We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 96 entries: 1-96 ]
[ showing up to 112 entries per page: fewer | more ]

Fri, 19 Aug 2022

[1]  arXiv:2208.08946 [pdf, other]
Title: Aggregation and probabilistic verification for data authentication in VANETs
Journal-ref: Information Sciences 262, 172-189, 2014
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2208.08846 [pdf, other]
Title: Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS
Comments: Preprint; submitted to CANS 2022
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[3]  arXiv:2208.08820 [pdf]
Title: LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2208.08760 [pdf]
Title: Blockchain based digital vaccine passport
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2208.08751 [pdf, other]
Title: MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols
Comments: Accepted as a full paper at USENIX Security '21
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2208.08745 [pdf, other]
Title: Profiler: Profile-Based Model to Detect Phishing Emails
Comments: 12 pages
Journal-ref: 42nd IEEE International Conference on Distributed Computing Systems 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7]  arXiv:2208.08689 [pdf, other]
Title: Reverse Engineering of Integrated Circuits: Tools and Techniques
Authors: Abhijitt Dhavlle
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2208.08662 [pdf, other]
Title: Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
Comments: This paper has been accepted for publication at IEEE S&P 2023. Please cite this paper as "Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han. Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. In Proceedings of The 44th IEEE Symposium on Security and Privacy, San Francisco, May 22-26, 2023."
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9]  arXiv:2208.08569 [pdf, other]
Title: ObfuNAS: A Neural Architecture Search-based DNN Obfuscation Approach
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[10]  arXiv:2208.08554 [pdf, other]
Title: Embracing Graph Neural Networks for Hardware Security (Invited Paper)
Comments: To appear at ICCAD 2022
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2208.08540 [pdf, other]
Title: Necessary Conditions in Multi-Server Differential Privacy
Authors: Albert Cheu, Chao Yan
Comments: 22 pages
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2208.08524 [pdf, other]
Title: DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Authors: Yisroel Mirsky
Comments: A draft academic paper based on and protected by the provisional patent submitted January 1st 2022 under provisional Number 63/302,086. arXiv admin note: text overlap with arXiv:2004.11138
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[13]  arXiv:2208.08697 (cross-list from cs.LG) [pdf, other]
Title: Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[14]  arXiv:2208.08677 (cross-list from cs.CV) [pdf, other]
Title: Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Comments: 8 pages + 2 pages of references
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Thu, 18 Aug 2022

[15]  arXiv:2208.08433 [pdf, other]
Title: Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System
Comments: Submitted to IEEE SSCI 2022 Conference
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Signal Processing (eess.SP)
[16]  arXiv:2208.08255 [pdf, other]
Title: On the Elements of Datasets for Cyber Physical Systems Security
Authors: Ashraf Tantawy
Comments: Submitted for peer review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Systems and Control (eess.SY)
[17]  arXiv:2208.08173 [pdf, other]
Title: An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
Comments: ACM Transactions on Software Engineering and Methodology, Association for Computing Machinery, 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[18]  arXiv:2208.08125 [pdf, other]
Title: A Tutorial Introduction to Lattice-based Cryptography and Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2208.08114 [pdf, other]
Title: An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models
Comments: CIKM 2022 short paper accepted
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[20]  arXiv:2208.08093 [pdf, other]
Title: Near Threshold Computation of Partitioned Ring Learning With Error (RLWE) Post Quantum Cryptography on Reconfigurable Architecture
Comments: Manuscript (yet to be published)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[21]  arXiv:2208.08071 [pdf]
Title: An Efficient Multi-Step Framework for Malware Packing Identification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[22]  arXiv:2208.08025 [pdf, other]
Title: AutoCAT: Reinforcement Learning for Automated Exploration of Cache Timing-Channel Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[23]  arXiv:2208.08009 [pdf, ps, other]
Title: Resource Allocation in Quantum Key Distribution (QKD) for Space-Air-Ground Integrated Networks
Comments: 6 pages, 9 figures, conference paper
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[24]  arXiv:2208.07999 [pdf, other]
Title: Evaluating the Feasibility of a Provably Secure Privacy-Preserving Entity Resolution Adaptation of PPJoin using Homomorphic Encryption
Comments: 17 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[25]  arXiv:2208.07965 [pdf]
Title: Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation
Authors: Uchenna D Ani (Keele University), Jeremy D McK Watson (University College London), Nilufer Tuptuk (University College London), Steve Hailes (University College London), Madeline Carr (University College London), Carsten Maple (University of Warwick)
Comments: 7 pages, 5 Figures, Policy Briefing
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2208.08361 (cross-list from q-bio.GN) [pdf]
Title: I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
Subjects: Genomics (q-bio.GN); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR)
[27]  arXiv:2208.08270 (cross-list from cs.LG) [pdf, other]
Title: On the Privacy Effect of Data Enhancement via the Lens of Memorization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[28]  arXiv:2208.08193 (cross-list from cs.HC) [pdf, other]
Title: A Survey of User Perspectives on Security and Privacy in a Home Networking Environment
Comments: 37 pages, Accepted to be published in ACM Computing Surveys
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[29]  arXiv:2208.08085 (cross-list from cs.LG) [pdf, other]
Title: Efficient Detection and Filtering Systems for Distributed Training
Comments: 18 pages, 14 figures, 6 tables. arXiv admin note: substantial text overlap with arXiv:2108.02416
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[30]  arXiv:2208.08052 (cross-list from cs.CV) [pdf, other]
Title: Imperceptible and Robust Backdoor Attack in 3D Point Cloud
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[31]  arXiv:2208.07993 (cross-list from cs.DC) [pdf, other]
Title: Recent Advances of Blockchain and its Applications
Authors: Xiao Li, Weili Wu
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[32]  arXiv:2208.07984 (cross-list from cs.LG) [pdf, ps, other]
Title: Private Estimation with Public Data
Comments: 53 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[33]  arXiv:2208.07978 (cross-list from cs.DC) [pdf, other]
Title: Resource-aware Federated Learning using Knowledge Extraction and Multi-model Fusion
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[34]  arXiv:2208.07922 (cross-list from cs.LG) [pdf, other]
Title: FedPerm: Private and Robust Federated Learning by Parameter Permutation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[35]  arXiv:2208.07919 (cross-list from math.OC) [pdf, other]
Title: Dynamic Pricing for Non-fungible Resources
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)

Wed, 17 Aug 2022

[36]  arXiv:2208.07833 [pdf, other]
Title: What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation
Comments: Wei Zhou and Lan Zhang contributed equally to this work
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2208.07825 [pdf, other]
Title: An Adaptive Image Encryption Scheme Guided by Fuzzy Models
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[38]  arXiv:2208.07801 [pdf, other]
Title: Designing an Artificial Immune System inspired Intrusion Detection System
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[39]  arXiv:2208.07702 [pdf, other]
Title: Priority and collision avoidance system for traffic lights
Journal-ref: Ad Hoc Networks 94(2):101931. 2019
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2208.07701 [pdf, other]
Title: Using blockchain in the follow-up of emergency situations related to events
Journal-ref: Software: Practice and Experience 51(10) pp. 2000-2014. 2021
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2208.07700 [pdf, other]
Title: Secure system based on UAV and BLE for improving SAR missions
Journal-ref: Journal of Ambient Intelligence and Humanized Computing 11(8) pp. 3109-3120. 2020
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2208.07604 [pdf]
Title: Achieve Fully Decentralized End to End Encryption Meeting via Blockchain
Authors: Yang, Tan
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2208.07570 [pdf, other]
Title: Inhale: Enabling High-Performance and Energy-Efficient In-SRAM Cryptographic Hash for IoT
Comments: 9 pages, ICCAD 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[44]  arXiv:2208.07556 [pdf, other]
Title: pyCANON: A Python library to check the level of anonymity of a dataset
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[45]  arXiv:2208.07489 [pdf, other]
Title: Single Round-trip Hierarchical ORAM via Succinct Indices
Comments: 22 pages, 3 Figures, 5 Tables
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2208.07476 [pdf, other]
Title: CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[47]  arXiv:2208.07438 (cross-list from math.ST) [pdf, other]
Title: Archimedes Meets Privacy: On Privately Estimating Quantiles in High Dimensions Under Minimal Assumptions
Comments: 38 pages, 1 figure
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Metric Geometry (math.MG)
[48]  arXiv:2208.07410 (cross-list from cs.DS) [pdf, ps, other]
Title: Private Query Release via the Johnson-Lindenstrauss Transform
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)

Tue, 16 Aug 2022

[49]  arXiv:2208.07310 [pdf, other]
Title: Placement Laundering and the Complexities of Attribution in Online Advertising
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[50]  arXiv:2208.07189 [pdf, other]
Title: DHSA: Efficient Doubly Homomorphic Secure Aggregation for Cross-silo Federated Learning
Comments: 34 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2208.07127 [pdf, other]
Title: Deception for Cyber Defence: Challenges and Opportunities
Journal-ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[52]  arXiv:2208.07060 [pdf, ps, other]
Title: A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2208.07049 [pdf, other]
Title: Self-Supervised Vision Transformers for Malware Detection
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[54]  arXiv:2208.06943 [pdf, other]
Title: GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing
Comments: 9 pages, 8 tables, 3 figures
Journal-ref: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2022, pp. 10-18
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[55]  arXiv:2208.06774 [pdf, other]
Title: Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2208.06722 [pdf, other]
Title: A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2208.06692 [pdf, other]
Title: BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[58]  arXiv:2208.06628 [pdf, other]
Title: CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2208.06594 [pdf]
Title: Using identity-based cryptography in mobile applications
Comments: arXiv admin note: substantial text overlap with arXiv:2208.03541
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 527-536, 2014
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2208.06593 [pdf]
Title: Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems
Comments: arXiv admin note: substantial text overlap with arXiv:2208.06147
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 499-508, 2014
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2208.06592 [pdf, other]
Title: Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[62]  arXiv:2208.06568 [pdf, other]
Title: On the Limitations of Continual Learning for Malware Classification
Comments: 19 pages, 11 figures, and 2 tables, Accepted at the Conference on Lifelong Learning Agents - CoLLAs 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[63]  arXiv:2208.06481 [pdf, other]
Title: PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data
Comments: Accepted for IEEE Symposium on Visualization in Cyber Security, 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[64]  arXiv:2208.07353 (cross-list from cs.LG) [pdf, other]
Title: Easy Differentially Private Linear Regression
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[65]  arXiv:2208.07316 (cross-list from cs.CL) [pdf, other]
Title: MENLI: Robust Evaluation Metrics from Natural Language Inference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2208.07272 (cross-list from cs.LG) [pdf, other]
Title: Training-Time Attacks against k-Nearest Neighbors
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[67]  arXiv:2208.07241 (cross-list from cs.CV) [pdf, other]
Title: HEFT: Homomorphically Encrypted Fusion of Biometric Templates
Comments: IJCB 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[68]  arXiv:2208.07119 (cross-list from cs.SE) [pdf, other]
Title: Xscope: Hunting for Cross-Chain Bridge Attacks
Comments: To appear at the Tool Demonstration Track of ASE'22. Please cite the conference version
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[69]  arXiv:2208.06963 (cross-list from cs.IT) [pdf, ps, other]
Title: Privacy-Preserving Decentralized Inference with Graph Neural Networks in Wireless Networks
Comments: This paper has been submitted to TWC
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2208.06946 (cross-list from cs.AI) [pdf, other]
Title: Targeted Honeyword Generation with Language Models
Comments: 8 pages, 7 tables, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[71]  arXiv:2208.06767 (cross-list from cs.NI) [pdf, other]
Title: IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation
Comments: Accepted to S&P '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[72]  arXiv:2208.06651 (cross-list from cs.SI) [pdf, other]
Title: Revisiting Adversarial Attacks on Graph Neural Networks for Graph Classification
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73]  arXiv:2208.06538 (cross-list from cs.LG) [pdf, other]
Title: MaskBlock: Transferable Adversarial Examples with Bayes Approach
Comments: Under Review
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[74]  arXiv:2208.06537 (cross-list from cs.LG) [pdf, other]
Title: Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[75]  arXiv:2208.06432 (cross-list from cs.DC) [pdf, other]
Title: Hybrid On/Off Blockchain Approach for Vehicle Data Management, Processing and Visualization Exemplified by the ADAPT Platform
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Mon, 15 Aug 2022

[76]  arXiv:2208.06231 [pdf, other]
Title: Mutual authentication in self-organized VANETs
Journal-ref: Computer Standards & Interfaces 36 (4), 704-710, 2014
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2208.06223 [pdf, ps, other]
Title: Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Comments: 56 pages, 11 figures. arXiv admin note: text overlap with arXiv:2201.12194
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[78]  arXiv:2208.06165 [pdf, other]
Title: Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots
Authors: Chintan Patel
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[79]  arXiv:2208.06153 [pdf, ps, other]
Title: How to build vehicular ad-hoc networks on smartphones
Journal-ref: Journal of Systems Architecture 59 (10), 996-1004, 2013
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2208.06147 [pdf]
Title: Software implementation of the SNOW 3G Generator on iOS and Android platforms
Journal-ref: Logic Journal of IGPL 24 (1), 29-41, 2016
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2208.06136 [pdf, ps, other]
Title: How far are German companies in improving security through static program analysis tools?
Comments: IEEE Secure Development Conference 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[82]  arXiv:2208.06130 [pdf]
Title: Analysis, Detection, and Classification of Android Malware using System Calls
Comments: 18 pages, 7 table , 3 figures
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2208.06092 [pdf, other]
Title: On deceiving malware classification with section injection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[84]  arXiv:2208.06075 [pdf, other]
[85]  arXiv:2208.06003 [pdf]
Title: Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
Comments: IEEE Access, early published by July 14, 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[86]  arXiv:2208.06002 [pdf, other]
Title: A review of cryptosystems based on multi layer chaotic mappings
Comments: 10 pages, 1 figure, 3 tables
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.06405 (cross-list from cs.LG) [pdf, other]
Title: Collective Obfuscation and Crowdsourcing
Comments: 9 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[88]  arXiv:2208.06265 (cross-list from cs.IR) [pdf, other]
Title: Trustworthy Recommender Systems
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[89]  arXiv:2208.06236 (cross-list from stat.ME) [pdf, other]
Title: Differentially Private Kolmogorov-Smirnov-Type Tests
Authors: Jordan Awan, Yue Wang
Comments: 15 pages before references. 3 Figures
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[90]  arXiv:2208.06228 (cross-list from stat.ML) [pdf, ps, other]
Title: Unifying Gradients to Improve Real-world Robustness for Deep Networks
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2208.06176 (cross-list from cs.LG) [pdf, other]
Title: A Knowledge Distillation-Based Backdoor Attack in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[92]  arXiv:2208.06163 (cross-list from cs.LG) [pdf, other]
Title: Dropout is NOT All You Need to Prevent Gradient Leakage
Comments: 25 pages, 17 figures, 8 tables (supplementary material included)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[93]  arXiv:2208.06135 (cross-list from cs.LG) [pdf, other]
Title: Private Domain Adaptation from a Public Source
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[94]  arXiv:2208.06095 (cross-list from cs.LG) [pdf, other]
Title: A Fast Blockchain-based Federated Learning Framework with Compressed Communications
Comments: To appear in IEEE Journal on Selected Areas in Communications (JSAC)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[95]  arXiv:2208.06093 (cross-list from cs.LG) [pdf, other]
Title: Scalable and Sparsity-Aware Privacy-Preserving K-means Clustering with Application to Fraud Detection
Comments: 10 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[96]  arXiv:2208.05969 (cross-list from cs.LG) [pdf, other]
Title: Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment
Comments: Accepted by ASE2022. Camera-ready Version
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[ total of 96 entries: 1-96 ]
[ showing up to 112 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)