We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 20

[ total of 99 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-99 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 6 Oct 2022 (continued, showing last 2 of 22 entries)

[21]  arXiv:2210.01864 (cross-list from cs.LG) [pdf, other]
Title: Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[22]  arXiv:2210.01834 (cross-list from cs.LG) [pdf, other]
Title: Invariant Aggregator for Defending Federated Backdoor Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Wed, 5 Oct 2022

[23]  arXiv:2210.01778 [pdf, other]
Title: Semantics-based Privacy by Design for Internet of Things Applications
Journal-ref: Future Generation Computer Systems, Volume 138, January 2023, Pages 280-295
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[24]  arXiv:2210.01749 [pdf, other]
Title: Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Comments: arXiv admin note: text overlap with arXiv:2206.01314
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2210.01739 [pdf]
Title: Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[26]  arXiv:2210.01688 [pdf, other]
Title: Blockchain-Based Decentralized Knowledge Marketplace Using Active Inference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[27]  arXiv:2210.01632 [pdf, other]
Title: Backdoor Attacks in the Supply Chain of Masked Image Modeling
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[28]  arXiv:2210.01594 [pdf, other]
Title: GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
Comments: 11 pages, 7 figures, 2 tables, 3 algorithms, in IEEE TBIOM 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[29]  arXiv:2210.01297 [pdf, other]
Title: Privacy-Preserving Link Prediction
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2210.01260 [pdf, other]
Title: Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Comments: 13 pages; to appear in WISA 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2210.01785 (cross-list from cs.LG) [pdf, other]
Title: Data Leakage in Tabular Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[32]  arXiv:2210.01636 (cross-list from quant-ph) [pdf]
Title: Long-Range QKD without Trusted Nodes is Not Possible with Current Technology
Comments: 9 pages, 2 figures and 1 table
Journal-ref: npj Quantum Inf 8, 108 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[33]  arXiv:2210.01451 (cross-list from cs.LG) [pdf, ps, other]
Title: Certified Data Removal in Sum-Product Networks
Comments: Accepted at ICKG 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[34]  arXiv:2210.01318 (cross-list from cs.LG) [pdf, other]
Title: OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[35]  arXiv:2210.01288 (cross-list from cs.LG) [pdf, other]
Title: Strength-Adaptive Adversarial Training
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[36]  arXiv:2210.01160 (cross-list from math.NT) [pdf, ps, other]
Title: On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
Comments: 18 pp
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)

Tue, 4 Oct 2022 (showing first 9 of 31 entries)

[37]  arXiv:2210.01111 [pdf, other]
Title: MultiGuard: Provably Robust Multi-label Classification against Adversarial Examples
Comments: Accepted by NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38]  arXiv:2210.01075 [pdf, other]
Title: Decompiling x86 Deep Neural Network Executables
Comments: The extended version of a paper to appear in the Proceedings of the 32nd USENIX Security Symposium, 2023, (USENIX Security '23), 25 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2210.00968 [pdf, other]
Title: Membership Inference Attacks Against Text-to-image Generation Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40]  arXiv:2210.00957 [pdf, other]
Title: UnGANable: Defending Against GAN-based Face Manipulation
Comments: Accepted by USENIX Security 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[41]  arXiv:2210.00875 [pdf, other]
Title: Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Comments: This work is accepted by the NeurIPS 2022. The first two authors contributed equally to this work. 25 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[42]  arXiv:2210.00856 [pdf, other]
Title: A forensic analysis of the Google Home: repairing compressed data without error correction
Comments: 28 pages, modified version of paper that appeared originally at Forensic Science International: Digital Investigation
Journal-ref: Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[43]  arXiv:2210.00649 [pdf, other]
Title: Automated Security Analysis of Exposure Notification Systems
Comments: 23 pages, Full version of the corresponding USENIX Security '23 paper
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2210.00615 [pdf, other]
Title: iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Comments: 9 pages, 5 figures, IEEE International Joint Conference on Biometrics (IJCB 2022)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[45]  arXiv:2210.00597 [pdf, other]
Title: Composition of Differential Privacy & Privacy Amplification by Subsampling
Authors: Thomas Steinke
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[ total of 99 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-99 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2210, contact, help  (Access key information)