We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 18

[ total of 143 entries: 1-10 | 9-18 | 19-28 | 29-38 | 39-48 | 49-58 | ... | 139-143 ]
[ showing 10 entries per page: fewer | more | all ]

Mon, 13 May 2024 (continued, showing last 3 of 21 entries)

[19]  arXiv:2405.06073 (cross-list from cs.LG) [pdf, other]
Title: Hard Work Does Not Always Pay Off: Poisoning Attacks on Neural Architecture Search
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[20]  arXiv:2405.06049 (cross-list from cs.CV) [pdf, other]
Title: BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2403.19303 (cross-list from cs.CY) [pdf, ps, other]
Title: Developing generative AI chatbots conceptual framework for higher education
Comments: 28 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)

Fri, 10 May 2024 (showing first 7 of 17 entries)

[22]  arXiv:2405.05930 [pdf, other]
Title: Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[23]  arXiv:2405.05906 [pdf, other]
Title: Deep Multi-Task Learning for Malware Image Classification
Journal-ref: Journal of Information Security and Applications, Volume 64, 2022, Page 103057
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[24]  arXiv:2405.05846 [pdf, other]
Title: Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[25]  arXiv:2405.05789 [pdf, other]
Title: High-Performance Privacy-Preserving Matrix Completion for Trajectory Recovery
Authors: Jiahao Guo, An-Bao Xu
Comments: 7 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[26]  arXiv:2405.05784 [pdf, other]
Title: Link Stealing Attacks Against Inductive Graph Neural Networks
Comments: To appear in the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 15-20, 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2405.05590 [pdf, other]
Title: TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[28]  arXiv:2405.05525 [pdf, other]
Title: Ditto: Quantization-aware Secure Inference of Transformers upon MPC
Comments: to be published in ICML 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 143 entries: 1-10 | 9-18 | 19-28 | 29-38 | 39-48 | 49-58 | ... | 139-143 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)