We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2022

[ total of 435 entries: 1-434 | 435 ]
[ showing 434 entries per page: fewer | more | all ]
[1]  arXiv:2210.00008 [pdf, other]
Title: Adversarial Attacks on Transformers-Based Malware Detectors
Comments: Accepted to the 2022 NeurIPS ML Safety Workshop. Code available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[2]  arXiv:2210.00058 [pdf, other]
Title: Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[3]  arXiv:2210.00175 [pdf, ps, other]
Title: Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[4]  arXiv:2210.00262 [pdf, other]
Title: Frequency Estimation of Evolving Data Under Local Differential Privacy
Comments: Accepted at EDBT 2023. Updated structure and correcting privacy loss of dBitFlipPM
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2210.00264 [pdf, other]
Title: zkBridge: Trustless Cross-chain Bridges Made Practical
Comments: An extended version of the paper to appear in ACM CCS 2022
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2210.00270 [pdf, ps, other]
Title: ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2210.00325 [pdf, other]
Title: Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[8]  arXiv:2210.00486 [pdf, other]
Title: pMPL: A Robust Multi-Party Learning Framework with a Privileged Party
Comments: This paper is the full version of a paper to appear in CCS 2022
Journal-ref: 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS'22)
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2210.00581 [pdf, other]
Title: PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model
Comments: To Appear in 2023 USENIX Security Symposium, August 9-11, 2023. Please cite our USENIX Security version
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2210.00584 [pdf, other]
Title: FLCert: Provably Secure Federated Learning against Poisoning Attacks
Comments: To appear in Transactions on Information Forensics and Security. arXiv admin note: text overlap with arXiv:2102.01854
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[11]  arXiv:2210.00597 [pdf, other]
Title: Composition of Differential Privacy & Privacy Amplification by Subsampling
Authors: Thomas Steinke
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[12]  arXiv:2210.00615 [pdf, other]
Title: iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Comments: 9 pages, 5 figures, IEEE International Joint Conference on Biometrics (IJCB 2022)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[13]  arXiv:2210.00649 [pdf, other]
Title: Automated Security Analysis of Exposure Notification Systems
Comments: 23 pages, Full version of the corresponding USENIX Security '23 paper
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2210.00856 [pdf, other]
Title: A forensic analysis of the Google Home: repairing compressed data without error correction
Comments: 28 pages, modified version of paper that appeared originally at Forensic Science International: Digital Investigation
Journal-ref: Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[15]  arXiv:2210.00875 [pdf, other]
Title: Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Comments: This work is accepted by the NeurIPS 2022 (Oral, TOP 2%). The first two authors contributed equally to this work. 25 pages. We have fixed some typos in the previous version
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[16]  arXiv:2210.00957 [pdf, other]
Title: UnGANable: Defending Against GAN-based Face Manipulation
Comments: Accepted by USENIX Security 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[17]  arXiv:2210.00968 [pdf, other]
Title: Membership Inference Attacks Against Text-to-image Generation Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2210.01075 [pdf, other]
Title: Decompiling x86 Deep Neural Network Executables
Comments: The extended version of a paper to appear in the Proceedings of the 32nd USENIX Security Symposium, 2023, (USENIX Security '23), 25 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[19]  arXiv:2210.01111 [pdf, other]
Title: MultiGuard: Provably Robust Multi-label Classification against Adversarial Examples
Comments: Accepted by NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2210.01260 [pdf, other]
Title: Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Comments: 13 pages; to appear in WISA 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2210.01297 [pdf, other]
Title: Privacy-Preserving Link Prediction
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2210.01594 [pdf, other]
Title: GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
Comments: 11 pages, 7 figures, 2 tables, 3 algorithms, in IEEE TBIOM 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[23]  arXiv:2210.01632 [pdf, other]
Title: Backdoor Attacks in the Supply Chain of Masked Image Modeling
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2210.01688 [pdf, other]
Title: Blockchain-Based Decentralized Knowledge Marketplace Using Active Inference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[25]  arXiv:2210.01739 [pdf, ps, other]
Title: Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[26]  arXiv:2210.01749 [pdf, other]
Title: Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Comments: arXiv admin note: text overlap with arXiv:2206.01314
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2210.01778 [pdf, other]
Title: Semantics-based Privacy by Design for Internet of Things Applications
Journal-ref: Future Generation Computer Systems, Volume 138, January 2023, Pages 280-295
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[28]  arXiv:2210.01853 [pdf, other]
Title: Privacy-Patterns for IoT Application Developers
Comments: In Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp/ISWC '22)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29]  arXiv:2210.01988 [pdf, ps, other]
Title: Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning
Comments: Accepted at 44th IEEE Symposium on Security and Privacy (S&P 2023)
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2210.02143 [pdf, other]
Title: Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2210.02161 [pdf, ps, other]
Title: Security and Privacy Concerns in Cloud-based Scientific and Business Workflows: A Systematic Review
Comments: 16 pages, 8 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[32]  arXiv:2210.02234 [pdf, other]
Title: Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input
Comments: arXiv admin note: substantial text overlap with arXiv:1806.10189
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33]  arXiv:2210.02257 [pdf, other]
Title: Hiding Images in Deep Probabilistic Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Multimedia (cs.MM)
[34]  arXiv:2210.02337 [pdf, other]
Title: When Physical Layer Key Generation Meets RIS: Opportunities, Challenges, and Road Ahead
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2210.02360 [pdf, other]
Title: DiPPS: Differentially Private Propensity Scores for Bias Correction
Comments: 11 pages, 2 figures. Current version: conference version
Journal-ref: Proceedings of the Seventeenth International AAAI Conference on Web and Social Media (2023) 114-125
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2210.02601 [pdf, other]
Title: From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2210.02650 [pdf, other]
Title: PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT
Comments: In Proceedings of the 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI) 2022
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2210.02678 [pdf, ps, other]
Title: Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection
Comments: 17 single column pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2210.02760 [pdf, ps, other]
Title: Cyber-Resilient Privacy Preservation and Secure Billing Approach for Smart Energy Metering Devices
Comments: Journal article
Journal-ref: Volume 70 Issue 9, 337-345, September 2022
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Networking and Internet Architecture (cs.NI)
[40]  arXiv:2210.02821 [pdf, ps, other]
Title: Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV
Comments: 29 pages, 17 figures, 1 table, In Proceedings of the ADFSL 2022, USA
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[41]  arXiv:2210.02826 [pdf, ps, other]
Title: Single-Use Delegatable Signatures Based on Smart Contracts
Comments: The 16th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2021)
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2210.02840 [pdf, other]
Title: Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43]  arXiv:2210.02841 [pdf, other]
Title: Detecting Irregular Network Activity with Adversarial Learning and Expert Feedback
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44]  arXiv:2210.02853 [pdf, other]
Title: NeuDep: Neural Binary Memory Dependence Analysis
Comments: ESEC/FSE 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL); Software Engineering (cs.SE)
[45]  arXiv:2210.02873 [pdf, other]
Title: Blockchain-based Monitoring for Poison Attack Detection in Decentralized Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[46]  arXiv:2210.02910 [pdf, other]
Title: Federated Boosted Decision Trees with Differential Privacy
Comments: Full version of a paper to appear at ACM CCS'22
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2210.03014 [pdf, other]
Title: EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2210.03020 [pdf, other]
Title: Model-Driven Engineering for Formal Verification and Security Testing of Authentication Protocols
Comments: Editor: Ib\'eria Medeiros. 18th European Dependable Computing Conference (EDCC 2022), September 12-15, 2022, Zaragoza, Spain. Student Forum Proceedings - EDCC 2022
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2210.03205 [pdf, other]
Title: Synthetic Dataset Generation for Privacy-Preserving Machine Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[50]  arXiv:2210.03207 [pdf, other]
Title: Threat Repair with Optimization Modulo Theories
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[51]  arXiv:2210.03239 [pdf, other]
Title: Bad Citrus: Reducing Adversarial Costs with Model Distances
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2210.03249 [pdf, ps, other]
Title: Joint Protection Scheme for Deep Neural Network Hardware Accelerators and Models
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2210.03254 [pdf, other]
Title: Network Intrusion Detection System in a Light Bulb
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[54]  arXiv:2210.03297 [pdf, other]
Title: Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems
Comments: ICML 2023. Code can be found at this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[55]  arXiv:2210.03458 [pdf, ps, other]
Title: PAC Privacy: Automatic Privacy Measurement and Control of Data Processing
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[56]  arXiv:2210.03518 [pdf, ps, other]
Title: LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G
Comments: in IEEE Transactions on Network and Service Management, 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[57]  arXiv:2210.03520 [pdf, ps, other]
Title: Exploring the Relationships between Privacy by Design Schemes and Privacy Laws: A Comparative Analysis
Comments: Technical Report
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2210.03638 [pdf, ps, other]
Title: Demystifying Quantum Blockchain for Healthcare
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[59]  arXiv:2210.03688 [pdf, other]
Title: A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2210.03719 [pdf, other]
Title: BayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control Systems
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2210.03998 [pdf, other]
Title: Towards the Detection of Malicious Java Packages
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2210.04052 [pdf, other]
Title: FedDef: Defense Against Gradient Leakage in Federated Learning-based Network Intrusion Detection Systems
Comments: Accepted to TIFS'23, volume 18
Journal-ref: IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4561-4576, 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2210.04064 [pdf, other]
Title: Study and security analysis of the Spanish identity card
Journal-ref: World Congress in Computer Science, Computer Engineering, and Applied Computing. Book of Abstracts CSCE 22. American Council on Science and Education. 2022
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2210.04066 [pdf, other]
Title: Drowsiness detection in drivers with a smartwatch
Journal-ref: World Congress in Computer Science, Computer Engineering, and Applied Computing. Book of Abstracts CSCE 22. American Council on Science and Education. 2022
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2210.04084 [pdf, other]
Title: SpyHammer: Using RowHammer to Remotely Spy on Temperature
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[66]  arXiv:2210.04088 [pdf, ps, other]
Title: Collaborative Domain Blocking: Using federated NLP To Detect Malicious Domains
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67]  arXiv:2210.04132 [pdf, other]
Title: Performances of Symmetric Loss for Private Data from Exponential Mechanism
Comments: 14th International Workshop on Parallel and Distributed Algorithms and Applications (PDAA2022)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[68]  arXiv:2210.04258 [pdf, other]
Title: A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes
Journal-ref: International Journal of Information Security (2023)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[69]  arXiv:2210.04328 [pdf, other]
Title: seL4 Microkernel for virtualization use-cases: Potential directions towards a standard VMM
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[70]  arXiv:2210.04541 [pdf, other]
Title: A Systematic Literature Review of the Tension between the GDPR and Public Blockchain Systems
Journal-ref: Blockchain: Research and Applications, 4(2):100129
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2210.04631 [pdf, ps, other]
Title: A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing (Extended Version)
Comments: This is an extended version of an article with the same title published in the proceedings of the QuWeDa workshop at ISWC 2022. Next to more details in the related work and conclusions sections, this extension introduces concrete mitigations of each vulnerability
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[72]  arXiv:2210.04644 [pdf, other]
Title: Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction Execution
Authors: Yibo Wang, Yuzhe Tang
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2210.04733 [pdf, ps, other]
Title: A Privacy Preserving IoT Data Marketplace Using IOTA Smart Contracts
Comments: 7 pages, 2 figurea
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2210.04777 [pdf, other]
Title: mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[75]  arXiv:2210.05121 [pdf, ps, other]
Title: Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2210.05217 [pdf, ps, other]
Title: Abstract interpretation of Michelson smart-contracts
Journal-ref: SOAP '22: 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, Jun 2022, San Diego, CA, United States. pp.36-43
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[77]  arXiv:2210.05226 [pdf, other]
Title: Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2210.05343 [pdf, other]
Title: Printing variability of copy detection patterns
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[79]  arXiv:2210.05433 [pdf, other]
Title: On the Feasibility of Profiling Electric Vehicles through Charging Data
Comments: This is an extended version of our paper in VehicleSec 2023 (co-located with NDSS Symposium 2023), San Diego, CA
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2210.05476 [pdf, other]
Title: Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Comments: This paper will appear at IACR Transactions on Cryptographic Hardware and Embedded Systems 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[81]  arXiv:2210.05560 [pdf, other]
Title: Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption
Comments: 33 pages, 12 figures, submitted to Annual Reviews in Control
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[82]  arXiv:2210.05623 [pdf, ps, other]
Title: A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[83]  arXiv:2210.06139 [pdf, other]
Title: Zero-Knowledge Optimal Monetary Policy under Stochastic Dominance
Comments: Implementation available at: this https URL
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE); General Economics (econ.GN)
[84]  arXiv:2210.06163 [pdf, ps, other]
Title: Privacy of federated QR decomposition using additive secure multiparty computation
Comments: 10 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[85]  arXiv:2210.06186 [pdf, other]
Title: GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response
Comments: 20 pages, 19 figures, Code and data released
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[86]  arXiv:2210.06428 [pdf, other]
Title: Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork
Comments: Accepted by NeurIPS 2022. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[87]  arXiv:2210.06509 [pdf, other]
Title: Understanding Impacts of Task Similarity on Backdoor Attack and Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88]  arXiv:2210.06516 [pdf, other]
Title: How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?
Comments: 13 pages of the main text
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[89]  arXiv:2210.06540 [pdf, ps, other]
Title: Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2210.06587 [pdf, ps, other]
Title: BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces
Authors: Adam Dorian Wong
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2210.06654 [pdf, other]
Title: The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain
Authors: Yash Vekaria (1), Rishab Nithyanand (2), Zubair Shafiq (1) ((1) University of California, Davis, (2) University of Iowa)
Comments: To appear at IEEE Symposium on Security & Privacy (Oakland) 2024
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[92]  arXiv:2210.06676 [pdf, other]
Title: A Tagging Solution to Discover IoT Devices in Apartments
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2210.06738 [pdf, other]
Title: PUPoW: A framework for designing blockchains with practically-useful-proof-of-work & vanitycoin
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[94]  arXiv:2210.06746 [pdf, other]
Title: PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs
Comments: 24 pages, 15 figures (including subfigures), 9 tables. This is the extended version of the paper with the same title published at USENIX Security '23
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2210.06792 [pdf, other]
Title: SoK: How Not to Architect Your Next-Generation TEE Malware?
Comments: Kubilay Ahmet K\"u\c{c}\"uk, Steve Moyle, Andrew Martin, Alexandru Mereacre, and Nicholas Allott. 2022. SoK: How Not to Architect Your Next-Generation TEE Malware?. In Hardware and Architectural Support for Security and Privacy (HASP 22), October 1, 2022, Chicago, IL, USA. ACM, New York, NY, USA, 10 pages. this https URL
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2210.06840 [pdf, ps, other]
Title: Forensic-Ready Risk Management Concepts
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[97]  arXiv:2210.06856 [pdf, other]
Title: Federated Learning for Tabular Data: Exploring Potential Risk to Privacy
Comments: In the proceedings of The 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE), November 2022
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2210.06889 [pdf, other]
Title: Multi-recipient and threshold encryption based on hidden multipliers
Authors: Vitaly Roman'kov
Comments: 12 pages. Published in journal of Groups, Complexity, Cryptology. arXiv admin note: substantial text overlap with arXiv:2108.06967
Journal-ref: journal of Groups, complexity, cryptology, Volume 14, Issue 2 (March 21, 2023) gcc:10150
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[99]  arXiv:2210.06998 [pdf, other]
Title: DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[100]  arXiv:2210.07110 [pdf, other]
Title: POSE: Practical Off-chain Smart Contract Execution
Journal-ref: Annual Network and Distributed System Security Symposium, NDSS, 2023
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2210.07332 [pdf, other]
Title: Secure Multiparty Computation for Synthetic Data Generation from Distributed Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[102]  arXiv:2210.07346 [pdf, other]
Title: An Embarrassingly Simple Backdoor Attack on Self-supervised Learning
Comments: The 2023 International Conference on Computer Vision (ICCV '23)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[103]  arXiv:2210.07376 [pdf, other]
Title: ScionFL: Efficient and Robust Secure Quantized Aggregation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[104]  arXiv:2210.07385 [pdf, other]
Title: Synthesis of Proactive Sensor Placement In Probabilistic Attack Graphs
Comments: 8 pages, 4 figures, submitted to 2023 American Control Conference
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2210.07412 [pdf, other]
Title: A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Comments: This paper will be published at IEEE Transactions on Computers
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[106]  arXiv:2210.07465 [pdf, other]
Title: Learning Algorithms in Static Analysis of Web Applications
Comments: This paper was originally written in 2019
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2210.07482 [pdf, other]
Title: Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study
Authors: Peiyang Jia (School of Cyber Engineering, Xidian University, China, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Chengwei Liu (Nanyang Technological University), Hongyu Sun (School of Cyber Engineering, Xidian University, China, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Chengyi Sun (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Mianxue Gu (Hainan University, China, National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China), Yang Liu (Nanyang Technological University), Yuqing Zhang (National Computer Network Intrusion Protection Center, Xidian University, Hainan University, University of Chinese Academy of Sciences)
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[108]  arXiv:2210.07531 [pdf, other]
Title: Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2210.07666 [pdf, other]
Title: A Location-Based Global Authorization Method for Underwater Security
Comments: 14 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[110]  arXiv:2210.07714 [pdf, other]
Title: CrowdGuard: Federated Backdoor Detection in Federated Learning
Authors: Phillip Rieger (1), Torsten Krauß (2), Markus Miettinen (1), Alexandra Dmitrienko (2), Ahmad-Reza Sadeghi (1) ((1) Technical University Darmstadt, (2) University of Würzburg)
Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. Phillip Rieger and Torsten Krau{\ss} contributed equally to this contribution. 19 pages, 8 figures, 5 tables, 4 algorithms, 5 equations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[111]  arXiv:2210.07719 [pdf, other]
Title: A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2210.07809 [pdf, other]
Title: Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2210.07834 [pdf, ps, other]
Title: An atom's worth of anonymity
Subjects: Cryptography and Security (cs.CR); Logic (math.LO)
[114]  arXiv:2210.07876 [pdf, other]
Title: Control, Confidentiality, and the Right to be Forgotten
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[115]  arXiv:2210.07884 [pdf, other]
Title: SealClub: Computer-aided Paper Document Authentication
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2210.08127 [pdf, other]
Title: Reflections on trusting distributed trust
Comments: 8 pages, 3 figures
Journal-ref: HotNets 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[117]  arXiv:2210.08136 [pdf, other]
Title: A Utility-Preserving Obfuscation Approach for YouTube Recommendations
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2210.08252 [pdf, other]
Title: DI-NIDS: Domain Invariant Network Intrusion Detection System
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[119]  arXiv:2210.08270 [pdf, other]
Title: Assessing the Solid Protocol in Relation to Security & Privacy Obligations
Comments: under submission
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[120]  arXiv:2210.08273 [pdf, other]
Title: Classification of Web Phishing Kits for early detection by platform providers
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[121]  arXiv:2210.08281 [pdf, other]
Title: Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security
Comments: 22 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[122]  arXiv:2210.08374 [pdf, other]
Title: Beyond the Surface: Investigating Malicious CVE Proof of Concept Exploits on GitHub
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2210.08418 [pdf, other]
Title: VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2210.08421 [pdf, other]
Title: New Secure Sparse Inner Product with Applications to Machine Learning
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2210.08674 [pdf, ps, other]
Title: Scaling up Trustless DNN Inference with Zero-Knowledge Proofs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[126]  arXiv:2210.08717 [pdf, other]
Title: PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2210.08723 [pdf, other]
Title: Private Data Valuation and Fair Payment in Data Marketplaces
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2210.08923 [pdf, other]
Title: RPoA: Redefined Proof of Activity
Comments: 11 pages with 1 figure
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[129]  arXiv:2210.09028 [pdf, other]
Title: Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[130]  arXiv:2210.09108 [pdf, other]
Title: Detect and Classify IoT Camera Traffic
Comments: 13 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2210.09194 [pdf, other]
Title: Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Comments: Accepted to NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[132]  arXiv:2210.09230 [pdf, other]
Title: Security and Privacy in Big Data Sharing: State-of-the-Art and Research Directions
Comments: 33 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2210.09269 [pdf, other]
Title: Identification, Amplification and Measurement: A bridge to Gaussian Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2210.09373 [pdf, other]
Title: A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2210.09375 [pdf, other]
Title: Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
Comments: To be published in the proceedings of the 38th Annual Computer Security Applications Conference (ACSAC '22)
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2210.09421 [pdf, other]
Title: Deepfake Text Detection: Limitations and Opportunities
Comments: Accepted to IEEE S&P 2023; First two authors contributed equally to this work; 18 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[137]  arXiv:2210.09482 [pdf, other]
Title: You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks
Comments: Accepted to the 32nd USENIX Security Symposium (2023)
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2210.09580 [pdf, other]
Title: A Novel Feature Representation for Malware Classification
Comments: arXiv admin note: text overlap with arXiv:2210.08034
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[139]  arXiv:2210.09617 [pdf, other]
Title: Making Split Learning Resilient to Label Leakage by Potential Energy Loss
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[140]  arXiv:2210.09634 [pdf, other]
Title: DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling
Comments: A short version of this paper will appear in CCS 2022
Journal-ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[141]  arXiv:2210.09802 [pdf, other]
Title: NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms
Comments: 20 pages, full version of CCS22 paper
Journal-ref: CCS '22, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, November 7--11, 2022, Los Angeles, CA, USA
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2210.09940 [pdf, other]
Title: Automatic Detection of Fake Key Attacks in Secure Messaging
Comments: An extended version of our paper published at ACM CCS 2022
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2210.09963 [pdf, other]
Title: Methods To Ensure Privacy Regarding Medical Data -- Including an examination of the differential privacy algorithm RAPPOR and its implementation in "Cryptool 2"
Comments: 10 pages, 1 figure, 9 tables
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2210.10133 [pdf, other]
Title: Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware
Comments: IEEE S&P'24 submitted
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:2210.10244 [pdf, other]
Title: Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2210.10294 [pdf, other]
Title: Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2210.10451 [pdf, other]
Title: An Empirical Analysis of SMS Scam Detection Systems
Comments: arXiv admin note: text overlap with arXiv:1911.00953 by other authors
Subjects: Cryptography and Security (cs.CR)
[148]  arXiv:2210.10512 [pdf, ps, other]
Title: Miners in the Cloud: Measuring and Analyzing Cryptocurrency Mining in Public Clouds
Comments: 6 pages, 6 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[149]  arXiv:2210.10523 [pdf, other]
Title: Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
Comments: 33 pages, 23 figures, 9 tables, NDSS 2023
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2210.10651 [pdf, other]
Title: Fantômas: Understanding Face Anonymization Reversibility
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[151]  arXiv:2210.10910 [pdf, other]
Title: A Referable NFT Scheme
Comments: Accepted by CryptoEx@ICBC 2023; Align with EIP-5521
Subjects: Cryptography and Security (cs.CR)
[152]  arXiv:2210.10936 [pdf, other]
Title: FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information
Comments: To appear in IEEE S&P 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[153]  arXiv:2210.10978 [pdf, other]
Title: A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2210.10997 [pdf, other]
Title: Demystifying Hidden Sensitive Operations in Android apps
Journal-ref: ACM Transactions on Software Engineering and Methodology, 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[155]  arXiv:2210.11047 [pdf, other]
Title: Thwarting Piracy: Anti-debugging Using GPU-assisted Self-healing Codes
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2210.11049 [pdf, other]
Title: How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers
Comments: To appear in USENIX Security 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[157]  arXiv:2210.11222 [pdf, other]
Title: Learning-Augmented Private Algorithms for Multiple Quantile Release
Comments: To appear in ICML 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[158]  arXiv:2210.11234 [pdf, ps, other]
Title: Development of a hardware-In-the-Loop (HIL) testbed for cyber-physical security in smart buildings
Comments: Presented at the 2023 ASHRAE Winter Conference
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2210.11235 [pdf, other]
Title: Application of Explainable Machine Learning in Detecting and Classifying Ransomware Families Based on API Call Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[160]  arXiv:2210.11237 [pdf, other]
Title: Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey
Comments: 28 pages,10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[161]  arXiv:2210.11239 [pdf, ps, other]
Title: The State-of-the-Art in AI-Based Malware Detection Techniques: A Review
Authors: Adam Wolsey
Comments: 18 pages, 2 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[162]  arXiv:2210.11264 [pdf, other]
Title: Detecting Backdoors in Deep Text Classifiers
Comments: 8 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[163]  arXiv:2210.11299 [pdf, other]
Title: Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic Circuits
Comments: This work was accepted for and presented as a hardware demo at the 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2022), held from 27 to 30 June 2022, in Washington, DC, USA
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2210.11300 [pdf, other]
Title: Uncovering Fingerprinting Networks. An Analysis of In-Browser Tracking using a Behavior-based Approach
Authors: Sebastian Neef
Comments: Master's thesis
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[165]  arXiv:2210.11334 [pdf, other]
Title: Proof of Unlearning: Definitions and Instantiation
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2210.11340 [pdf, ps, other]
Title: Towards cryptographically-authenticated in-memory data structures
Comments: Presented at the 2022 IEEE Secure Development Conference. Copyright 2022 IEEE
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2210.11501 [pdf, other]
Title: Trust-as-a-Service: A reputation-enabled trust framework for 5G networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[168]  arXiv:2210.11517 [pdf, other]
Title: A Security and Trust Framework for Decentralized 5G Marketplaces
Journal-ref: Proceedings of the VII Jornadas Nacionales de Investigaci\'on en Ciberseguridad, pp. 237-240, Bilbao, Spain (2022)
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2210.11546 [pdf, other]
Title: Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[170]  arXiv:2210.11571 [pdf, other]
Title: TrustBoost: Boosting Trust among Interoperable Blockchains
Comments: Forthcoming in ACM Conference on Computer and Communications Security (CCS) 2023
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2210.11592 [pdf, other]
Title: New data poison attacks on machine learning classifiers for mobile exfiltration
Comments: arXiv admin note: substantial text overlap with arXiv:2202.10276
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[172]  arXiv:2210.11702 [pdf, other]
Title: TAP: Transparent and Privacy-Preserving Data Services
Comments: Accepted for USENIX Security 2023
Subjects: Cryptography and Security (cs.CR)
[173]  arXiv:2210.11703 [pdf, other]
Title: SCL: A Secure Concurrency Layer For Paranoid Stateful Lambdas
Comments: updated with acknowledgement; 14 pages, 11 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[174]  arXiv:2210.11726 [pdf, ps, other]
Title: A critical review of cyber-physical security for building automation systems
Comments: 38 pages, 7 figures, 6 tables, accepted by Annual Reviews in Control
Subjects: Cryptography and Security (cs.CR)
[175]  arXiv:2210.11735 [pdf, other]
Title: Extracted BERT Model Leaks More Information than You Think!
Comments: accepted to EMNLP2022 (oral). arXiv admin note: text overlap with arXiv:2105.10909
Subjects: Cryptography and Security (cs.CR)
[176]  arXiv:2210.11743 [pdf, other]
Title: $A^2RID$ -- Anonymous Direct Authentication and Remote Identification of Commercial Drones
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[177]  arXiv:2210.11745 [pdf, other]
Title: BC-IoDT: Blockchain-based Framework for Authentication in Internet of Drone Things
Comments: 6 pages, 3 figures, ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond
Journal-ref: 2022 ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[178]  arXiv:2210.11923 [pdf, other]
Title: RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems
Comments: 24 pages, 5 figures Under submission to a journal
Journal-ref: ACM Transactions on Cyber-Physical Systems, 2024
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[179]  arXiv:2210.11990 [pdf, other]
Title: An Empirical Study on Real Bug Fixes from Solidity Smart Contract Projects
Comments: 21 pages, 12 figures. The paper has been accepted for publication in The Journal of Systems & Software
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[180]  arXiv:2210.12059 [pdf, other]
Title: Virtual Triggering: a Technique to Segment Cryptographic Processes in Side Channel Traces
Comments: To appear at the IEEE International Workshop on Signal Processing Systems (SiPS) 2022. 6 pages, 11 figures, 2 algorithms
Journal-ref: 2022 IEEE Workshop on Signal Processing Systems (SiPS), 2022, pp. 1-6
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2210.12083 [pdf, other]
Title: Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis
Comments: 7 pages, 1 figure, 6 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[182]  arXiv:2210.12179 [pdf, other]
Title: Neural Architectural Backdoors
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[183]  arXiv:2210.12526 [pdf, other]
Title: Federated Calibration and Evaluation of Binary Classifiers
Comments: 24 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[184]  arXiv:2210.12609 [pdf, ps, other]
Title: Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[185]  arXiv:2210.12610 [pdf, other]
Title: Partially Trusting the Service Mesh Control Plane
Authors: Constantin Adam (1), Abdulhamid Adebayo (1), Hubertus Franke (1), Edward Snible (1), Tobin Feldman-Fitzthum (1), James Cadden (1), Nerla Jean-Louis (2) ((1) IBM T.J. Watson Research Center, (2) University of Illinois at Urbana-Champaign)
Subjects: Cryptography and Security (cs.CR)
[186]  arXiv:2210.12655 [pdf, other]
Title: A Trustless Architecture of Blockchain-enabled Metaverse
Comments: 7 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[187]  arXiv:2210.12776 [pdf, other]
Title: Metadata Privacy Beyond Tunneling for Instant Messaging
Comments: To appear at the 9th IEEE European Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2210.12873 [pdf, other]
Title: FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Comments: Accepted by ICLR 2023. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[189]  arXiv:2210.12877 [pdf, ps, other]
Title: A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks
Comments: 4 pages, 3 figures. Accepted to The 15th IEEE International Conference on Security of Information and Networks (SIN)
Subjects: Cryptography and Security (cs.CR)
[190]  arXiv:2210.12917 [src]
Title: A Comparative Qualitative and Quantitative Analysis of the Performance of Security Options for Message Protocols: Fog Computing Scenario
Comments: under review
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2210.12964 [pdf, other]
Title: Non-Contrastive Learning-based Behavioural Biometrics for Smart IoT Devices
Comments: NA
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[192]  arXiv:2210.13028 [pdf, other]
Title: Generalised Likelihood Ratio Testing Adversaries through the Differential Privacy Lens
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Applications (stat.AP)
[193]  arXiv:2210.13063 [pdf, other]
Title: Scalable Program Clone Search Through Spectral Analysis
Subjects: Cryptography and Security (cs.CR)
[194]  arXiv:2210.13070 [pdf, ps, other]
Title: Perception of the Environment
Authors: Martin Drasar
Comments: 3. chapter of the book "Autonomous Intelligent Agents for Cyber Defense" by Alexander Kott, to be published as a part of the book series "Advances in Information Security" by Springer
Subjects: Cryptography and Security (cs.CR)
[195]  arXiv:2210.13119 [pdf, other]
Title: Cybersecurity in the Smart Grid: Practitioners' Perspective
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[196]  arXiv:2210.13124 [pdf, other]
Title: Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Comments: Jan Wichelmann and Anna P\"atschke contributed equally to this work
Journal-ref: 32nd USENIX Security Symposium, USENIX Security 2023
Subjects: Cryptography and Security (cs.CR)
[197]  arXiv:2210.13242 [pdf, other]
Title: SurferMonkey: A Decentralized Anonymous Blockchain Intercommunication System via Zero Knowledge Proofs
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[198]  arXiv:2210.13261 [pdf, other]
Title: Physical Layer Security -- from Theory to Practice
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2210.13263 [pdf, other]
Title: Driver Locations Harvesting Attack on pRide
Subjects: Cryptography and Security (cs.CR)
[200]  arXiv:2210.13325 [pdf, other]
Title: ICSSIM-A Framework for Building Industrial Control Systems Security Simulation Testbeds
Comments: 43 pages, 13 figures
Journal-ref: Computers in Industry 148 (2023): 103906
Subjects: Cryptography and Security (cs.CR)
[201]  arXiv:2210.13376 [pdf, other]
Title: Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
Journal-ref: Entropy. 2022; 24(10):1503
Subjects: Cryptography and Security (cs.CR)
[202]  arXiv:2210.13547 [pdf, ps, other]
Title: Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions
Comments: 46 pages, 7 figures, 2 tables
Journal-ref: Security and Communication Networks, 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[203]  arXiv:2210.13660 [pdf, other]
Title: Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[204]  arXiv:2210.13682 [pdf, other]
Title: Musings on the HashGraph Protocol: Its Security and Its Limitations
Comments: 30 pages, 16 figures
Subjects: Cryptography and Security (cs.CR)
[205]  arXiv:2210.14018 [pdf, other]
Title: A White-Box Adversarial Attack Against a Digital Twin
Journal-ref: 38th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC '23)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[206]  arXiv:2210.14067 [pdf, other]
Title: ThreatCluster: Threat Clustering for Information Overload Reduction in Computer Emergency Response Teams
Comments: 11 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[207]  arXiv:2210.14072 [pdf, other]
Title: Leveraging the Verifier's Dilemma to Double Spend in Bitcoin
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[208]  arXiv:2210.14225 [pdf, other]
Title: Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[209]  arXiv:2210.14376 [pdf, other]
Title: Robustness of Locally Differentially Private Graph Analysis Against Poisoning
Comments: 22 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[210]  arXiv:2210.14408 [pdf, other]
Title: An Attention-based Long Short-Term Memory Framework for Detection of Bitcoin Scams
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[211]  arXiv:2210.14452 [pdf, ps, other]
Title: Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks
Comments: 5 pages, 2 figures. Accepted to the Hardware and Architectural Support for Security and Privacy (HASP'22), in conjunction with the 55th IEEE/ACM International Symposium on Microarchitecture (MICRO'22)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[212]  arXiv:2210.14582 [pdf, ps, other]
Title: WebCrack: Dynamic Dictionary Adjustment for Web Weak Password Detection based on Blasting Response Event Discrimination
Comments: 22 pages, 6 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[213]  arXiv:2210.14616 [src]
Title: A Late Multi-Modal Fusion Model for Detecting Hybrid Spam E-mail
Comments: The content of this paper needs to be updated
Journal-ref: Index in journal International Journal of Computer Theory and Engineering (IJCTE), 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[214]  arXiv:2210.14622 [pdf, ps, other]
Title: DEMIS: A Threat Model for Selectively Encrypted Visual Surveillance Data
Comments: 17 pages, 7 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[215]  arXiv:2210.14632 [pdf, other]
Title: Cover Reproducible Steganography via Deep Generative Models
Comments: Accepted by IEEE TDSC
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[216]  arXiv:2210.14692 [pdf, other]
Title: Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling
Comments: Updated to include amendments from peer review process. Accepted in Forensic Science International: Digital Investigation
Journal-ref: Forensic Science International: Digital Investigation, Volume 45, 2023
Subjects: Cryptography and Security (cs.CR)
[217]  arXiv:2210.14702 [pdf, other]
Title: Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System
Subjects: Cryptography and Security (cs.CR)
[218]  arXiv:2210.14833 [src]
Title: Ballot stuffing and participation privacy in pollsite voting
Comments: We are withdrawing this paper because we have further developed and expanded the "ZKP of reverse set membership" technique introduced in Section 5 of this paper in another one of our papers titled "Traceable mixnets" (arXiv:2305.08138) and do not wish the technical contributions of the two papers to overlap
Subjects: Cryptography and Security (cs.CR)
[219]  arXiv:2210.14884 [pdf, other]
Title: Do Software Security Practices Yield Fewer Vulnerabilities?
Comments: 12 pages, 2 Figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[220]  arXiv:2210.14888 [pdf, other]
Title: A Decision Framework for Blockchain Adoption
Comments: 10 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR)
[221]  arXiv:2210.14889 [pdf, other]
Title: Perfectly Secure Steganography Using Minimum Entropy Coupling
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multimedia (cs.MM)
[222]  arXiv:2210.14944 [pdf, ps, other]
Title: Detection and Prevention Against Poisoning Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[223]  arXiv:2210.14951 [pdf, other]
Title: TraVaS: Differentially Private Trace Variant Selection for Process Mining
Subjects: Cryptography and Security (cs.CR)
[224]  arXiv:2210.14993 [pdf, other]
Title: Annotating Privacy Policies in the Sharing Economy
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Software Engineering (cs.SE)
[225]  arXiv:2210.14999 [pdf, other]
Title: EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale
Authors: Eric Pauley (University of Wisconsin-Madison), Kyle Domico (Pennsylvania State University), Blaine Hoak (University of Wisconsin-Madison), Ryan Sheatsley (University of Wisconsin-Madison), Quinn Burke (University of Wisconsin-Madison), Yohan Beugin (University of Wisconsin-Madison), Patrick McDaniel (University of Wisconsin-Madison)
Subjects: Cryptography and Security (cs.CR)
[226]  arXiv:2210.15010 [pdf, other]
Title: On the Role of Risk Perceptions in Cyber Insurance Contracts
Comments: 6 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[227]  arXiv:2210.15017 [pdf, other]
Title: Accountable Safety for Rollups
Comments: 28 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[228]  arXiv:2210.15042 [pdf, other]
Title: Privately Fine-Tuning Large Language Models with Differential Privacy
Comments: Publised at IEEE ICDM Workshop on Machine Learning for Cybersecurity (MLC) 2022
Journal-ref: 2022 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 560-566
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[229]  arXiv:2210.15043 [pdf, other]
Title: Active Countermeasures for Email Fraud
Journal-ref: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[230]  arXiv:2210.15079 [pdf, ps, other]
Title: The Inconvenient Truths of Ground Truth for Binary Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[231]  arXiv:2210.15127 [pdf, other]
Title: Rethinking the Reverse-engineering of Trojan Triggers
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[232]  arXiv:2210.15130 [pdf, other]
Title: A Unified Blockchain-Semantic Framework for Wireless Edge Intelligence Enabled Web 3.0
Comments: 8 pages, 5 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[233]  arXiv:2210.15189 [pdf, other]
Title: Partially Oblivious Neural Network Inference
Comments: P. Rizomiliotis, C. Diou, A. Triakosia, I. Kyrannas and K. Tserpes. Partially oblivious neural network inference. In Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT (pp. 158-169), 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234]  arXiv:2210.15414 [pdf, other]
Title: Local Graph-homomorphic Processing for Privatized Distributed Systems
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[235]  arXiv:2210.15427 [pdf, other]
Title: Are You Stealing My Model? Sample Correlation for Fingerprinting Deep Neural Networks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[236]  arXiv:2210.15429 [pdf, other]
Title: Multi-view Representation Learning from Malware to Defend Against Adversarial Variants
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[237]  arXiv:2210.15446 [pdf, other]
Title: LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[238]  arXiv:2210.15529 [pdf, other]
Title: Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Comments: 16 pages, 12 figures, 10 tables; accepted for publication in IEEE Transactions on Mobile Computing (October 2022). arXiv admin note: substantial text overlap with arXiv:1910.09041
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[239]  arXiv:2210.15700 [pdf, other]
Title: TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems
Comments: This is a preprint of an already published journal paper
Journal-ref: Future Generation Computer Systems 138 (2023): 185-197
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[240]  arXiv:2210.15745 [pdf, other]
Title: DICTION: DynamIC robusT whIte bOx watermarkiNg scheme
Comments: 18 pages, 5 figures, PrePrint
Subjects: Cryptography and Security (cs.CR)
[241]  arXiv:2210.15911 [pdf, other]
Title: Joint Semantic Transfer Network for IoT Intrusion Detection
Comments: Accepted by IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[242]  arXiv:2210.15973 [pdf, other]
Title: A Deep Dive into VirusTotal: Characterizing and Clustering a Massive File Feed
Authors: Kevin van Liebergen (1), Juan Caballero (1), Platon Kotzias (2), Chris Gates (2) ((1) IMDEA Software Institute, (2) Norton Research Group)
Comments: 16 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[243]  arXiv:2210.16070 [pdf, ps, other]
Title: Ethereum Proof-of-Stake under Scrutiny
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[244]  arXiv:2210.16125 [pdf, ps, other]
Title: BRATsynthetic: Text De-identification using a Markov Chain Replacement Strategy for Surrogate Personal Identifying Information
Subjects: Cryptography and Security (cs.CR)
[245]  arXiv:2210.16209 [pdf, other]
Title: SoK: Not Quite Water Under the Bridge: Review of Cross-Chain Bridge Hacks
Comments: 37 pages, 15 figures
Subjects: Cryptography and Security (cs.CR)
[246]  arXiv:2210.16258 [pdf, ps, other]
Title: On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[247]  arXiv:2210.16285 [pdf, other]
Title: Multi-feature Dataset for Windows PE Malware Classification
Comments: 9 Pages, 1 Figure, 5 Tables
Subjects: Cryptography and Security (cs.CR)
[248]  arXiv:2210.16367 [pdf, other]
Title: LAKEE: A Lightweight Authenticated Key Exchange Protocol for Power Constrained Devices
Subjects: Cryptography and Security (cs.CR)
[249]  arXiv:2210.16595 [pdf, other]
Title: BEPHAP: A Blockchain-Based Efficient Privacy-Preserving Handover Authentication Protocol with Key Agreement for Internet of Vehicles
Comments: 14 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[250]  arXiv:2210.16610 [pdf, ps, other]
Title: Optimistic and Validity Rollups: Analysis and Comparison between Optimism and StarkNet
Authors: Luca Donno
Comments: 61 pages
Subjects: Cryptography and Security (cs.CR)
[251]  arXiv:2210.17376 [pdf, other]
Title: SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability
Comments: 12 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252]  arXiv:2210.17390 [pdf, other]
Title: Latent Semantic Structure in Malicious Programs
Comments: 11 pages, 5 figures
Journal-ref: Springer Nature Switzerland, Communications in Computer and Information Science (CCIS, volume 1761), MDIS 2022, pp 234,246
Subjects: Cryptography and Security (cs.CR)
[253]  arXiv:2210.17399 [pdf, other]
Title: Do You Really Need to Disguise Normal Servers as Honeypots?
Comments: This paper is accepted to the IEEE Military Communications Conference (MILCOM) 2022
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[254]  arXiv:2210.17520 [pdf, ps, other]
Title: Fully Adaptive Composition for Gaussian Differential Privacy
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[255]  arXiv:2210.00036 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Bias-Term only Fine-tuning of Foundation Models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[256]  arXiv:2210.00038 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Optimization on Large Model at Small Cost
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[257]  arXiv:2210.00053 (cross-list from cs.LG) [pdf, other]
Title: Kernel Normalized Convolutional Networks for Privacy-Preserving Machine Learning
Comments: To appear in the IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), February 2023
Journal-ref: 1st IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[258]  arXiv:2210.00108 (cross-list from cs.LG) [pdf, other]
Title: ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks
Comments: 10 pages, 7 figures, to be published in IEEE Secure and Trustworthy Machine Learning 2024. For website see this https URL . For source code, see this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[259]  arXiv:2210.00127 (cross-list from cs.CV) [pdf, ps, other]
Title: Robust Person Identification: A WiFi Vision-based Approach
Authors: Yili Ren, Jie Yang
Comments: 18 pages, USENIX Security '23
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[260]  arXiv:2210.00160 (cross-list from cs.SI) [pdf, other]
Title: Explaining Website Reliability by Visualizing Hyperlink Connectivity
Comments: Accepted at IEEE VIS 2022, 5 pages, 4 figures, For a live demo, visit this https URL
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[261]  arXiv:2210.00292 (cross-list from cs.LG) [pdf, other]
Title: DeltaBound Attack: Efficient decision-based attack in low queries regime
Authors: Lorenzo Rossi
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[262]  arXiv:2210.00430 (cross-list from cs.LG) [pdf, other]
Title: Understanding Adversarial Robustness Against On-manifold Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[263]  arXiv:2210.00538 (cross-list from cs.LG) [pdf, other]
Title: Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[264]  arXiv:2210.00665 (cross-list from cs.LG) [pdf, other]
Title: Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms
Authors: Ming Xiang, Lili Su
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[265]  arXiv:2210.00743 (cross-list from cs.CL) [pdf, other]
Title: An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks
Comments: Accepted at AACL-IJCNLP 2022 (Fig. 1 updated)
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[266]  arXiv:2210.01288 (cross-list from cs.LG) [pdf, other]
Title: Strength-Adaptive Adversarial Training
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[267]  arXiv:2210.01318 (cross-list from cs.LG) [pdf, other]
Title: OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[268]  arXiv:2210.01451 (cross-list from cs.LG) [pdf, ps, other]
Title: Certified Data Removal in Sum-Product Networks
Comments: Accepted at ICKG 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[269]  arXiv:2210.01785 (cross-list from cs.LG) [pdf, other]
Title: TabLeak: Tabular Data Leakage in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[270]  arXiv:2210.01834 (cross-list from cs.LG) [pdf, other]
Title: Invariant Aggregator for Defending against Federated Backdoor Attacks
Comments: AISTATS 2024 camera-ready
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[271]  arXiv:2210.01864 (cross-list from cs.LG) [pdf, other]
Title: Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[272]  arXiv:2210.01913 (cross-list from cs.DC) [pdf, ps, other]
Title: Comparative Study of Blockchain Development Platforms: Features and Applications
Comments: 25 pages, 8 tables, 52 references, preprint
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[273]  arXiv:2210.01940 (cross-list from cs.LG) [pdf, other]
Title: On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses
Comments: Accepted to the 36th Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[274]  arXiv:2210.01953 (cross-list from cs.LG) [pdf, other]
Title: Robust Fair Clustering: A Novel Fairness Attack and Defense Framework
Comments: Accepted to the 11th International Conference on Learning Representations (ICLR 2023)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[275]  arXiv:2210.01961 (cross-list from cs.LG) [pdf, other]
Title: Split Federated Learning on Micro-controllers: A Keyword Spotting Showcase
Comments: A demo of SFL for MCU (preliminary work)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[276]  arXiv:2210.01985 (cross-list from cs.LG) [pdf, other]
Title: A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems
Comments: Published in IEEE Transactions on Industrial Informatics (Q1, IF: 11.648); Code is available at Github link: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[277]  arXiv:2210.02017 (cross-list from cs.SI) [pdf, other]
Title: Infectious Probability Analysis on COVID-19 Spreading with Wireless Edge Networks
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[278]  arXiv:2210.02137 (cross-list from cs.CY) [pdf, other]
Title: Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT
Comments: This is an extended version of our USENIX Security '23 paper
Journal-ref: USENIX Security 2023
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[279]  arXiv:2210.02156 (cross-list from cs.LG) [pdf, ps, other]
Title: Fine-Tuning with Differential Privacy Necessitates an Additional Hyperparameter Search
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[280]  arXiv:2210.02215 (cross-list from cs.LG) [pdf, ps, other]
Title: On the Statistical Complexity of Estimation and Testing under Privacy Constraints
Authors: Clément Lalanne (DANTE, OCKHAM), Aurélien Garivier (UMPA-ENSL), Rémi Gribonval (DANTE, OCKHAM)
Journal-ref: Transactions on Machine Learning Research Journal, 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[281]  arXiv:2210.02235 (cross-list from cs.LG) [pdf, other]
Title: Over-the-Air Federated Learning with Privacy Protection via Correlated Additive Perturbations
Comments: 8 pages, 4 figures, Allerton 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[282]  arXiv:2210.02437 (cross-list from cs.SD) [pdf, other]
Title: ASVspoof 2021: Towards Spoofed and Deepfake Speech Detection in the Wild
Comments: IEEE/ACM Transactions on Audio, Speech, and Language Processing
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Multimedia (cs.MM); Audio and Speech Processing (eess.AS)
[283]  arXiv:2210.02447 (cross-list from cs.LG) [pdf, other]
Title: Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models
Comments: Accepted by NeurIPS 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[284]  arXiv:2210.02577 (cross-list from cs.LG) [pdf, other]
Title: A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition
Comments: 16 pages, 5 figures, and 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2210.02680 (cross-list from cs.LG) [pdf, ps, other]
Title: DReS-FL: Dropout-Resilient Secure Federated Learning for Non-IID Clients via Secret Data Sharing
Comments: This paper was accepted to NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[286]  arXiv:2210.02713 (cross-list from cs.LG) [pdf, ps, other]
Title: On Optimal Learning Under Targeted Data Poisoning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[287]  arXiv:2210.02746 (cross-list from cs.SD) [pdf, other]
Title: The Sound of Silence: Efficiency of First Digit Features in Synthetic Audio Detection
Comments: Accepted at WIFS 2022
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[288]  arXiv:2210.02912 (cross-list from cs.LG) [pdf, other]
Title: CANIFE: Crafting Canaries for Empirical Privacy Measurement in Federated Learning
Comments: Accepted to ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[289]  arXiv:2210.03403 (cross-list from cs.LG) [pdf, other]
Title: TAN Without a Burn: Scaling Laws of DP-SGD
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[290]  arXiv:2210.03465 (cross-list from cs.ET) [pdf, other]
Title: Physics inspired compact modelling of BiFeO$_3$ based memristors for hardware security applications
Comments: 13 pages and 8 figures
Subjects: Emerging Technologies (cs.ET); Mesoscale and Nanoscale Physics (cond-mat.mes-hall); Cryptography and Security (cs.CR); Computational Physics (physics.comp-ph)
[291]  arXiv:2210.03505 (cross-list from cs.LG) [pdf, other]
Title: Sample-Efficient Personalization: Modeling User Parameters as Low Rank Plus Sparse Components
Comments: 104 pages, 7 figures, 2 Tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[292]  arXiv:2210.03831 (cross-list from cs.DS) [pdf, ps, other]
Title: How to Make Your Approximation Algorithm Private: A Black-Box Differentially-Private Transformation for Tunable Approximation Algorithms of Functions with Low Sensitivity
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[293]  arXiv:2210.03843 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Deep Learning with ModelMix
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[294]  arXiv:2210.03895 (cross-list from cs.CV) [pdf, other]
Title: ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints
Comments: NeurIPS 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[295]  arXiv:2210.04061 (cross-list from cs.IT) [pdf, other]
Title: A General Security Approach for Soft-information Decoding against Smart Bursty Jammers
Comments: Accepted for GLOBECOM 2022 Workshops. Contains 7 pages and 7 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[296]  arXiv:2210.04087 (cross-list from cs.LG) [pdf, other]
Title: Symmetry Defense Against CNN Adversarial Perturbation Attacks
Authors: Blerta Lindqvist
Comments: 19 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[297]  arXiv:2210.04311 (cross-list from cs.LG) [pdf, other]
Title: Pruning Adversarially Robust Neural Networks without Adversarial Examples
Comments: Published at ICDM 2022 as a conference paper
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[298]  arXiv:2210.04442 (cross-list from cs.LG) [pdf, ps, other]
Title: DPAR: Decoupled Graph Neural Networks with Node-Level Differential Privacy
Comments: Accepted to The 2024 Web Conference
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[299]  arXiv:2210.04569 (cross-list from cs.HC) [pdf, other]
Title: Systematic Evaluation and User Study of Privacy of Default Apps in Apple's Mobile Ecosystem
Comments: 23 pages, 1 Figure
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[300]  arXiv:2210.04607 (cross-list from cs.DC) [pdf, ps, other]
Title: A Snapshot of the Frontiers of Client Selection in Federated Learning
Comments: 17 pages, 3 figures, 1 appendix, accepted to TMLR
Journal-ref: Transactions on Machine Learning Research, 2022
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[301]  arXiv:2210.04610 (cross-list from cs.AI) [pdf, other]
Title: Red-Teaming the Stable Diffusion Safety Filter
Comments: ML Safety Workshop NeurIPS 2022
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (cs.LG)
[302]  arXiv:2210.04688 (cross-list from cs.LG) [pdf, other]
Title: BAFFLE: Hiding Backdoors in Offline Reinforcement Learning Datasets
Comments: Accepted at IEEE S&P (Oakland) 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[303]  arXiv:2210.04817 (cross-list from cs.LG) [pdf, ps, other]
Title: Do you pay for Privacy in Online learning?
Comments: This is an updated version with i) clearer problem statements especially in proposed Theorem 1 and ii) clearer discussion of existing work especially Golowich and Livni (2021). Conference on Learning Theory. PMLR, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[304]  arXiv:2210.04871 (cross-list from cs.LG) [pdf, other]
Title: Certified Training: Small Boxes are All You Need
Comments: Accepted at ICLR23 as Spotlight
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[305]  arXiv:2210.05577 (cross-list from cs.LG) [pdf, other]
Title: What Can the Neural Tangent Kernel Tell Us About Adversarial Robustness?
Comments: NeurIPS 2022; added link to GitHub repository
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[306]  arXiv:2210.05813 (cross-list from cs.SE) [pdf, ps, other]
Title: Software Supply Chain Attribute Integrity (SCAI)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[307]  arXiv:2210.05927 (cross-list from cs.LG) [pdf, other]
Title: Efficient Adversarial Training without Attacking: Worst-Case-Aware Robust Reinforcement Learning
Comments: 36th Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[308]  arXiv:2210.05929 (cross-list from cs.LG) [pdf, other]
Title: Few-shot Backdoor Attacks via Neural Tangent Kernels
Comments: 20 pages, 13 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[309]  arXiv:2210.05968 (cross-list from cs.CV) [pdf, other]
Title: Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation
Comments: NeurIPS 2022 conference paper
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[310]  arXiv:2210.06241 (cross-list from cs.IT) [pdf, ps, other]
Title: Two conjectures on the largest minimum distances of binary self-orthogonal codes with dimension 5
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[311]  arXiv:2210.06284 (cross-list from cs.CV) [pdf, other]
Title: Visual Prompting for Adversarial Robustness
Comments: ICASSP 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[312]  arXiv:2210.06529 (cross-list from cs.CV) [pdf, other]
Title: Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles
Comments: 16 pages. Accepted for publication in IEEE TIFS
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[313]  arXiv:2210.06593 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Online-to-Batch for Smooth Losses
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[314]  arXiv:2210.06614 (cross-list from cs.LG) [pdf, other]
Title: Anomaly Detection via Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[315]  arXiv:2210.06729 (cross-list from cs.LG) [pdf, other]
Title: A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems
Comments: Accepted for publication in IEEE Transactions on Information Forensics and Security
Journal-ref: IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3934-3945, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Signal Processing (eess.SP); Systems and Control (eess.SY)
[316]  arXiv:2210.06894 (cross-list from cs.LG) [pdf, other]
Title: Dim-Krum: Backdoor-Resistant Federated Learning for NLP with Dimension-wise Krum-Based Aggregation
Comments: Accepted by Findings of EMNLP 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[317]  arXiv:2210.07302 (cross-list from cs.DC) [pdf, other]
Title: Deep Reinforcement Learning-based Rebalancing Policies for Profit Maximization of Relay Nodes in Payment Channel Networks
Comments: Best Paper Award at the 4th International Conference on Mathematical Research for the Blockchain Economy (MARBLE 2023). 28 pages; minor language edits and fixes; acknowledgments added; results unchanged
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[318]  arXiv:2210.07321 (cross-list from cs.CL) [pdf, other]
Title: Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods
Comments: Manuscript submitted to ACM Special Session on Trustworthy AI. 2022/11/19 - Updated references
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[319]  arXiv:2210.07741 (cross-list from cs.DL) [pdf, ps, other]
Title: E-Resource Management and Management Issues and Challenges
Subjects: Digital Libraries (cs.DL); Cryptography and Security (cs.CR)
[320]  arXiv:2210.07990 (cross-list from cs.DB) [pdf, other]
Title: Metaverse: Survey, Applications, Security, and Opportunities
Comments: Preprint. 5 figures, 4 tables
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[321]  arXiv:2210.08034 (cross-list from cs.SI) [pdf, other]
Title: Empirical Network Structure of Malicious Programs
Comments: 13 pages, 7 figures
Journal-ref: Advances in Artificial Intelligence and Machine Learning, Volume 4, 1, pp 112, 2024
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[322]  arXiv:2210.08295 (cross-list from cs.AI) [pdf, other]
Title: A Secure Federated Data-Driven Evolutionary Multi-objective Optimization Algorithm
Comments: This paper has been accepted by IEEE Transactions on Emerging Topics in Computational Intelligence journal
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[323]  arXiv:2210.08371 (cross-list from cs.LG) [pdf, ps, other]
Title: Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability
Comments: ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[324]  arXiv:2210.08372 (cross-list from cs.GT) [pdf, other]
Title: An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version)
Comments: 62 pages, 9 figures, 19 tables
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[325]  arXiv:2210.08464 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning with Privacy-Preserving Ensemble Attention Distillation
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[326]  arXiv:2210.08579 (cross-list from cs.LG) [pdf, other]
Title: Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[327]  arXiv:2210.08596 (cross-list from eess.SY) [pdf, other]
Title: Logical Zonotopes: A Set Representation for the Formal Verification of Boolean Functions
Comments: This paper is accepted at the 62nd IEEE Conference on Decision and Control (CDC 2023)
Subjects: Systems and Control (eess.SY); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[328]  arXiv:2210.08643 (cross-list from cs.LG) [pdf, other]
Title: A General Framework for Auditing Differentially Private Machine Learning
Comments: NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[329]  arXiv:2210.08781 (cross-list from cs.LG) [pdf, other]
Title: Stochastic Differentially Private and Fair Learning
Comments: ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[330]  arXiv:2210.08846 (cross-list from eess.SY) [pdf, other]
Title: Sample Identifying Complexity of Encrypted Control Systems Under Least Squares Identification
Comments: 6 pages, 5 figures
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[331]  arXiv:2210.08849 (cross-list from eess.SY) [pdf, other]
Title: Towards Provably Secure Encrypted Control Using Homomorphic Encryption
Comments: 6 pages, 2 figures
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[332]  arXiv:2210.08958 (cross-list from cs.CY) [pdf, ps, other]
Title: Chat Control or Child Protection?
Authors: Ross Anderson
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[333]  arXiv:2210.09305 (cross-list from cs.LG) [pdf, other]
Title: Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning
Comments: Code is available at \url{this https URL}
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[334]  arXiv:2210.09364 (cross-list from cs.LG) [pdf, other]
Title: Probabilistic Categorical Adversarial Attack & Adversarial Training
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[335]  arXiv:2210.09405 (cross-list from cs.LG) [pdf, other]
Title: Towards Generating Adversarial Examples on Mixed-type Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[336]  arXiv:2210.09439 (cross-list from cs.LG) [pdf, other]
Title: CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[337]  arXiv:2210.09503 (cross-list from cs.LG) [pdf, other]
Title: Towards Fair Classification against Poisoning Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[338]  arXiv:2210.09545 (cross-list from cs.CL) [pdf, other]
Title: Fine-mixing: Mitigating Backdoors in Fine-tuned Language Models
Comments: Accepted by Findings of EMNLP 2022
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[339]  arXiv:2210.09671 (cross-list from cs.LG) [pdf, other]
Title: Not All Poisons are Created Equal: Robust Training against Data Poisoning
Journal-ref: Proceedings of the 39th International Conference on Machine Learning, PMLR 162:25154-25165, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[340]  arXiv:2210.09852 (cross-list from cs.LG) [pdf, other]
Title: Scaling Adversarial Training to Large Perturbation Bounds
Comments: ECCV 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[341]  arXiv:2210.09904 (cross-list from cs.LG) [pdf, other]
Title: MaSS: Multi-attribute Selective Suppression
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[342]  arXiv:2210.09917 (cross-list from cs.AI) [pdf, other]
Title: Controllable Fake Document Infilling for Cyber Deception
Comments: Findings of EMNLP 2022
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[343]  arXiv:2210.10253 (cross-list from cs.LG) [pdf, other]
Title: On the Adversarial Robustness of Mixture of Experts
Comments: Accepted to NeurIPS 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[344]  arXiv:2210.10272 (cross-list from cs.LG) [pdf, other]
Title: Training set cleansing of backdoor poisoning by self-supervised representation learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[345]  arXiv:2210.10581 (cross-list from cs.CL) [pdf, other]
Title: CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[346]  arXiv:2210.10683 (cross-list from cs.CL) [pdf, other]
Title: Why Should Adversarial Perturbations be Imperceptible? Rethink the Research Paradigm in Adversarial NLP
Comments: Accepted to EMNLP 2022, main conference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[347]  arXiv:2210.10750 (cross-list from cs.LG) [pdf, other]
Title: Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries
Comments: Code is available at this https URL, published as a conference paper at ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[348]  arXiv:2210.10880 (cross-list from cs.LG) [pdf, other]
Title: Learning to Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[349]  arXiv:2210.10886 (cross-list from cs.CV) [pdf, other]
Title: Backdoor Attack and Defense in Federated Generative Adversarial Network-based Medical Image Synthesis
Comments: 25 pages, 7 figures. arXiv admin note: text overlap with arXiv:2207.00762
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[350]  arXiv:2210.11082 (cross-list from cs.CL) [pdf, other]
Title: Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[351]  arXiv:2210.11673 (cross-list from cs.SI) [pdf, other]
Title: Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[352]  arXiv:2210.11774 (cross-list from cs.IT) [pdf, ps, other]
Title: Left ideal LRPC codes and a ROLLO-type cryptosystem based on group algebras
Comments: This is an extended abstract. Comments are welcome!
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[353]  arXiv:2210.11783 (cross-list from cs.SE) [pdf, other]
Title: DARWIN: Survival of the Fittest Fuzzing Mutators
Journal-ref: Annual Network and Distributed System Security Symposium, NDSS, 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[354]  arXiv:2210.11928 (cross-list from cs.GT) [pdf, other]
Title: Rational Ponzi Games in Algorithmic Stablecoin
Comments: Accepted by CryptoEx@ICBC 2023
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[355]  arXiv:2210.12051 (cross-list from cs.LG) [pdf, other]
Title: The privacy issue of counterfactual explanations: explanation linkage attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[356]  arXiv:2210.12408 (cross-list from cs.DC) [pdf, ps, other]
Title: Fast Abstracts and Student Forum Proceedings, 18th European Dependable Computing Conference -- EDCC 2022
Comments: Editors: Ib\'eria Medeiros and Geert Deconinck
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[357]  arXiv:2210.12598 (cross-list from cs.LG) [pdf, other]
Title: GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[358]  arXiv:2210.12881 (cross-list from cs.DC) [pdf, other]
Title: A Control Theoretic Approach to Infrastructure-Centric Blockchain Tokenomics
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computers and Society (cs.CY); General Economics (econ.GN); Systems and Control (eess.SY)
[359]  arXiv:2210.12916 (cross-list from cs.IT) [pdf, ps, other]
Title: Explaining epsilon in local differential privacy through the lens of quantitative information flow
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[360]  arXiv:2210.12952 (cross-list from cs.LG) [pdf, other]
Title: Ares: A System-Oriented Wargame Framework for Adversarial ML
Comments: Presented at the DLS Workshop at S&P 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[361]  arXiv:2210.13235 (cross-list from cs.LG) [pdf, other]
Title: Chaos Theory and Adversarial Robustness
Authors: Jonathan S. Kent
Comments: 14 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Dynamical Systems (math.DS)
[362]  arXiv:2210.13289 (cross-list from cs.AI) [pdf, other]
Title: Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses
Comments: 24 pages, 11 figures
Journal-ref: ACM Computing Surveys (2023)
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[363]  arXiv:2210.13386 (cross-list from cs.IT) [pdf, other]
Title: Contraction of Locally Differentially Private Mechanisms
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Statistics Theory (math.ST); Machine Learning (stat.ML)
[364]  arXiv:2210.13457 (cross-list from cs.LG) [pdf, other]
Title: Mixed Precision Quantization to Tackle Gradient Leakage Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[365]  arXiv:2210.13537 (cross-list from cs.LG) [pdf, ps, other]
Title: Private Online Prediction from Experts: Separations and Faster Rates
Comments: Removed the results for the realizable setting which we uploaded with additional results for that setting in a separate paper. Added a proof sketch for the lower bound
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[366]  arXiv:2210.13631 (cross-list from cs.LG) [pdf, other]
Title: On the Robustness of Dataset Inference
Comments: 19 pages; Accepted to Transactions on Machine Learning Research 06/2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[367]  arXiv:2210.13662 (cross-list from cs.LG) [pdf, other]
Title: Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[368]  arXiv:2210.13710 (cross-list from cs.LG) [pdf, other]
Title: Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[369]  arXiv:2210.13762 (cross-list from cs.LG) [pdf, other]
Title: Towards Robust Recommender Systems via Triple Cooperative Defense
Comments: 15 pages, 4 figures, 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[370]  arXiv:2210.13801 (cross-list from cs.CV) [pdf, other]
Title: Deep Boosting Robustness of DNN-based Image Watermarking via DBMark
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[371]  arXiv:2210.13815 (cross-list from cs.LG) [pdf, other]
Title: FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[372]  arXiv:2210.13918 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Language Models for Secure Data Sharing
Comments: Accepted at EMNLP 2022
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[373]  arXiv:2210.13982 (cross-list from cs.LG) [pdf, other]
Title: Hindering Adversarial Attacks with Implicit Neural Representations
Journal-ref: PMLR 162 (2022) 18910-18934
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[374]  arXiv:2210.14003 (cross-list from cs.PF) [pdf, ps, other]
Title: Dynamic Practical Byzantine Fault Tolerance and Its Blockchain System: A Large-Scale Markov Modeling
Comments: 46 pages, 13 figures
Subjects: Performance (cs.PF); Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR)
[375]  arXiv:2210.14164 (cross-list from cs.CV) [pdf, other]
Title: No-Box Attacks on 3D Point Cloud Classification
Comments: 10 pages, 6 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[376]  arXiv:2210.14229 (cross-list from cs.LG) [pdf, other]
Title: Causal Information Bottleneck Boosts Adversarial Robustness of Deep Neural Network
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[377]  arXiv:2210.14283 (cross-list from cs.LG) [pdf, other]
Title: Accelerating Certified Robustness Training via Knowledge Transfer
Comments: NeurIPS '22 Camera Ready version (with appendix)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[378]  arXiv:2210.14315 (cross-list from cs.LG) [pdf, ps, other]
Title: Streaming Submodular Maximization with Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[379]  arXiv:2210.14348 (cross-list from cs.CL) [pdf, other]
Title: Synthetic Text Generation with Differential Privacy: A Simple and Practical Recipe
Comments: ACL 2023 Main Conference (Honorable Mention)
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[380]  arXiv:2210.14404 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Purification with the Manifold Hypothesis
Comments: Extended version of paper accepted at AAAI 2024 with supplementary materials
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[381]  arXiv:2210.14405 (cross-list from cs.CV) [pdf, other]
Title: Adversarially Robust Medical Classification via Attentive Convolutional Neural Networks
Authors: Isaac Wasserman
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[382]  arXiv:2210.15011 (cross-list from cs.GT) [pdf, other]
Title: Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment
Comments: Accepted at GameSec 2022
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[383]  arXiv:2210.15140 (cross-list from cs.SD) [pdf, other]
Title: V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Authors: Jiangyi Deng (1), Fei Teng (1), Yanjiao Chen (1), Xiaofu Chen (2), Zhaohui Wang (2), Wenyuan Xu (1) ((1) Zhejiang University, (2) Wuhan University)
Comments: Accepted by USENIX Security Symposium 2023
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[384]  arXiv:2210.15175 (cross-list from cs.LG) [pdf, ps, other]
Title: Private Isotonic Regression
Comments: Neural Information Processing Systems (NeurIPS), 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[385]  arXiv:2210.15178 (cross-list from cs.DS) [pdf, ps, other]
Title: Anonymized Histograms in Intermediate Privacy Models
Comments: Neural Information Processing Systems (NeurIPS), 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[386]  arXiv:2210.15291 (cross-list from cs.CV) [pdf, other]
Title: Isometric 3D Adversarial Examples in the Physical World
Comments: NeurIPS 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[387]  arXiv:2210.15469 (cross-list from cs.SE) [pdf, other]
Title: Learning Failure-Inducing Models for Testing Software-Defined Networks
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[388]  arXiv:2210.15614 (cross-list from cs.LG) [pdf, other]
Title: Private and Reliable Neural Network Inference
Comments: In ACM Conference on Computer and Communications Security (CCS 2022)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[389]  arXiv:2210.15865 (cross-list from cs.LG) [pdf, other]
Title: Completely Heterogeneous Federated Learning
Comments: Submitted to ICASSP 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[390]  arXiv:2210.15997 (cross-list from cs.LG) [pdf, other]
Title: Universal Adversarial Directions
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[391]  arXiv:2210.16205 (cross-list from cs.LG) [pdf, other]
Title: Local Model Reconstruction Attacks in Federated Learning and their Uses
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[392]  arXiv:2210.16242 (cross-list from cs.LG) [pdf, other]
Title: Differential Privacy has Bounded Impact on Fairness in Classification
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[393]  arXiv:2210.16346 (cross-list from cs.LG) [pdf, other]
Title: Improving Hyperspectral Adversarial Robustness Under Multiple Attacks
Comments: 6 pages, 2 figures, 1 table, 1 algorithm
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[394]  arXiv:2210.16395 (cross-list from cs.GT) [pdf, ps, other]
Title: Ensure Differential Privacy and Convergence Accuracy in Consensus Tracking and Aggregative Games with Coupling Constraints
Authors: Yongqiang Wang
Comments: arXiv admin note: text overlap with arXiv:2209.01486
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[395]  arXiv:2210.16424 (cross-list from cs.LG) [pdf, other]
Title: Machine Unlearning of Federated Clusters
Comments: 27 pages. ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[396]  arXiv:2210.16441 (cross-list from cs.LG) [pdf, ps, other]
Title: GowFed -- A novel Federated Network Intrusion Detection System
Comments: 16 pages, 12 figures, currently under review at Journal of Network and Computer Applications (JNCA). arXiv admin note: text overlap with arXiv:2204.12443
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[397]  arXiv:2210.16777 (cross-list from cs.SD) [pdf, other]
Title: Symmetric Saliency-based Adversarial Attack To Speaker Identification
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[398]  arXiv:2210.17070 (cross-list from cs.LG) [pdf, ps, other]
Title: Private optimization in the interpolation regime: faster rates and hardness results
Comments: published at ICML 2022; 25 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[399]  arXiv:2210.17228 (cross-list from cs.LG) [pdf, other]
Title: VertiBayes: Learning Bayesian network parameters from vertically partitioned data with missing values
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[400]  arXiv:2210.17511 (cross-list from cs.CY) [pdf, other]
Title: Examining the Landscape of Digital Safety and Privacy Assistance for Black Communities
Comments: Appears in the Workshop on Inclusive Privacy and Security (WIPS) 2021 co-located with Symposium on Usable Privacy and Security (SOUPS)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[401]  arXiv:2210.00874 (cross-list from math.OC) [pdf, other]
Title: Stability Via Adversarial Training of Neural Network Stochastic Control of Mean-Field Type
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY); Probability (math.PR)
[402]  arXiv:2210.01160 (cross-list from math.NT) [pdf, ps, other]
Title: On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
Comments: 18 pp
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[403]  arXiv:2210.01636 (cross-list from quant-ph) [pdf, ps, other]
Title: Long-Range QKD without Trusted Nodes is Not Possible with Current Technology
Comments: 9 pages, 2 figures and 1 table
Journal-ref: npj Quantum Inf 8, 108 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[404]  arXiv:2210.02241 (cross-list from eess.IV) [pdf, other]
Title: HeartSpot: Privatized and Explainable Data Compression for Cardiomegaly Detection
Comments: Accepted to IEEE-EMBS International Conference on Biomedical and Health Informatics 2022. IEEE copyrights may apply
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[405]  arXiv:2210.03394 (cross-list from quant-ph) [pdf, ps, other]
Title: One-Wayness in Quantum Cryptography
Comments: 49 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[406]  arXiv:2210.03581 (cross-list from eess.AS) [pdf, ps, other]
Title: Synthetic Voice Detection and Audio Splicing Detection using SE-Res2Net-Conformer Architecture
Comments: Accepted by the 13th International Symposium on Chinese Spoken Language Processing (ISCSLP 2022)
Subjects: Audio and Speech Processing (eess.AS); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[407]  arXiv:2210.03612 (cross-list from stat.ML) [pdf, ps, other]
Title: 1st ICLR International Workshop on Privacy, Accountability, Interpretability, Robustness, Reasoning on Structured Data (PAIR^2Struct)
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[408]  arXiv:2210.04194 (cross-list from q-fin.PM) [pdf, other]
Title: Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols
Authors: Jiahua Xu, Yebo Feng
Journal-ref: IEEE Transactions on Network and Service Management, 2022
Subjects: Portfolio Management (q-fin.PM); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Risk Management (q-fin.RM)
[409]  arXiv:2210.05138 (cross-list from quant-ph) [pdf, ps, other]
Title: Commitments to Quantum States
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[410]  arXiv:2210.05978 (cross-list from quant-ph) [pdf, ps, other]
Title: From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments
Comments: 51 pages
Journal-ref: Eurocrypt 2023
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[411]  arXiv:2210.06093 (cross-list from quant-ph) [pdf, other]
Title: Post-Quantum Zero-Knowledge with Space-Bounded Simulation
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[412]  arXiv:2210.06140 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Bootstrap: New Privacy Analysis and Inference Strategies
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[413]  arXiv:2210.06179 (cross-list from eess.IV) [pdf, other]
Title: Convolutional Neural Network-Based Image Watermarking using Discrete Wavelet Transform
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[414]  arXiv:2210.06454 (cross-list from quant-ph) [pdf, other]
Title: Quantum Depth in the Random Oracle Model
Comments: 104 pages (+ 9 page Appendix), 10 figures
Journal-ref: STOC 2023
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[415]  arXiv:2210.06459 (cross-list from math.ST) [pdf, other]
Title: Differentially private multivariate medians
Comments: 42 pages, 3 figures, 2 tables
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[416]  arXiv:2210.06687 (cross-list from stat.ME) [pdf, other]
Title: RWN: A Novel Neighborhood-Based Method for Statistical Disclosure Control
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[417]  arXiv:2210.06693 (cross-list from quant-ph) [pdf, other]
Title: Non-uniformity and Quantum Advice in the Quantum Random Oracle Model
Authors: Qipeng Liu
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[418]  arXiv:2210.07723 (cross-list from stat.ML) [pdf, other]
Title: Privacy-Preserving and Lossless Distributed Estimation of High-Dimensional Generalized Additive Mixed Models
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[419]  arXiv:2210.08165 (cross-list from quant-ph) [pdf, ps, other]
Title: A Secure Multiparty Quantum Least Common Multiple Computation Protocol
Authors: Zixian Li, Wenjie Liu
Comments: 16 pages, 0 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[420]  arXiv:2210.08977 (cross-list from quant-ph) [pdf, other]
Title: On the Security of Offloading Post-Processing for Quantum Key Distribution
Comments: 17 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[421]  arXiv:2210.09929 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Diffusion Models
Comments: Accepted at TMLR (this https URL)
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[422]  arXiv:2210.09975 (cross-list from eess.AS) [pdf, ps, other]
Title: Risk of re-identification for shared clinical speech recordings
Comments: 24 pages, 6 figures
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD)
[423]  arXiv:2210.10143 (cross-list from quant-ph) [pdf, ps, other]
Title: Lattice-Based Quantum Advantage from Rotated Measurements
Comments: 35 pages. v2: added a future directions section and changed the formatting of the paper
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[424]  arXiv:2210.12840 (cross-list from math.NT) [pdf, ps, other]
Title: Radical isogenies and modular curves
Comments: Second version - structural and grammatical changes, 19 pages, comments welcome
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[425]  arXiv:2210.13278 (cross-list from quant-ph) [pdf, ps, other]
Title: Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography
Comments: 6 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[426]  arXiv:2210.14265 (cross-list from quant-ph) [pdf, other]
Title: Uncloneable Cryptography
Authors: Or Sattath
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[427]  arXiv:2210.14942 (cross-list from q-fin.ST) [pdf, other]
Title: The Art NFTs and Their Marketplaces
Subjects: Statistical Finance (q-fin.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[428]  arXiv:2210.14995 (cross-list from eess.AS) [pdf, other]
Title: Privacy-preserving Automatic Speaker Diarization
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[429]  arXiv:2210.15396 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum security of subset cover problems
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[430]  arXiv:2210.15439 (cross-list from stat.ML) [pdf, ps, other]
Title: Learning versus Refutation in Noninteractive Local Differential Privacy
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[431]  arXiv:2210.15785 (cross-list from q-fin.RM) [pdf, other]
Title: Supply Chain Characteristics as Predictors of Cyber Risk: A Machine-Learning Assessment
Authors: Kevin Hu (1), Retsef Levi (1), Raphael Yahalom (1), El Ghali Zerhouni (1) ((1) Massachusetts Institute of Technology)
Subjects: Risk Management (q-fin.RM); Cryptography and Security (cs.CR)
[432]  arXiv:2210.15819 (cross-list from math.ST) [pdf, other]
Title: Instance-Optimal Differentially Private Estimation
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[433]  arXiv:2210.15961 (cross-list from stat.ML) [pdf, other]
Title: DPVIm: Differentially Private Variational Inference Improved
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[434]  arXiv:2210.17338 (cross-list from eess.AS) [pdf, ps, other]
Title: VoicePrivacy 2022 System Description: Speaker Anonymization with Feature-matched F0 Trajectories
Comments: 4 pages, 4 figures, 2 tables, submitted to VoicePrivacy Challenge 2022
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[ total of 435 entries: 1-434 | 435 ]
[ showing 434 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)