We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 10

[ total of 91 entries: 1-25 | 11-35 | 36-60 | 61-85 | 86-91 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 30 Mar 2023 (continued, showing last 9 of 19 entries)

[11]  arXiv:2303.16282 [pdf, other]
Title: ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2303.16861 (cross-list from cs.LG) [pdf, other]
Title: Beyond Empirical Risk Minimization: Local Structure Preserving Regularization for Improving Adversarial Robustness
Comments: 13 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[13]  arXiv:2303.16729 (cross-list from cs.IT) [pdf, ps, other]
Title: Binary self-orthogonal codes which meet the Griesmer bound or have optimal minimum distances
Comments: Submitted 20 January, 2023
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[14]  arXiv:2303.16704 (cross-list from cs.LG) [pdf, other]
Title: TraVaG: Differentially Private Trace Variant Generation Using GANs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[15]  arXiv:2303.16668 (cross-list from cs.LG) [pdf, other]
Title: A Byzantine-Resilient Aggregation Scheme for Federated Learning via Matrix Autoregression on Client Updates
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[16]  arXiv:2303.16633 (cross-list from cs.LG) [pdf, other]
Title: Targeted Adversarial Attacks on Wind Power Forecasts
Comments: 20 pages, including appendix, 12 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2303.16528 (cross-list from cs.CL) [pdf, other]
Title: Building a Knowledge Graph of Distributed Ledger Technologies
Comments: URI: this https URL
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[18]  arXiv:2303.16372 (cross-list from cs.LG) [pdf, other]
Title: Non-Asymptotic Lower Bounds For Training Data Reconstruction
Comments: 19 Pages, 2 Figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[19]  arXiv:2303.16366 (cross-list from cs.IT) [pdf, ps, other]
Title: HerA Scheme: Secure Distributed Matrix Multiplication via Hermitian Codes
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Algebraic Geometry (math.AG)

Wed, 29 Mar 2023

[20]  arXiv:2303.16031 [pdf, ps, other]
Title: A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
Comments: Accepted by the Interspeech 2022. The first two authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[21]  arXiv:2303.16004 [pdf, other]
Title: A Survey on Malware Detection with Graph Representation Learning
Comments: Preprint, submitted to ACM Computing Surveys on March 2023. For any suggestions or improvements, please contact me directly by e-mail
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2303.15986 [pdf, other]
Title: Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2303.15950 [pdf, other]
Title: A source separation approach to temporal graph modelling for computer networks
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP); Machine Learning (stat.ML)
[24]  arXiv:2303.15847 [pdf, other]
Title: Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[25]  arXiv:2303.15571 [pdf, other]
Title: EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[26]  arXiv:2303.15540 [pdf, other]
Title: Intel TDX Demystified: A Top-Down Approach
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[27]  arXiv:2303.15901 (cross-list from cs.LG) [pdf, other]
Title: Denoising Autoencoder-based Defensive Distillation as an Adversarial Robustness Algorithm
Comments: This paper have 4 pages, 3 figures and it is accepted at the Ada User journal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[28]  arXiv:2303.15673 (cross-list from cs.AR) [pdf, other]
Title: The Mirage of Breaking MIRAGE: Refuting the HPCA-2023 Paper "Are Randomized Caches Truly Random?"
Comments: Our code repository containing bug-fixes for the HPCA'23 paper's code is at this https URL
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[29]  arXiv:2303.15563 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy-preserving machine learning for healthcare: open challenges and future perspectives
Comments: ICLR 2023 Workshop on Trustworthy Machine Learning for Healthcare (TML4H)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Tue, 28 Mar 2023 (showing first 6 of 27 entries)

[30]  arXiv:2303.15258 [pdf, ps, other]
Title: Unconditionally secure ciphers with a short key for a source with unknown statistics
Authors: Boris Ryabko
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[31]  arXiv:2303.15148 [pdf]
Title: Performanz Evaluation von PQC in TLS 1.3 unter variierenden Netzwerkcharakteristiken
Authors: Johanna Henrich
Comments: Master's thesis, 160 pages, in German
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[32]  arXiv:2303.15143 [pdf, other]
Title: Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2303.15128 [pdf, ps, other]
Title: Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[34]  arXiv:2303.14895 [pdf, other]
Title: Directed Greybox Fuzzing with Stepwise Constraint Focusing
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2303.14822 [pdf, other]
Title: MGTBench: Benchmarking Machine-Generated Text Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 91 entries: 1-25 | 11-35 | 36-60 | 61-85 | 86-91 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)