We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 88 entries: 1-88 ]
[ showing up to 102 entries per page: fewer | more ]

Wed, 8 Feb 2023

[1]  arXiv:2302.03591 [pdf, other]
Title: DSAC: Low-Cost Rowhammer Mitigation Using In-DRAM Stochastic and Approximate Counting Algorithm
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[2]  arXiv:2302.03581 [pdf]
Title: A Review of existing GDPR Solutions for Citizens and SMEs - preprint -
Comments: 52 pages
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2302.03511 [pdf, ps, other]
Title: Differential Privacy with Higher Utility through Non-identical Additive Noise
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[4]  arXiv:2302.03290 [pdf]
Title: Homomorphic Hashing Based on Elliptic Curve Cryptography
Authors: Abel C. H. Chen
Comments: in Chinese language
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2302.03262 [pdf, ps, other]
Title: Membership Inference Attacks against Diffusion Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[6]  arXiv:2302.03251 [pdf, other]
Title: SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2302.03162 [pdf, other]
Title: Protecting Language Generation Models via Invisible Watermarking
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[8]  arXiv:2302.03118 [pdf, other]
Title: From Emulation to Mathematical: A More General Traffic Obfuscation Approach To Encounter Feature based Mobile App traffic Classification
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[9]  arXiv:2302.03684 (cross-list from cs.LG) [pdf, other]
Title: Temporal Robustness against Data Poisoning
Comments: 11 pages, 7 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[10]  arXiv:2302.03670 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Read Update Write (PRUW) With Heterogeneous Databases
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[11]  arXiv:2302.03657 (cross-list from cs.CV) [pdf, other]
Title: Toward Face Biometric De-identification using Adversarial Examples
Comments: Accepted at the AAAI-23 workshop on Artificial Intelligence for Cyber Security (AICS)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[12]  arXiv:2302.03650 (cross-list from math.NT) [pdf, ps, other]
Title: Multiplication polynomials for elliptic curves over finite local rings
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[13]  arXiv:2302.03107 (cross-list from cs.CY) [pdf, ps, other]
Title: Decentralized Zero-Trust Framework for Digital Twin-based 6G
Comments: Submitted to IEEE Communications Magazine
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[14]  arXiv:2302.03098 (cross-list from cs.LG) [pdf, other]
Title: One-shot Empirical Privacy Estimation for Federated Learning
Comments: Submitted to ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[15]  arXiv:2302.02831 (cross-list from math.GR) [pdf, ps, other]
Title: Uniform Cyclic Group Factorizations of Finite Groups
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)

Tue, 7 Feb 2023

[16]  arXiv:2302.02740 [pdf, other]
Title: AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
Comments: 16 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2302.02507 [pdf, ps, other]
Title: Secret sharing scheme based on hashing
Authors: M. Andrecut
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2302.02407 [pdf, other]
Title: HyPHEN: A Hybrid Packing Method and Optimizations for Homomorphic Encryption-Based Neural Networks
Comments: 14 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[19]  arXiv:2302.02325 [pdf, other]
Title: Resilient Consensus Sustained Collaboratively
Comments: 14 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
[20]  arXiv:2302.02324 [pdf]
Title: Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2302.02292 [pdf, other]
Title: RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation Based Private Inference
Comments: arXiv admin note: text overlap with arXiv:2209.09424
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2302.02158 [pdf, other]
Title: An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation
Comments: Accepted by ACM SIGMOD 2023
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[23]  arXiv:2302.02154 [pdf, ps, other]
Title: A theoretical basis for Blockchain Extractable Value
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2302.02112 [pdf, other]
Title: Detecting Security Patches via Behavioral Data in Code Repositories
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[25]  arXiv:2302.02042 [pdf, other]
Title: BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Comments: 12 pages, 4 figures, 5 tables, for additional data and demo videos see, this https URL
Journal-ref: In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023, ACM, New York, NY, USA, 12 pages
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2302.02013 [pdf, other]
Title: IoT Botnet Detection Using an Economic Deep Learning Model
Comments: Under review in the FLAIRS-36 Conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2302.02012 [pdf, other]
Title: DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2302.01972 [pdf, other]
Title: DCA: Delayed Charging Attack on the Electric Shared Mobility System
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2302.02936 (cross-list from cs.LG) [pdf, other]
Title: Private GANs, Revisited
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[30]  arXiv:2302.02907 (cross-list from cs.CV) [pdf, other]
Title: GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2302.02829 (cross-list from cs.LG) [pdf, other]
Title: Collective Robustness Certificates: Exploiting Interdependence in Graph Neural Networks
Comments: Accepted at ICLR 2021 (this https URL). Uploaded to arxiv to fix Google Scholar indexing
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[32]  arXiv:2302.02687 (cross-list from cs.SI) [pdf, other]
Title: On Manipulating Weight Predictions in Signed Weighted Networks
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[33]  arXiv:2302.02568 (cross-list from cs.CL) [pdf, other]
Title: Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend
Comments: 8 pages, 4 figures. In progress
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[34]  arXiv:2302.02526 (cross-list from cs.LG) [pdf, other]
Title: On Private and Robust Bandits
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[35]  arXiv:2302.02509 (cross-list from quant-ph) [pdf, other]
Title: Approximate reconstructability of quantum states and noisy quantum secret sharing schemes
Comments: 6 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[36]  arXiv:2302.02414 (cross-list from cs.IT) [pdf, ps, other]
Title: Secure Codes with List Decoding
Comments: 20 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[37]  arXiv:2302.02276 (cross-list from cs.MM) [pdf, other]
Title: JPEG Steganalysis Based on Steganographic Feature Enhancement and Graph Attention Learning
Comments: this https URL&hl=en
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[38]  arXiv:2302.02230 (cross-list from cs.IT) [pdf, ps, other]
Title: $k$-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size
Comments: 7 pages, 1 table
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[39]  arXiv:2302.02162 (cross-list from cs.LG) [pdf, other]
Title: AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Decision Tree Models
Comments: Submitted to "The Network and Distributed System Security Symposium (NDSS) 2023" as a poster submission
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[40]  arXiv:2302.02143 (cross-list from math.NT) [pdf, ps, other]
Title: The Scholz conjecture for $n=2^m(23)+7$, $m \in \mathbb{N}^*$
Authors: Amadou Tall
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[41]  arXiv:2302.02126 (cross-list from cs.GT) [pdf, other]
Title: Concave Pro-rata Games
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[42]  arXiv:2302.02056 (cross-list from cs.DS) [pdf, other]
Title: Sketch-Flip-Merge: Mergeable Sketches for Private Distinct Counting
Comments: 28 pages, 5 figures
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Computation (stat.CO)

Mon, 6 Feb 2023

[43]  arXiv:2302.01890 [pdf, other]
Title: Android OS Privacy Under the Loupe -- A Tale from the East
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2302.01811 [pdf, other]
Title: CheckedCBox: Type Directed Program Partitioning with Checked C for Incremental Spatial Memory Safety
Comments: Liyi Li and Arunkumar Bhattar contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[45]  arXiv:2302.01764 [pdf, other]
Title: Active External Calls for Blockchain and Distributed Ledger Technologies: Debunking cited inability of Blockchain and DLT to make external calls
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[46]  arXiv:2302.01763 [pdf, other]
Title: Enabling Trade-offs in Privacy and Utility in Genomic Data Beacons and Summary Statistics
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[47]  arXiv:2302.01762 [pdf, other]
Title: BackdoorBox: A Python Toolbox for Backdoor Learning
Comments: BackdoorBox V0.1. The first two authors contributed equally to this toolbox. 13 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[48]  arXiv:2302.01757 [pdf, other]
Title: Certified Robustness of Learning-based Static Malware Detectors
Comments: 19 pages, 6 figures, 10 tables. Includes 5 pages of appendices
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[49]  arXiv:2302.01753 [pdf]
Title: A Process Model to Improve Information Security Governance in Organisations
Authors: Chee Kong Wong
Comments: 313 pages, PhD Thesis
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2302.01751 [pdf, other]
Title: Motion ID: Human Authentication Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[51]  arXiv:2302.01749 [pdf, other]
Title: Command Line Interface Risk Modeling
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[52]  arXiv:2302.01745 [pdf, other]
Title: Covert D2D Communication Underlaying Cellular Network: A System-Level Security Perspective
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[53]  arXiv:2302.01744 [pdf, other]
Title: Communication Security in the Internet of Vehicles based Industrial Value Chain
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2302.01733 [pdf, other]
Title: Committed Private Information Retrieval
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Information Retrieval (cs.IR)
[55]  arXiv:2302.01584 [pdf, other]
Title: TT-TFHE: a Torus Fully Homomorphic Encryption-Friendly Neural Network Architecture
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[56]  arXiv:2302.01474 [pdf, other]
Title: Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation
Comments: Submitted to ICML 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[57]  arXiv:2302.01452 [pdf, other]
Title: MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2302.01401 [pdf, ps, other]
Title: A Transcontinental Analysis of Account Remediation Protocols of Popular Websites
Comments: Conference: Symposium on Usable Security and Privacy (USEC) 2023At: San Diego, California
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2302.01388 [pdf, other]
Title: Statistical Verification of Traffic Systems with Expected Differential Privacy
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY); Computation (stat.CO)
[60]  arXiv:2302.01336 [pdf, other]
Title: A Framework to Allow a Third Party to Watermark Numerical Data in an Encrypted Domain while Preserving its Statistical Properties
Comments: 70 pages, 16 figures, A minor thesis for the degree of Masters of Computer Science, School of Computing Technologies, STEM College, Royal Melbourne Institute of Technology, University Melbourne, Victoria, Australia. August 2022
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2302.01874 (cross-list from quant-ph) [pdf, ps, other]
Title: Cloning Games: A General Framework for Unclonable Primitives
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[62]  arXiv:2302.01858 (cross-list from quant-ph) [pdf, ps, other]
Title: A Computational Separation Between Quantum No-cloning and No-teleportation
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[63]  arXiv:2302.01740 (cross-list from cs.CV) [pdf, other]
Title: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2302.01677 (cross-list from cs.LG) [pdf, other]
Title: Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[65]  arXiv:2302.01622 (cross-list from eess.IV) [pdf]
Title: Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology
Comments: 3 tables, 5 figures, 11 supplementary materials
Subjects: Image and Video Processing (eess.IV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[66]  arXiv:2302.01190 (cross-list from stat.ML) [pdf, other]
Title: On the Efficacy of Differentially Private Few-shot Image Classification
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Fri, 3 Feb 2023

[67]  arXiv:2302.01235 [pdf, ps, other]
Title: Physical Zero-Knowledge Proof for Five Cells
Comments: arXiv admin note: text overlap with arXiv:2202.09788
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2302.01225 [pdf, ps, other]
Title: Asymmetric Cryptosystem Using Careful Synchronization
Authors: Jakub Ruszil
Comments: 17 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2302.01215 [pdf, other]
Title: Fixing Hardware Security Bugs with Large Language Models
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2302.01177 [pdf, other]
Title: Order but Not Execute in Order
Comments: 12 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[71]  arXiv:2302.01131 [pdf, other]
Title: An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2302.01026 [pdf]
Title: Generalized Uncertainty Principles for Quantum Cryptography
Authors: Randy Kuang
Comments: 7 pages, 5 figures, conference invited speech at ICCCAS, then to be published by JCM
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2302.01024 [pdf, other]
Title: SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2302.00947 [pdf, other]
Title: SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[75]  arXiv:2302.00876 [pdf, other]
Title: Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[76]  arXiv:2302.00750 [pdf]
Title: Developing Hands-on Labs for Source Code Vulnerability Detection with AI
Authors: Maryam Taeb
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[77]  arXiv:2302.00732 [pdf, other]
Title: Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[78]  arXiv:2302.01326 (cross-list from cs.LG) [pdf, other]
Title: Federated Analytics: A survey
Comments: To appear in APSIPA Transactions on Signal and Information Processing, Volume 12, Issue 1
Journal-ref: APSIPA Transactions on Signal and Information Processing, Volume 12, Issue 1, 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[79]  arXiv:2302.01316 (cross-list from cs.CV) [pdf, other]
Title: Are Diffusion Models Vulnerable to Membership Inference Attacks?
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[80]  arXiv:2302.01182 (cross-list from cs.CR) [pdf, other]
Title: Blocking JavaScript without Breaking the Web: An Empirical Investigation
Journal-ref: petsymposium 2023
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)

Thu, 2 Feb 2023

[81]  arXiv:2302.00338 [pdf]
Title: A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks
Authors: Yousri Daldoul
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[82]  arXiv:2302.00325 [pdf]
Title: Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[83]  arXiv:2302.00271 [pdf, other]
Title: CATFL: Certificateless Authentication-based Trustworthy Federated Learning for 6G Semantic Communications
Comments: Accepted by WCNC workshop 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[84]  arXiv:2302.00210 [pdf]
Title: Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[85]  arXiv:2302.00418 (cross-list from cs.DC) [pdf, other]
Title: Performance of EdDSA and BLS Signatures in Committee-Based Consensus
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[86]  arXiv:2302.00095 (cross-list from cs.AR) [pdf, ps, other]
Title: XCRYPT: Accelerating Lattice Based Cryptography with Memristor Crossbar Arrays
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[87]  arXiv:2302.00077 (cross-list from cs.LG) [pdf, other]
Title: Personalized Privacy Auditing and Optimization at Test Time
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[88]  arXiv:2302.00037 (cross-list from cs.LG) [pdf, other]
Title: Differentially-Private Hierarchical Clustering with Provable Approximation Guarantees
Comments: 27 pages, 1 figure
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[ total of 88 entries: 1-88 ]
[ showing up to 102 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2302, contact, help  (Access key information)