We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 54

[ total of 169 entries: 1-10 | ... | 25-34 | 35-44 | 45-54 | 55-64 | 65-74 | 75-84 | 85-94 | ... | 165-169 ]
[ showing 10 entries per page: fewer | more | all ]

Thu, 6 Jun 2024 (continued, showing 10 of 42 entries)

[55]  arXiv:2406.03379 (cross-list from quant-ph) [pdf, other]
Title: How to Construct Quantum FHE, Generically
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[56]  arXiv:2406.03208 (cross-list from cs.SE) [pdf, other]
Title: Fuzzing Frameworks for Server-side Web Applications: A Survey
Comments: Under review in the International Journal of Information Security
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[57]  arXiv:2406.03143 (cross-list from cs.CV) [pdf, other]
Title: ZeroPur: Succinct Training-Free Adversarial Purification
Comments: 16 pages, 5 figures, under review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[58]  arXiv:2406.03007 (cross-list from cs.CL) [pdf, other]
Title: BadAgent: Inserting and Activating Backdoor Attacks in LLM Agents
Comments: Accepted by ACL 2024
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2406.02958 (cross-list from cs.LG) [pdf, other]
Title: PrE-Text: Training Language Models on Private Federated Data in the Age of LLMs
Comments: ICML 2024 (Oral)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[60]  arXiv:2406.02883 (cross-list from cs.LG) [pdf, other]
Title: Nonlinear Transformations Against Unlearnable Datasets
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[61]  arXiv:2406.02797 (cross-list from cs.LG) [pdf, other]
Title: Auditing Privacy Mechanisms via Label Inference Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[62]  arXiv:2406.02789 (cross-list from cs.DS) [pdf, other]
Title: Private Stochastic Convex Optimization with Heavy Tails: Near-Optimality from Simple Reductions
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[63]  arXiv:2406.02736 (cross-list from cs.LG) [pdf, other]
Title: Synthetic Data Outliers: Navigating Identity Disclosure
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[64]  arXiv:2406.02716 (cross-list from cs.LG) [pdf, ps, other]
Title: Optimal Rates for DP-SCO with a Single Epoch and Large Batches
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 169 entries: 1-10 | ... | 25-34 | 35-44 | 45-54 | 55-64 | 65-74 | 75-84 | 85-94 | ... | 165-169 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)