We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 335

[ total of 375 entries: 1-10 | ... | 306-315 | 316-325 | 326-335 | 336-345 | 346-355 | 356-365 | 366-375 ]
[ showing 10 entries per page: fewer | more | all ]
[336]  arXiv:2206.12714 (cross-list from cs.CV) [pdf, other]
Title: Defending Multimodal Fusion Models against Single-Source Adversaries
Comments: CVPR 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[337]  arXiv:2206.12749 (cross-list from cs.LG) [pdf, ps, other]
Title: Design and Analysis of Robust Resilient Diffusion over Multi-Task Networks Against Byzantine Attacks
Comments: 16 pages, 22 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[338]  arXiv:2206.12766 (cross-list from cs.DB) [pdf, ps, other]
Title: Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Journal-ref: 2021 IEEE International Conference on Digital Health (ICDH)
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[339]  arXiv:2206.12888 (cross-list from cs.DC) [pdf, other]
Title: WebAssembly as a Common Layer for the Cloud-edge Continuum
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: FRAME'22: Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, co-located with HPDC'22, July 2022, pp. 3-8
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[340]  arXiv:2206.13083 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Example Detection in Deployed Tree Ensembles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[341]  arXiv:2206.13230 (cross-list from cs.NI) [pdf, other]
Title: Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale
Comments: Original: this https URL Additional Material: this https URL
Journal-ref: Proc. Network Traffic Measurement and Analysis Conference (TMA) 2022
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[342]  arXiv:2206.13787 (cross-list from cs.LG) [pdf, other]
Title: Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[343]  arXiv:2206.13810 (cross-list from cs.IT) [pdf, ps, other]
Title: Gray Images of Cyclic Codes over $\mathbb{Z}_{p^2}$ and $\mathbb{Z}_p\mathbb{Z}_{p^2}
Authors: Minjia Shi, Xuan Wang
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[344]  arXiv:2206.13991 (cross-list from cs.LG) [pdf, other]
Title: Increasing Confidence in Adversarial Robustness Evaluations
Comments: Oral at CVPR 2022 Workshop (Art of Robustness). Project website this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[345]  arXiv:2206.14004 (cross-list from cs.LG) [pdf, other]
Title: On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Comments: 9 pages, appendix: 2 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 375 entries: 1-10 | ... | 306-315 | 316-325 | 326-335 | 336-345 | 346-355 | 356-365 | 366-375 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)