We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 89 entries: 1-89 ]
[ showing up to 99 entries per page: fewer | more ]

Tue, 6 Dec 2022

[1]  arXiv:2212.02454 [pdf, other]
Title: Extending Expressive Access Policies with Privacy Features
Comments: This is the full version of a paper which appears in 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2212.02405 [pdf, other]
Title: Inverting Cryptographic Hash Functions via Cube-and-Conquer
Authors: Oleg Zaikin
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[3]  arXiv:2212.02341 [pdf, other]
Title: Have You Ever Seen Malware?
Comments: This paper is under review; the section describing conversion from malware structure to fractal figure is temporarily erased here to protect our idea. It will be replaced by a full version when accepted
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[4]  arXiv:2212.02185 [pdf]
Title: Identity Management through a global Discovery System based on Decentralized Identities
Authors: Konstantinos Lampropoulos, Nikos Kyriakoulis, Spyros Denazis (University of Patras, Greece)
Comments: 6 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2212.02048 [pdf, other]
Title: Hodge Decomposition of the Remittance Network on the XRP ledger in the Price Hike of January 2018
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2212.02044 [pdf, other]
Title: First Demonstration Experiment for Energy Trading System EDISON-X Using the XRP Ledger
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2212.01976 [pdf, other]
Title: FedCC: Robust Federated Learning against Model Poisoning Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[8]  arXiv:2212.01905 [pdf, other]
Title: "Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2212.01855 [pdf]
Title: Pairing-Friendly Elliptic Curves: Revisited Taxonomy, Attacks and Security Concern
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2212.01713 [pdf, other]
Title: SoK: Fully Homomorphic Encryption Accelerators
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[11]  arXiv:2212.01627 [pdf, other]
Title: Castell: Scalable Joint Probability Estimation of Multi-dimensional Data Randomized with Local Differential Privacy
Authors: Hiroaki Kikuchi
Comments: 12 pages + 5-page appendix
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2212.01598 [pdf, other]
Title: It Is Not Where You Are, It Is Where You Are Registered: IoT Location Impact
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[13]  arXiv:2212.01595 [pdf, other]
Title: Secrecy-Verifiability Paradox in Smart Contracts
Authors: Ha-Thanh Nguyen
Comments: RMIT Fintech-Blockchain Conference 2022
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2212.01537 [pdf, other]
Title: Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2212.01510 [pdf, other]
Title: Open RAN Security: Challenges and Opportunities
Comments: 34 pages, 4 figures, Survey, Journal article
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2212.02378 (cross-list from cs.DC) [pdf, ps, other]
Title: Confidential High-Performance Computing in the Public Cloud
Authors: Keke Chen
Comments: to appear in IEEE Internet Computing
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[17]  arXiv:2212.02339 (cross-list from cs.SD) [pdf, other]
Title: DeAR: A Deep-learning-based Audio Re-recording Resilient Watermarking
Comments: Accpted by AAAI2023
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Multimedia (cs.MM); Audio and Speech Processing (eess.AS)
[18]  arXiv:2212.02042 (cross-list from cs.LG) [pdf, other]
Title: Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[19]  arXiv:2212.02003 (cross-list from cs.LG) [pdf, other]
Title: Bayesian Learning with Information Gain Provably Bounds Risk for a Robust Adversarial Defense
Comments: Published at ICML 2022
Journal-ref: Proceedings of the 39th International Conference on Machine Learning, PMLR 162:5309-5323, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[20]  arXiv:2212.01716 (cross-list from cs.LG) [pdf, other]
Title: Security Analysis of SplitFed Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[21]  arXiv:2212.01688 (cross-list from cs.LG) [pdf, other]
Title: LDL: A Defense for Label-Based Membership Inference Attacks
Comments: to appear in ACM AsiaCCS 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[22]  arXiv:2212.01618 (cross-list from cs.IT) [pdf]
Title: An Overview of Trust Standards for Communication Networks and Future Digital World
Comments: 7 pages, 3 figures, Magazine paper under review
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[23]  arXiv:2212.01548 (cross-list from cs.LG) [pdf, other]
Title: FedRolex: Model-Heterogeneous Federated Learning with Rolling Sub-Model Extraction
Comments: 20 pages, 7 Figures, Published in 36th Conference on Neural Information Processing And Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Distributed, Parallel, and Cluster Computing (cs.DC)
[24]  arXiv:2212.01436 (cross-list from cs.CV) [pdf, other]
Title: Unauthorized Drone Detection: Experiments and Prototypes
Comments: This paper has been accepted for presentation in 23rd IEEE International Conference on Industrial Technology (ICIT22), 22 - 25 August, 2022, Shanghai, China
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Mon, 5 Dec 2022

[25]  arXiv:2212.01372 [pdf, ps, other]
Title: Bitcoin Security-Latency Under Network Delay
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Discrete Mathematics (cs.DM); Information Theory (cs.IT)
[26]  arXiv:2212.01362 [pdf, ps, other]
Title: Fast Detection of Burst Jamming for Delay-Sensitive Internet-of-Things Applications
Comments: arXiv admin note: text overlap with arXiv:1603.05305 by other authors
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2212.01356 [pdf, ps, other]
Title: Sequential Anomaly Detection Against Demodulation Reference Signal Spoofing in 5G NR
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[28]  arXiv:2212.01298 [pdf, other]
Title: 5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network
Comments: Link to the Dataset this http URL
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29]  arXiv:2212.01274 [pdf]
Title: OOG- Optuna Optimized GAN Sampling Technique for Tabular Imbalanced Malware Data
Comments: Accepted for publication at 2022 IEEE International Conference on Big Data (IEEE BigData 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30]  arXiv:2212.01254 [pdf]
Title: Deep-Learning-based Vulnerability Detection in Binary Executables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2212.01194 [pdf, ps, other]
Title: Inheritance and Blockchain: Thoughts and Open Questions
Authors: Frédéric Prost
Comments: arXiv admin note: text overlap with arXiv:2209.11194
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2212.01082 [pdf, other]
Title: Membership Inference Attacks Against Semantic Segmentation Models
Comments: Submitted as conference paper to PETS 2023
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2212.00966 [pdf, other]
Title: A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Comments: Keywords: Cybersecurity, Anomaly Detection, Intrusion Detection, Deep Learning, Unsupervised Learning, Neural Networks; this https URL
Journal-ref: IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp. 137-142. IEEE, 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[34]  arXiv:2212.00936 [pdf, other]
Title: Integer Subspace Differential Privacy
Comments: Accepted to AAAI 2023
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[35]  arXiv:2212.01267 (cross-list from q-fin.ST) [pdf, ps, other]
Title: Understanding Cryptocoins Trends Correlations
Comments: 8 pages, 4 figures
Journal-ref: In: Distributed Applications and Interoperable Systems. DAIS 2022. Lecture Notes in Computer Science, vol 13272. Springer, Cham (2022)
Subjects: Statistical Finance (q-fin.ST); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[36]  arXiv:2212.01233 (cross-list from cs.LG) [pdf, other]
Title: Safe machine learning model release from Trusted Research Environments: The AI-SDC package
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[37]  arXiv:2212.01101 (cross-list from cs.LG) [pdf, other]
Title: Assessing Anonymized System Logs Usefulness for Behavioral Analysis in RNN Models
Comments: 12 pages, 7 main figures, 2 tables, Conference: International Workshop on Data-driven Resilience Research 2022
Journal-ref: International Workshop on Data-driven Resilience Research 2022, https://2022.dataweek.de/d2r2-22/
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[38]  arXiv:2212.01071 (cross-list from cs.LG) [pdf, other]
Title: Fake detection in imbalance dataset by Semi-supervised learning with GAN
Comments: arXiv admin note: text overlap with arXiv:2210.15657
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[39]  arXiv:2212.01042 (cross-list from cs.SD) [pdf, other]
Title: AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
Comments: 2022 IEEE Symposium on Security and Privacy (SP)
Journal-ref: 2022 IEEE Symposium on Security and Privacy (SP)
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[40]  arXiv:2212.00912 (cross-list from cs.LG) [pdf, other]
Title: Private Multiparty Perception for Navigation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[41]  arXiv:2212.00879 (cross-list from quant-ph) [pdf, other]
Title: Quantum Cryptography in Algorithmica
Comments: 35 pages
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)

Fri, 2 Dec 2022

[42]  arXiv:2212.00727 [pdf, ps, other]
Title: Adversarial Artifact Detection in EEG-Based Brain-Computer Interfaces
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Signal Processing (eess.SP)
[43]  arXiv:2212.00427 [pdf, other]
Title: What Physical Layer Security Can Do for 6G Security
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2212.00381 [pdf, other]
Title: SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems
Comments: 15 pages
Journal-ref: IEEE Access, vol. 10, pp. 106400-106414, 2022
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2212.00325 [pdf, other]
Title: All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2212.00321 [pdf, other]
Title: Security and Privacy-Preservation of IoT Data in Cloud-Fog Computing Environment
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2212.00250 [pdf, other]
Title: Split Learning without Local Weight Sharing to Enhance Client-side Data Privacy
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[48]  arXiv:2212.00135 [pdf, other]
Title: Answering Private Linear Queries Adaptively using the Common Mechanism
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[49]  arXiv:2212.00128 [pdf, ps, other]
Title: An Optimized Privacy-Utility Trade-off Framework for Differentially Private Data Sharing in Blockchain-based Internet of Things
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2212.00068 [pdf, ps, other]
Title: Differentially Private Enhanced Permissioned Blockchain for Private Data Sharing in Industrial IoT
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2212.00726 (cross-list from cs.CY) [pdf, other]
Title: Predicting Digital Asset Prices using Natural Language Processing: a survey
Authors: Trang Tran
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[52]  arXiv:2212.00612 (cross-list from cs.LG) [pdf, other]
Title: Purifier: Defending Data Inference Attacks via Transforming Confidence Scores
Comments: accepted by AAAI 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[53]  arXiv:2212.00573 (cross-list from cs.CY) [pdf, other]
Title: A perspective on the use of health digital twins in computational pathology
Authors: Manuel Cossio
Comments: 6 pages, 3 figures
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[54]  arXiv:2212.00484 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Data Synthetisation for Secure Information Sharing
Comments: 10 pages, 7 figures and 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[55]  arXiv:2212.00328 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Learning with Per-Sample Adaptive Clipping
Comments: To appear in AAAI 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[56]  arXiv:2212.00322 (cross-list from cs.LG) [pdf, other]
Title: Hijack Vertical Federated Learning Models with Adversarial Embedding
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[57]  arXiv:2212.00309 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Adaptive Optimization with Delayed Preconditioners
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[58]  arXiv:2212.00306 (cross-list from cs.LG) [pdf, other]
Title: Decentralized Matrix Factorization with Heterogeneous Differential Privacy
Authors: Wentao Hu, Hui Fang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[59]  arXiv:2212.00292 (cross-list from econ.GN) [pdf, other]
Title: Economics of NFTs: The Value of Creator Royalties
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Trading and Market Microstructure (q-fin.TR)

Thu, 1 Dec 2022

[60]  arXiv:2211.17230 [pdf, other]
Title: The Bounded Gaussian Mechanism for Differential Privacy
Authors: Bo Chen, Matthew Hale
Comments: 27 pages, submitted to Journal of Privacy and Confidentiality
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2211.17073 [pdf, other]
Title: Risks to Zero Trust in a Federated Mission Partner Environment
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2211.17019 [pdf, other]
Title: Real time QKD Post Processing based on Reconfigurable Hardware Acceleration
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2211.16993 [pdf, other]
Title: Post-Quantum $κ$-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets
Authors: Xingyu Yan (1), Licheng Wang (2), Weiqiang Wen (3), Ziyi Li (4), Jingwen Suo (1), Lize Gu (1) ((1) State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China. (2) School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, 100081, China. (3) LTCI, Telecom Paris, Institut Polytechnique de Paris, Paris, France. (4) State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences, Beijing, 100049, China.)
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Quantum Physics (quant-ph)
[64]  arXiv:2211.16987 [pdf, other]
Title: Secure Software Development Methodologies: A Multivocal Literature Review
Comments: 27 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2211.16942 [pdf]
Title: ALARM: Active LeArning of Rowhammer Mitigations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[66]  arXiv:2211.16891 [pdf, ps, other]
Title: Quantitative Information Flow for Hardware: Advancing the Attack Landscape
Comments: 4 pages, accepted at IEEE Latin American Symposium on Circuits and Systems (LASCAS), 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[67]  arXiv:2211.16735 [pdf, other]
Title: Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities
Authors: Aditya Basu (1), John Sampson (1), Zhiyun Qian (2), Trent Jaeger (1) ((1) The Pennsylvania State University, (2) University of California, Riverside)
Comments: 15 pages, 1 appendix, 2 tables, 12 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[68]  arXiv:2211.16626 [pdf, ps, other]
Title: Sludge for Good: Slowing and Imposing Costs on Cyber Attackers
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2211.17104 (cross-list from cs.MA) [pdf, other]
Title: Agent-Cells with $DNA$ Programming: A Dynamic Decentralized System
Authors: Arash Vaezi
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[70]  arXiv:2211.17070 (cross-list from cs.SI) [pdf, other]
Title: Differentially Private ADMM-Based Distributed Discrete Optimal Transport for Resource Allocation
Comments: 6 pages, 4 images, 1 algorithm, IEEE GLOBECOMM 2022
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[71]  arXiv:2211.16808 (cross-list from cs.LG) [pdf, other]
Title: Efficient Adversarial Input Generation via Neural Net Patching
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[72]  arXiv:2211.16669 (cross-list from cs.LG) [pdf, other]
Title: FedGPO: Heterogeneity-Aware Global Parameter Optimization for Efficient Federated Learning
Comments: 12 pages, 12 figures, IEEE International Symposium on Workload Characterization (IISWC)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 30 Nov 2022

[73]  arXiv:2211.16304 [pdf, other]
Title: Analysis of Anomalous Behavior in Network Systems Using Deep Reinforcement Learning with CNN Architecture
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2211.16235 [src]
Title: DCDetector: An IoT terminal vulnerability mining system based on distributed deep ensemble learning under source code representation
Authors: Wen Zhou
Comments: Some experiments need to be done better, and some theories need to be improved,thank you
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[75]  arXiv:2211.16212 [pdf, other]
Title: Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2211.16128 [pdf, ps, other]
Title: Trustless unknown-order groups
Comments: this https URL
Journal-ref: Mathematical Cryptology, 2022, 1 (2), pp.25-39
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[77]  arXiv:2211.16082 [pdf, other]
Title: Data Privacy Protection in DeFi Protocols
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[78]  arXiv:2211.15993 [pdf, other]
Title: An Empirical Study on Snapshot DAOs
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2211.15929 [pdf, other]
Title: Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[80]  arXiv:2211.15926 [pdf, other]
Title: Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[81]  arXiv:2211.15918 [pdf, other]
Title: Similarity Distribution based Membership Inference Attack on Person Re-identification
Comments: 9 pages, 7 figures, Accepted by AAAI 2023
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2211.15804 [pdf, other]
Title: Towards faster settlement in HTLC-based Cross-Chain Atomic Swaps
Authors: Subhra Mazumdar
Comments: Invited Submission (Security and Privacy) to The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, 2022, 11 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[83]  arXiv:2211.15784 [pdf, other]
Title: A Survey of Relevant Text Mining Technology
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2211.15732 [pdf, other]
Title: Cache Me If You Can: Accuracy-Aware Inference Engine for Differentially Private Data Exploration
Comments: To appear in VLDB'23
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[85]  arXiv:2211.16495 (cross-list from cs.LG) [pdf, other]
Title: Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs
Comments: to appear at ASPDAC'23
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[86]  arXiv:2211.16192 (cross-list from cs.CV) [pdf, other]
Title: Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[87]  arXiv:2211.16044 (cross-list from cs.SD) [pdf, other]
Title: Model Extraction Attack against Self-supervised Speech Models
Comments: Submitted to ICASSP 2023
Subjects: Sound (cs.SD); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[88]  arXiv:2211.15893 (cross-list from cs.LG) [pdf, other]
Title: Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[89]  arXiv:2211.15875 (cross-list from cs.LG) [pdf, other]
Title: Training Time Adversarial Attack Aiming the Vulnerability of Continual Learning
Comments: Accepted at NeurIPS 2022 ML Safety Workshop
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 89 entries: 1-89 ]
[ showing up to 99 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2212, contact, help  (Access key information)