We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 115

[ total of 110 entries: 1-25 | 11-35 | 36-60 | 61-85 | 86-110 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 13 May 2024 (continued, showing last 8 of 21 entries)

[86]  arXiv:2405.06368 (cross-list from cs.LG) [pdf, other]
Title: DP-DyLoRA: Fine-Tuning Transformer-Based Models On-Device under Differentially Private Federated Learning using Dynamic Low-Rank Adaptation
Comments: 16 pages, 10 figures, 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[87]  arXiv:2405.06278 (cross-list from cs.CV) [pdf, other]
Title: Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[88]  arXiv:2405.06247 (cross-list from cs.LG) [pdf, other]
Title: Disttack: Graph Adversarial Attacks Toward Distributed GNN Training
Comments: Accepted by 30th International European Conference on Parallel and Distributed Computing(Euro-Par 2024)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[89]  arXiv:2405.06172 (cross-list from cs.LG) [pdf, other]
Title: Anomaly Detection in Graph Structured Data: A Survey
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[90]  arXiv:2405.06126 (cross-list from quant-ph) [pdf, other]
Title: Quantum Secure Anonymous Communication Networks
Comments: Accepted for publication in QCNC2024
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[91]  arXiv:2405.06073 (cross-list from cs.LG) [pdf, other]
Title: Hard Work Does Not Always Pay Off: Poisoning Attacks on Neural Architecture Search
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[92]  arXiv:2405.06049 (cross-list from cs.CV) [pdf, other]
Title: BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:2403.19303 (cross-list from cs.CY) [pdf, ps, other]
Title: Developing generative AI chatbots conceptual framework for higher education
Comments: 28 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)

Fri, 10 May 2024

[94]  arXiv:2405.05930 [pdf, other]
Title: Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[95]  arXiv:2405.05906 [pdf, other]
Title: Deep Multi-Task Learning for Malware Image Classification
Journal-ref: Journal of Information Security and Applications, Volume 64, 2022, Page 103057
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[96]  arXiv:2405.05846 [pdf, other]
Title: Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[97]  arXiv:2405.05789 [pdf, other]
Title: High-Performance Privacy-Preserving Matrix Completion for Trajectory Recovery
Authors: Jiahao Guo, An-Bao Xu
Comments: 7 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[98]  arXiv:2405.05784 [pdf, other]
Title: Link Stealing Attacks Against Inductive Graph Neural Networks
Comments: To appear in the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 15-20, 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[99]  arXiv:2405.05590 [pdf, other]
Title: TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[100]  arXiv:2405.05525 [pdf, other]
Title: Ditto: Quantization-aware Secure Inference of Transformers upon MPC
Comments: to be published in ICML 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[101]  arXiv:2405.05469 [pdf, other]
Title: PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2405.05435 [pdf, other]
Title: Analysis and prevention of AI-based phishing email attacks
Comments: Electronics, accepted
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[103]  arXiv:2405.05724 (cross-list from cs.SI) [pdf, other]
Title: Private Online Community Detection for Censored Block Models
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[104]  arXiv:2405.05611 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[105]  arXiv:2405.05610 (cross-list from cs.CL) [pdf, other]
Title: Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[106]  arXiv:2405.05588 (cross-list from cs.LG) [pdf, other]
Title: Model Inversion Robustness: Can Transfer Learning Help?
Journal-ref: CVPR 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[107]  arXiv:2405.05573 (cross-list from cs.CV) [pdf, other]
Title: Poisoning-based Backdoor Attacks for Arbitrary Target Label with Positive Triggers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[108]  arXiv:2405.05502 (cross-list from cs.CV) [pdf, other]
Title: Towards Accurate and Robust Architectures via Neural Architecture Search
Comments: Accepted by CVPR2024. arXiv admin note: substantial text overlap with arXiv:2212.14049
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[109]  arXiv:2405.05428 (cross-list from cs.CV) [pdf, other]
Title: Adversary-Guided Motion Retargeting for Skeleton Anonymization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2405.05369 (cross-list from cs.LG) [pdf, other]
Title: Model Reconstruction Using Counterfactual Explanations: Mitigating the Decision Boundary Shift
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[ total of 110 entries: 1-25 | 11-35 | 36-60 | 61-85 | 86-110 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)