We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 26

[ total of 118 entries: 1-25 | 2-26 | 27-51 | 52-76 | 77-101 | 102-118 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 28 Nov 2022 (continued, showing last 4 of 30 entries)

[27]  arXiv:2211.13416 (cross-list from cs.LG) [pdf, other]
Title: Data Provenance Inference in Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Databases (cs.DB)
[28]  arXiv:2211.13403 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Image Classification from Features
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[29]  arXiv:2211.13324 (cross-list from cs.AR) [pdf, other]
Title: A Garbled Circuit Accelerator for Arbitrary, Fast Privacy-Preserving Computation
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[30]  arXiv:2211.13305 (cross-list from cs.CV) [pdf, other]
Title: Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Thu, 24 Nov 2022

[31]  arXiv:2211.13195 [pdf, other]
Title: Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2211.13104 [pdf, other]
Title: Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[33]  arXiv:2211.13097 [pdf, other]
Title: DeepVulSeeker: A Novel Vulnerability Identification Framework via Code Graph Structure and Pre-training Mechanism
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2211.13041 [pdf, other]
Title: A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity -- The Perfect Revocation Method does not exist yet
Authors: Andreas Freitag
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[35]  arXiv:2211.12899 [pdf, ps, other]
Title: Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks
Journal-ref: 2021 International Conference of the Biometrics Special Interest Group (BIOSIG), 2021, pp. 1-5,
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[36]  arXiv:2211.12874 [pdf, ps, other]
Title: A Dynamic Weighted Federated Learning for Android Malware Classification
Comments: Accepted in SoCTA 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2211.12686 [pdf, other]
Title: Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[38]  arXiv:2211.13171 (cross-list from cs.CV) [pdf, other]
Title: Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[39]  arXiv:2211.13123 (cross-list from cs.LG) [pdf, other]
Title: Motif-aware temporal GCN for fraud detection in signed cryptocurrency trust networks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Trading and Market Microstructure (q-fin.TR)
[40]  arXiv:2211.13116 (cross-list from cs.LG) [pdf, other]
Title: Fed-TDA: Federated Tabular Data Augmentation on Non-IID Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[41]  arXiv:2211.13110 (cross-list from cs.LG) [pdf, other]
Title: Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism
Comments: 8 pages, 4 figures, 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[42]  arXiv:2211.12990 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning Few-Shot Meta-Learners
Comments: Accepted at I Can't Believe It's Not Better Workshop, Neurips 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[43]  arXiv:2211.12954 (cross-list from quant-ph) [pdf, other]
Title: Quantum-Classical Tradeoffs in the Random Oracle Model
Comments: 36 pages
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[44]  arXiv:2211.12851 (cross-list from cs.NI) [pdf]
Title: A Streamlit-based Artificial Intelligence Trust Platform for Next-Generation Wireless Networks
Comments: 4 pages, 2 figures
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[45]  arXiv:2211.12814 (cross-list from cs.LG) [pdf, other]
Title: Vertical Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[46]  arXiv:2211.12738 (cross-list from cs.GT) [pdf, ps, other]
Title: Differentially Private Fair Division
Comments: Appears in the 37th AAAI Conference on Artificial Intelligence (AAAI), 2023
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[47]  arXiv:2211.12713 (cross-list from cs.LG) [pdf, other]
Title: Reliable Robustness Evaluation via Automatically Constructed Attack Ensembles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)

Wed, 23 Nov 2022 (showing first 4 of 13 entries)

[48]  arXiv:2211.12265 [pdf, other]
Title: High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[49]  arXiv:2211.12227 [pdf, other]
Title: The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm
Authors: Bruno Blanchet (Inria, Paris, France)
Comments: In Proceedings HCVS/VPT 2022, arXiv:2211.10675
Journal-ref: EPTCS 373, 2022, pp. 14-22
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2211.12177 [pdf, ps, other]
Title: Analysis of the DoIP Protocol for Security Vulnerabilities
Journal-ref: Computer Science in Cars Symposium (CSCS 2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[51]  arXiv:2211.12087 [pdf, other]
Title: SoK: Inference Attacks and Defenses in Human-Centered Wireless Sensing
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[ total of 118 entries: 1-25 | 2-26 | 27-51 | 52-76 | 77-101 | 102-118 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2211, contact, help  (Access key information)