We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 39

[ total of 129 entries: 1-100 | 40-129 ]
[ showing 100 entries per page: fewer | more | all ]

Mon, 13 May 2024 (continued, showing last 15 of 21 entries)

[40]  arXiv:2405.06237 [pdf, other]
Title: Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2405.06206 [pdf, other]
Title: Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[42]  arXiv:2405.06124 [pdf, other]
Title: Demystifying Behavior-Based Malware Detection at Endpoints
Comments: Behavior-based malware detection with machine learning. 18 pages, 10 figures, 15 tables. Leaderboard: this https URL
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2405.06074 [pdf, other]
Title: Protocols to Code: Formal Verification of a Next-Generation Internet Router
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Programming Languages (cs.PL)
[44]  arXiv:2405.05999 [pdf, other]
Title: LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2405.05990 [pdf, other]
Title: Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[46]  arXiv:2405.06447 (cross-list from cs.SE) [pdf, other]
Title: Sandboxing Adoption in Open Source Ecosystems
Comments: Published at the 12th ACM/IEEE International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS 2024), Co-located with ICSE
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[47]  arXiv:2405.06368 (cross-list from cs.LG) [pdf, other]
Title: DP-DyLoRA: Fine-Tuning Transformer-Based Models On-Device under Differentially Private Federated Learning using Dynamic Low-Rank Adaptation
Comments: 16 pages, 10 figures, 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[48]  arXiv:2405.06278 (cross-list from cs.CV) [pdf, other]
Title: Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[49]  arXiv:2405.06247 (cross-list from cs.LG) [pdf, other]
Title: Disttack: Graph Adversarial Attacks Toward Distributed GNN Training
Comments: Accepted by 30th International European Conference on Parallel and Distributed Computing(Euro-Par 2024)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[50]  arXiv:2405.06172 (cross-list from cs.LG) [pdf, other]
Title: Anomaly Detection in Graph Structured Data: A Survey
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[51]  arXiv:2405.06126 (cross-list from quant-ph) [pdf, other]
Title: Quantum Secure Anonymous Communication Networks
Comments: Accepted for publication in QCNC2024
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[52]  arXiv:2405.06073 (cross-list from cs.LG) [pdf, other]
Title: Hard Work Does Not Always Pay Off: Poisoning Attacks on Neural Architecture Search
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[53]  arXiv:2405.06049 (cross-list from cs.CV) [pdf, other]
Title: BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54]  arXiv:2403.19303 (cross-list from cs.CY) [pdf, ps, other]
Title: Developing generative AI chatbots conceptual framework for higher education
Comments: 28 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)

Fri, 10 May 2024

[55]  arXiv:2405.05930 [pdf, other]
Title: Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[56]  arXiv:2405.05906 [pdf, other]
Title: Deep Multi-Task Learning for Malware Image Classification
Journal-ref: Journal of Information Security and Applications, Volume 64, 2022, Page 103057
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[57]  arXiv:2405.05846 [pdf, other]
Title: Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[58]  arXiv:2405.05789 [pdf, other]
Title: High-Performance Privacy-Preserving Matrix Completion for Trajectory Recovery
Authors: Jiahao Guo, An-Bao Xu
Comments: 7 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[59]  arXiv:2405.05784 [pdf, other]
Title: Link Stealing Attacks Against Inductive Graph Neural Networks
Comments: To appear in the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 15-20, 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2405.05590 [pdf, other]
Title: TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[61]  arXiv:2405.05525 [pdf, other]
Title: Ditto: Quantization-aware Secure Inference of Transformers upon MPC
Comments: to be published in ICML 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2405.05469 [pdf, other]
Title: PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2405.05435 [pdf, other]
Title: Analysis and prevention of AI-based phishing email attacks
Comments: Electronics, accepted
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[64]  arXiv:2405.05724 (cross-list from cs.SI) [pdf, other]
Title: Private Online Community Detection for Censored Block Models
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[65]  arXiv:2405.05611 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[66]  arXiv:2405.05610 (cross-list from cs.CL) [pdf, other]
Title: Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67]  arXiv:2405.05588 (cross-list from cs.LG) [pdf, other]
Title: Model Inversion Robustness: Can Transfer Learning Help?
Journal-ref: CVPR 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[68]  arXiv:2405.05573 (cross-list from cs.CV) [pdf, other]
Title: Poisoning-based Backdoor Attacks for Arbitrary Target Label with Positive Triggers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[69]  arXiv:2405.05502 (cross-list from cs.CV) [pdf, other]
Title: Towards Accurate and Robust Architectures via Neural Architecture Search
Comments: Accepted by CVPR2024. arXiv admin note: substantial text overlap with arXiv:2212.14049
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2405.05428 (cross-list from cs.CV) [pdf, other]
Title: Adversary-Guided Motion Retargeting for Skeleton Anonymization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[71]  arXiv:2405.05369 (cross-list from cs.LG) [pdf, other]
Title: Model Reconstruction Using Counterfactual Explanations: Mitigating the Decision Boundary Shift
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)

Thu, 9 May 2024

[72]  arXiv:2405.05206 [pdf, other]
Title: Anomaly Detection in Certificate Transparency Logs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73]  arXiv:2405.05196 [pdf, other]
Title: SINBAD: Saliency-informed detection of breakage caused by ad blocking
Authors: Saiid El Hajj Chehade (1), Sandra Siby (2), Carmela Troncoso (1) ((1) EPFL, (2) Imperial College London)
Comments: 19 pages, 13 figures, Appearing in IEEE S&P 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[74]  arXiv:2405.05193 [pdf, other]
Title: Systematic Use of Random Self-Reducibility against Physical Attacks
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2405.05175 [pdf, other]
Title: Air Gap: Protecting Privacy-Conscious Conversational Agents
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[76]  arXiv:2405.05117 [pdf, other]
Title: (In)Security of Mobile Apps in Developing Countries: A Systematic Literature Review
Comments: 18 pages, 1 figure, submitted to a well-known journal
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2405.05040 [pdf, other]
Title: Gröbner Basis Cryptanalysis of Ciminion and Hydra
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2405.05023 [pdf, other]
Title: HackCar: a test platform for attacks and defenses on a cost-contained automotive architecture
Comments: 7 pages, 2 figures, accepted for publication at the 35th IEEE Intelligent Vehicles Symposium (IEEE IV 2024)
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2405.05022 [pdf, other]
Title: Adversarial Threats to Automatic Modulation Open Set Recognition in Wireless Networks
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[80]  arXiv:2405.04892 [pdf, ps, other]
Title: A fuzzy reward and punishment scheme for vehicular ad hoc networks
Comments: Journal Article
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2405.04885 [pdf, ps, other]
Title: A trust management framework for vehicular ad hoc networks
Comments: Journal Article
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2405.04878 [pdf, ps, other]
Title: The Need Of Trustworthy Announcements To Achieve Driving Comfort
Comments: Journal Article
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2405.04874 [pdf, other]
Title: Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2405.04866 [pdf, ps, other]
Title: Systematic review, analysis, and characterisation of malicious industrial network traffic datasets for aiding Machine Learning algorithm performance testing
Comments: 28 pages, preprint submitted to Engineering Applications of Artificial Intelligence (Elsevier)
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2405.04837 [pdf, ps, other]
Title: Enhancing Data Integrity and Traceability in Industry Cyber Physical Systems (ICPS) through Blockchain Technology: A Comprehensive Approach
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[86]  arXiv:2405.04825 [pdf, other]
Title: Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[87]  arXiv:2405.04824 [pdf, ps, other]
Title: Quantum-Edge Cloud Computing: A Future Paradigm for IoT Applications
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2405.04803 [pdf, other]
Title: Blockchains for Internet of Things: Fundamentals, Applications, and Challenges
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[89]  arXiv:2405.04760 [pdf, other]
Title: Large Language Models for Cyber Security: A Systematic Literature Review
Comments: 46 pages,6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[90]  arXiv:2405.04758 [pdf, other]
Title: Honeyfile Camouflage: Hiding Fake Files in Plain Sight
Comments: 3rd Workshop on the security implications of Deepfakes and Cheapfakes (WDC) co-located at ACM ASIACCS 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[91]  arXiv:2405.04753 [pdf, other]
Title: AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models
Comments: 20 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[92]  arXiv:2405.04735 [pdf, other]
Title: Cryptanalysis of the SIMON Cypher Using Neo4j
Comments: 10 pages, 10 figures, 2 algorithms, accepted by the 4th International Conference on Electrical, Computer and Energy Technologies (ICECET) to be presented in July 2024
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Retrieval (cs.IR)
[93]  arXiv:2405.04691 [pdf, other]
Title: Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2405.04561 [pdf, other]
Title: Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums
Comments: 6 pages
Journal-ref: 2023 14th International Conference on Information and Communication Technology Convergence (ICTC)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[95]  arXiv:2405.04554 [pdf, other]
Title: Differentially Private Synthetic Data with Private Density Estimation
Comments: Accepted to ISIT 2024
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Statistics Theory (math.ST); Machine Learning (stat.ML)
[96]  arXiv:2405.04551 [pdf, other]
Title: Differentially Private Federated Learning without Noise Addition: When is it Possible?
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2405.04762 (cross-list from cs.DC) [pdf, ps, other]
Title: Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of Randomness is Needed?
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)

Wed, 8 May 2024

[98]  arXiv:2405.04528 [pdf, other]
Title: Implementing ISO/IEC TS 27560:2023 Consent Records and Receipts for GDPR and DGA
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2405.04526 [pdf, ps, other]
Title: PoW Security-Latency under Random Delays and the Effect of Transaction Fees
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Discrete Mathematics (cs.DM); Information Theory (cs.IT)
[100]  arXiv:2405.04463 [pdf, other]
Title: Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2405.04420 [pdf, other]
Title: Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2405.04373 [pdf, other]
Title: Leveraging LSTM and GAN for Modern Malware Detection
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2405.04355 [pdf, other]
Title: SmmPack: Obfuscation for SMM Modules with TPM Sealed Key
Comments: 21 pages, 7 figures, 4 tables. Accepted at the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024)
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2405.04332 [pdf, other]
Title: WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets
Comments: Just accepted by the Automated Software Engineering Journal
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2405.04198 [pdf, other]
Title: Enhancing Physical Layer Communication Security through Generative AI with Mixture of Experts
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2405.04168 [pdf, other]
Title: Three variations of Heads or Tails Game for Bitcoin
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[107]  arXiv:2405.04152 [pdf, other]
Title: CAKE: Sharing Slices of Confidential Data on Blockchain
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2405.04138 [pdf, ps, other]
Title: GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[109]  arXiv:2405.04115 [pdf, other]
Title: A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
Comments: Accepted to CVPR 2024
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2405.04109 [pdf, other]
Title: The Malware as a Service ecosystem
Comments: To appear in D Gritzalis, KKR Choo, C Patsakis, "Malware - Handbook of Prevention and Detection", Springer (Advances in Information Security)
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2405.04108 [pdf, other]
Title: A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[112]  arXiv:2405.04095 [pdf, other]
Title: Going Proactive and Explanatory Against Malware Concept Drift
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[113]  arXiv:2405.04068 [pdf, other]
Title: An Improved Reversible Data Hiding Algorithm Based on Reconstructed Mapping for PVO-k
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2405.04049 [pdf, other]
Title: Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[115]  arXiv:2405.04046 [pdf, ps, other]
Title: MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2405.04032 [pdf, other]
Title: Locally Differentially Private In-Context Learning
Comments: This paper was published at LREC-Coling 2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2405.04029 [pdf, other]
Title: Enabling Privacy-Preserving and Publicly Auditable Federated Learning
Authors: Huang Zeng (1), Anjia Yang (1), Jian Weng (1), Min-Rong Chen (2), Fengjun Xiao (3 and 4), Yi Liu (1), Ye Yao (4)
Comments: ICC 2024 - 2024 IEEE International Conference on Communications Conference Program
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2405.04021 [pdf, other]
Title: Robust and Reusable Fuzzy Extractors for Low-entropy Rate Randomness Sources
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2405.04010 [pdf, other]
Title: Explainability-Informed Targeted Malware Misclassification
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2405.03991 [pdf, other]
Title: Assemblage: Automatic Binary Dataset Construction for Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[121]  arXiv:2405.03974 [pdf, other]
Title: TBNet: A Neural Architectural Defense Framework Facilitating DNN Model Protection in Trusted Execution Environments
Journal-ref: DAC2024
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[122]  arXiv:2405.03891 [pdf, other]
Title: Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[123]  arXiv:2405.03830 [pdf, other]
Title: Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2405.03828 [pdf, ps, other]
Title: The Trajectory of Romance Scams in the U.S
Comments: 6 pages, 3 figures, 12th International Symposium on Digital Forensics and Security
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[125]  arXiv:2405.03775 [pdf, other]
Title: Secure Inference for Vertically Partitioned Data Using Multiparty Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2405.04344 (cross-list from cs.AI) [pdf, other]
Title: Enhancing Scalability of Metric Differential Privacy via Secret Dataset Partitioning and Benders Decomposition
Authors: Chenxi Qiu
Comments: To be published in IJCAI 2024
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[127]  arXiv:2405.04072 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Unpredictability
Comments: 38 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[128]  arXiv:2405.04034 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Post-Processing for Fair Regression
Comments: ICML 2024. Code is at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[129]  arXiv:2312.12105 (cross-list from cs.DC) [pdf, other]
Title: Trusted Execution Environment for Decentralized Process Mining
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[ total of 129 entries: 1-100 | 40-129 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2405, contact, help  (Access key information)