We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 24

[ total of 166 entries: 1-25 | 25-49 | 50-74 | 75-99 | 100-124 | ... | 150-166 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 6 Jun 2024 (continued, showing last 18 of 42 entries)

[25]  arXiv:2406.02605 [pdf, other]
Title: A Novel Defense Against Poisoning Attacks on Federated Learning: LayerCAM Augmented with Autoencoder
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[26]  arXiv:2406.02603 [pdf, other]
Title: Distortion-free Watermarks are not Truly Distortion-free under Watermark Key Collisions
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2406.02599 [pdf, other]
Title: Privacy-Aware Randomized Quantization via Linear Programming
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[28]  arXiv:2406.03405 (cross-list from cs.LG) [pdf, ps, other]
Title: Amalgam: A Framework for Obfuscated Neural Network Training on the Cloud
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[29]  arXiv:2406.03404 (cross-list from cs.LG) [pdf, other]
Title: ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[30]  arXiv:2406.03399 (cross-list from math.NT) [pdf, ps, other]
Title: Elliptic curves over Hasse pairs
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[31]  arXiv:2406.03379 (cross-list from quant-ph) [pdf, other]
Title: How to Construct Quantum FHE, Generically
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[32]  arXiv:2406.03208 (cross-list from cs.SE) [pdf, other]
Title: Fuzzing Frameworks for Server-side Web Applications: A Survey
Comments: Under review in the International Journal of Information Security
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[33]  arXiv:2406.03143 (cross-list from cs.CV) [pdf, other]
Title: ZeroPur: Succinct Training-Free Adversarial Purification
Comments: 16 pages, 5 figures, under review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[34]  arXiv:2406.03007 (cross-list from cs.CL) [pdf, other]
Title: BadAgent: Inserting and Activating Backdoor Attacks in LLM Agents
Comments: Accepted by ACL 2024
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[35]  arXiv:2406.02958 (cross-list from cs.LG) [pdf, other]
Title: PrE-Text: Training Language Models on Private Federated Data in the Age of LLMs
Comments: ICML 2024 (Oral)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[36]  arXiv:2406.02883 (cross-list from cs.LG) [pdf, other]
Title: Nonlinear Transformations Against Unlearnable Datasets
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[37]  arXiv:2406.02797 (cross-list from cs.LG) [pdf, other]
Title: Auditing Privacy Mechanisms via Label Inference Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[38]  arXiv:2406.02789 (cross-list from cs.DS) [pdf, other]
Title: Private Stochastic Convex Optimization with Heavy Tails: Near-Optimality from Simple Reductions
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[39]  arXiv:2406.02736 (cross-list from cs.LG) [pdf, other]
Title: Synthetic Data Outliers: Navigating Identity Disclosure
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[40]  arXiv:2406.02716 (cross-list from cs.LG) [pdf, ps, other]
Title: Optimal Rates for DP-SCO with a Single Epoch and Large Batches
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[41]  arXiv:2406.02577 (cross-list from cs.CL) [pdf, other]
Title: Are PPO-ed Language Models Hackable?
Comments: 8 pages, 4 figures
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[42]  arXiv:2406.02575 (cross-list from cs.CL) [pdf, other]
Title: Cross-Modal Safety Alignment: Is textual unlearning all you need?
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 5 Jun 2024 (showing first 7 of 27 entries)

[43]  arXiv:2406.02463 [pdf, other]
Title: Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2406.02316 [pdf, other]
Title: Fast and Secure Decentralized Optimistic Rollups Using Setchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Logic in Computer Science (cs.LO)
[45]  arXiv:2406.02172 [pdf, other]
Title: Layer-2 Arbitrage: An Empirical Analysis of Swap Dynamics and Price Disparities on Rollups
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2406.02156 [pdf, ps, other]
Title: Almost linear time differentially private release of synthetic graphs
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[47]  arXiv:2406.02140 [pdf, other]
Title: Optimality of Matrix Mechanism on $\ell_p^p$-metric
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2406.02023 [pdf, other]
Title: ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2406.02011 [pdf, other]
Title: A Risk Estimation Study of Native Code Vulnerabilities in Android Applications
Subjects: Cryptography and Security (cs.CR)
[ total of 166 entries: 1-25 | 25-49 | 50-74 | 75-99 | 100-124 | ... | 150-166 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2406, contact, help  (Access key information)