We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 10

[ total of 73 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | ... | 71-73 ]
[ showing 10 entries per page: fewer | more | all ]

Fri, 5 Aug 2022 (continued, showing last 6 of 16 entries)

[11]  arXiv:2208.02556 (cross-list from cs.CV) [pdf, other]
Title: Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Comments: arXiv admin note: text overlap with arXiv:2205.12041
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[12]  arXiv:2208.02482 (cross-list from cs.CV) [pdf, other]
Title: Privacy Safe Representation Learning via Frequency Filtering Encoder
Comments: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety (AISafety 2022)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13]  arXiv:2208.02468 (cross-list from math.GR) [pdf, ps, other]
Title: On Compression Functions over Small Groups with Applications to Cryptography
Authors: Koji Nuida
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[14]  arXiv:2208.02369 (cross-list from cs.AI) [pdf, other]
Title: Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework
Comments: 12 pages, 3 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[15]  arXiv:2208.02304 (cross-list from cs.LG) [pdf, other]
Title: How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[16]  arXiv:2208.02250 (cross-list from cs.SD) [pdf]
Title: Adversarial Attacks on ASR Systems: An Overview
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)

Thu, 4 Aug 2022 (showing first 4 of 23 entries)

[17]  arXiv:2208.02244 [pdf, other]
Title: Contrasting global approaches for identifying and managing cybersecurity risks in supply chains
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[18]  arXiv:2208.02201 [pdf, other]
Title: Statistical Decoding 2.0: Reducing Decoding to LPN
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2208.02160 [pdf]
Title: Scrypt Mining with ASICs
Comments: Published in 2014
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2208.02159 [pdf, other]
Title: CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 73 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | ... | 71-73 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)