We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 325

[ total of 375 entries: 1-25 | ... | 251-275 | 276-300 | 301-325 | 326-350 | 351-375 ]
[ showing 25 entries per page: fewer | more | all ]
[326]  arXiv:2206.11787 (cross-list from cs.DB) [pdf, ps, other]
Title: NoSQL security: can my data-driven decision-making be influenced from outside?
Comments: Cite as: Nikiforova et al. (2023), "NoSQL Security: Can My Data-driven Decision-making Be Influenced from Outside?", Big Data and Decision-Making: Applications and Uses in the Public and Private Sector, Emerald Publishing Limited, Bingley, pp. 59-73. Title of the first version was "NoSQL Security: Can My Data-driven Decision-making Be Affected from Outside?"
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[327]  arXiv:2206.11866 (cross-list from cs.CL) [pdf, ps, other]
Title: A Multi-Policy Framework for Deep Learning-Based Fake News Detection
Comments: 10 pages, 1 table, 3 figures, DCAI 2022 conference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[328]  arXiv:2206.12100 (cross-list from cs.LG) [pdf, other]
Title: zPROBE: Zero Peek Robustness Checks for Federated Learning
Comments: ICCV 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[329]  arXiv:2206.12183 (cross-list from cs.LG) [pdf, other]
Title: "You Can't Fix What You Can't Measure": Privately Measuring Demographic Performance Disparities in Federated Learning
Comments: 14 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[330]  arXiv:2206.12270 (cross-list from cs.LG) [pdf, other]
Title: Using Autoencoders on Differentially Private Federated Learning GANs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[331]  arXiv:2206.12395 (cross-list from cs.LG) [pdf, other]
Title: Data Leakage in Federated Averaging
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[332]  arXiv:2206.12401 (cross-list from cs.IR) [pdf, other]
Title: Debiasing Learning for Membership Inference Attacks Against Recommender Systems
Comments: Accepted by KDD 2022
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[333]  arXiv:2206.12654 (cross-list from cs.LG) [pdf, other]
Title: BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
Comments: Accepted at NeurIPS 2022 Datasets and Benchmarks Track; 44 pages; 8 backdoor attacks; 9 backdoor defenses; 8,000 pairs of attack-defense evaluations; several analysis and 5 analysis tools
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[334]  arXiv:2206.12669 (cross-list from cs.IT) [pdf, other]
Title: Crypto Makes AI Evolve
Authors: Behrouz Zolfaghari (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Elnaz Rabieinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Abbas Yazdinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Reza M. Parizi (College of Computing and Software Engineering, Kennesaw State University, GA, USA), Ali Dehghantanha (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[335]  arXiv:2206.12685 (cross-list from cs.CV) [pdf, ps, other]
Title: Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising
Journal-ref: IAES International Journal of Artificial Intelligence, Vol. 11, No. 3, September 2022, pp. 961~968, ISSN: 2252-8938
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[336]  arXiv:2206.12714 (cross-list from cs.CV) [pdf, other]
Title: Defending Multimodal Fusion Models against Single-Source Adversaries
Comments: CVPR 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[337]  arXiv:2206.12749 (cross-list from cs.LG) [pdf, ps, other]
Title: Design and Analysis of Robust Resilient Diffusion over Multi-Task Networks Against Byzantine Attacks
Comments: 16 pages, 22 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[338]  arXiv:2206.12766 (cross-list from cs.DB) [pdf, ps, other]
Title: Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Journal-ref: 2021 IEEE International Conference on Digital Health (ICDH)
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[339]  arXiv:2206.12888 (cross-list from cs.DC) [pdf, other]
Title: WebAssembly as a Common Layer for the Cloud-edge Continuum
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: FRAME'22: Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, co-located with HPDC'22, July 2022, pp. 3-8
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[340]  arXiv:2206.13083 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Example Detection in Deployed Tree Ensembles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[341]  arXiv:2206.13230 (cross-list from cs.NI) [pdf, other]
Title: Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale
Comments: Original: this https URL Additional Material: this https URL
Journal-ref: Proc. Network Traffic Measurement and Analysis Conference (TMA) 2022
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[342]  arXiv:2206.13787 (cross-list from cs.LG) [pdf, other]
Title: Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[343]  arXiv:2206.13810 (cross-list from cs.IT) [pdf, ps, other]
Title: Gray Images of Cyclic Codes over $\mathbb{Z}_{p^2}$ and $\mathbb{Z}_p\mathbb{Z}_{p^2}
Authors: Minjia Shi, Xuan Wang
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[344]  arXiv:2206.13991 (cross-list from cs.LG) [pdf, other]
Title: Increasing Confidence in Adversarial Robustness Evaluations
Comments: Oral at CVPR 2022 Workshop (Art of Robustness). Project website this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[345]  arXiv:2206.14004 (cross-list from cs.LG) [pdf, other]
Title: On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Comments: 9 pages, appendix: 2 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[346]  arXiv:2206.14157 (cross-list from cs.LG) [pdf, other]
Title: How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection
Comments: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[347]  arXiv:2206.14201 (cross-list from cs.IT) [pdf, ps, other]
Title: $\mathbb{Z}_p\mathbb{Z}_{p^2}$-additive cyclic codes: kernel and rank
Authors: Xuan Wang, Minjia Shi
Comments: arXiv admin note: text overlap with arXiv:2206.13810
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[348]  arXiv:2206.14356 (cross-list from cs.IT) [pdf, other]
Title: Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation
Comments: This paper is submitted to IEICE Trans. Fundamentals
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[349]  arXiv:2206.14439 (cross-list from cs.LG) [pdf, other]
Title: Approximate Data Deletion in Generative Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[350]  arXiv:2206.14477 (cross-list from cs.LG) [pdf, ps, other]
Title: Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Authors: Lele Wang, Bin Liu
Comments: This paper has been accepted by 19th Inter. Conf. on Intelligent Computing (ICIC 2023)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 375 entries: 1-25 | ... | 251-275 | 276-300 | 301-325 | 326-350 | 351-375 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)