We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 23

[ total of 144 entries: 1-10 | 4-13 | 14-23 | 24-33 | 34-43 | 44-53 | 54-63 | ... | 144 ]
[ showing 10 entries per page: fewer | more | all ]

Fri, 7 Jun 2024 (continued, showing 10 of 24 entries)

[24]  arXiv:2406.03802 [pdf, other]
Title: Continual Counting with Gradual Privacy Expiration
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[25]  arXiv:2406.03786 [pdf, other]
Title: Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring
Comments: 6 pages, 7 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2406.03785 [pdf, other]
Title: Count-mean Sketch as an Optimized Framework for Frequency Estimation with Local Differential Privacy
Authors: Mingen Pan
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2406.03718 [pdf, other]
Title: Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Comments: Accepted to ACL 2024 Findings
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[28]  arXiv:2406.03695 [pdf, other]
Title: FACOS: Enabling Privacy Protection Through Fine-Grained Access Control with On-chain and Off-chain System
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2406.03608 [pdf, other]
Title: Fantastyc: Blockchain-based Federated Learning Made Secure and Practical
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[30]  arXiv:2406.03559 [pdf, ps, other]
Title: Stateless and Non-Interactive Order-Preserving Encryption for Outsourced Databases through Subtractive Homomorphism
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[31]  arXiv:2406.03516 [pdf, other]
Title: Buffered Asynchronous Secure Aggregation for Cross-Device Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[32]  arXiv:2406.04227 (cross-list from cs.LG) [pdf, other]
Title: R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[33]  arXiv:2406.04031 (cross-list from cs.CV) [pdf, other]
Title: Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[ total of 144 entries: 1-10 | 4-13 | 14-23 | 24-33 | 34-43 | 44-53 | 54-63 | ... | 144 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)