We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 9

[ total of 147 entries: 1-25 | 10-34 | 35-59 | 60-84 | 85-109 | ... | 135-147 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 29 May 2024 (continued, showing last 9 of 18 entries)

[10]  arXiv:2405.18194 (cross-list from cs.LG) [pdf, other]
Title: Delving into Differentially Private Transformer
Comments: ICML 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[11]  arXiv:2405.18137 (cross-list from cs.LG) [pdf, other]
Title: Exploiting LLM Quantization
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[12]  arXiv:2405.18050 (cross-list from cs.LG) [pdf, other]
Title: Learning-Based Link Anomaly Detection in Continuous-Time Dynamic Graphs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[13]  arXiv:2405.17750 (cross-list from cs.LG) [pdf, other]
Title: Magnitude-based Neuron Pruning for Backdoor Defens
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[14]  arXiv:2405.17746 (cross-list from cs.LG) [pdf, other]
Title: Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[15]  arXiv:2405.17529 (cross-list from cs.LG) [pdf, other]
Title: Clip Body and Tail Separately: High Probability Guarantees for DPSGD with Heavy Tails
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[16]  arXiv:2405.17495 (cross-list from cs.LG) [pdf, other]
Title: Vertical Federated Learning for Effectiveness, Security, Applicability: A Survey
Comments: 31 pages, 9 figures, 10 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2405.17485 (cross-list from cs.LG) [pdf, other]
Title: $\textit{Comet:}$ A $\underline{Com}$munication-$\underline{e}$fficient and Performant Approxima$\underline{t}$ion for Private Transformer Inference
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[18]  arXiv:2405.17472 (cross-list from cs.LG) [pdf, other]
Title: FreezeAsGuard: Mitigating Illegal Adaptation of Diffusion Models via Selective Tensor Freezing
Authors: Kai Huang, Wei Gao
Comments: 18 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Tue, 28 May 2024 (showing first 16 of 33 entries)

[19]  arXiv:2405.17307 [pdf, other]
Title: Peer2PIR: Private Queries for IPFS
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2405.17238 [pdf, other]
Title: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[21]  arXiv:2405.17190 [pdf, other]
Title: SoK: Leveraging Transformers for Malware Analysis
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2405.17100 [pdf, other]
Title: Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[23]  arXiv:2405.16783 [pdf, other]
Title: TrojFM: Resource-efficient Backdoor Attacks against Very Large Foundation Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[24]  arXiv:2405.16767 [pdf, other]
Title: Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)
[25]  arXiv:2405.16719 [pdf, other]
Title: Alistair: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2405.16707 [pdf, other]
Title: Visualizing the Shadows: Unveiling Data Poisoning Behaviors in Federated Learning
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2405.16655 [pdf, ps, other]
Title: Predicting Likely-Vulnerable Code Changes: Machine Learning-based Vulnerability Protections for Android Open Source Project
Authors: Keun Soo Yim
Comments: This is a preprint of an article that has been submitted to a journal for publication
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG); Software Engineering (cs.SE)
[28]  arXiv:2405.16619 [pdf, other]
Title: Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners
Comments: This preprint has not undergone peer review or any post-submission improvements or corrections. The Version of Record of this contribution is accepted to and will be published in "Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2024)", and is available online at TBD
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2405.16539 [pdf, ps, other]
Title: MinRank Gabidulin encryption scheme on matrix codes
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2405.16476 [pdf, other]
Title: KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation
Journal-ref: 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2405.16421 [pdf, ps, other]
Title: Towards Sustainable IoT: Challenges, Solutions, and Future Directions for Device Longevity
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[32]  arXiv:2405.16372 [pdf, other]
Title: Path-wise Vulnerability Mitigation
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2405.16318 [pdf, other]
Title: Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices
Comments: 12 pages
Journal-ref: International Journal On Advances in Security, vol. 14, no. 1 and 2, pp. 59-70, 2021
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[34]  arXiv:2405.16314 [pdf, other]
Title: Threat Analysis of Industrial Internet of Things Devices
Comments: 7 pages
Journal-ref: Proc of the 11th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2020), Nice, France, Apr 2020, pp. 31-37, ISSN 2308-4294
Subjects: Cryptography and Security (cs.CR)
[ total of 147 entries: 1-25 | 10-34 | 35-59 | 60-84 | 85-109 | ... | 135-147 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)