We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 14

[ total of 100 entries: 1-10 | 5-14 | 15-24 | 25-34 | 35-44 | 45-54 | ... | 95-100 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 16 Aug 2022 (continued, showing 10 of 27 entries)

[15]  arXiv:2208.06481 [pdf, other]
Title: PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data
Comments: Accepted for IEEE Symposium on Visualization in Cyber Security, 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[16]  arXiv:2208.07353 (cross-list from cs.LG) [pdf, other]
Title: Easy Differentially Private Linear Regression
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2208.07316 (cross-list from cs.CL) [pdf, other]
Title: MENLI: Robust Evaluation Metrics from Natural Language Inference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2208.07272 (cross-list from cs.LG) [pdf, other]
Title: Training-Time Attacks against k-Nearest Neighbors
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[19]  arXiv:2208.07241 (cross-list from cs.CV) [pdf, other]
Title: HEFT: Homomorphically Encrypted Fusion of Biometric Templates
Comments: IJCB 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[20]  arXiv:2208.07119 (cross-list from cs.SE) [pdf, other]
Title: Xscope: Hunting for Cross-Chain Bridge Attacks
Comments: To appear at the Tool Demonstration Track of ASE'22. Please cite the conference version
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[21]  arXiv:2208.06963 (cross-list from cs.IT) [pdf, ps, other]
Title: Privacy-Preserving Decentralized Inference with Graph Neural Networks in Wireless Networks
Comments: This paper has been submitted to TWC
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2208.06946 (cross-list from cs.AI) [pdf, other]
Title: Targeted Honeyword Generation with Language Models
Comments: 8 pages, 7 tables, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[23]  arXiv:2208.06767 (cross-list from cs.NI) [pdf, other]
Title: IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation
Comments: Accepted to S&P '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[24]  arXiv:2208.06651 (cross-list from cs.SI) [pdf, other]
Title: Revisiting Adversarial Attacks on Graph Neural Networks for Graph Classification
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 100 entries: 1-10 | 5-14 | 15-24 | 25-34 | 35-44 | 45-54 | ... | 95-100 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)