guided Diffusion Model for Adversarial Purification from Random Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[320]  arXiv:2206.10924 (cross-list from cs.CL) [pdf, ps, other]
Title: Enhancing Networking Cipher Algorithms with Natural Language
Authors: John E. Ortega
Comments: 12 pages, David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022 pp. 43-54, 2022. CS & IT - CSCP 2022 DOI: 10.5121/csit.2022.121013
Journal-ref: David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022, pp. 43-54, 2022. CS & IT
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[321]  arXiv:2206.10989 (cross-list from cs.CV) [pdf, other]
Title: Identity Documents Authentication based on Forgery Detection of Guilloche Pattern
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[322]  arXiv:2206.11187 (cross-list from cs.AI) [pdf, other]
Title: Automated Compliance Blueprint Optimization with Artificial Intelligence
Comments: 5 pages
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[323]  arXiv:2206.11433 (cross-list from cs.IR) [pdf, other]
Title: Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles
Comments: Accepted by TNNLS. 15 pages, 8 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[324]  arXiv:2206.11480 (cross-list from cs.LG) [pdf, other]
Title: A Framework for Understanding Model Extraction Attack and Defense
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[325]  arXiv:2206.11743 (cross-list from cs.IR) [pdf, other]
Title: LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization
Comments: Accepted by ACM Transactions on Information Systems (TOIS)
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[ total of 375 entries: 1-10 | ... | 286-295 | 296-305 | 306-315 | 316-325 | 326-335 | 336-345 | 346-355 | ... | 366-375 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)