We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 48

[ total of 112 entries: 1-25 | 24-48 | 49-73 | 74-98 | 99-112 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 24 Jun 2022 (continued, showing last 4 of 14 entries)

[49]  arXiv:2206.11750 (cross-list from eess.AS) [pdf, other]
Title: Towards End-to-End Private Automatic Speaker Recognition
Comments: Accepted for publication at Interspeech 2022
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[50]  arXiv:2206.11743 (cross-list from cs.IR) [pdf, other]
Title: LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[51]  arXiv:2206.11480 (cross-list from cs.LG) [pdf, other]
Title: A Framework for Understanding Model Extraction Attack and Defense
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[52]  arXiv:2206.11433 (cross-list from cs.IR) [pdf, other]
Title: Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles
Comments: Accepted by TNNLS. 15 pages, 8 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Thu, 23 Jun 2022

[53]  arXiv:2206.11182 [pdf, other]
Title: Vulnerability Prioritization: An Offensive Security Approach
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[54]  arXiv:2206.11175 [pdf, other]
Title: HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2206.11171 [pdf, other]
Title: Attack Techniques and Threat Identification for Vulnerabilities
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[56]  arXiv:2206.11133 [pdf, other]
Title: Multi-party Secure Broad Learning System for Privacy Preserving
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2206.11024 [pdf, other]
Title: ROSE: A RObust and SEcure DNN Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[58]  arXiv:2206.10963 [pdf, other]
Title: FLaaS: Enabling Practical Federated Learning on Mobile Environments
Comments: 12 pages, 5 figures, 40 references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[59]  arXiv:2206.10927 [pdf]
Title: Exploration of User Privacy in 802.11 Probe Requests with MAC Address Randomization Using Temporal Pattern Analysis
Comments: 10 pages, 5 figures, submitted to LBS2022 conference
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[60]  arXiv:2206.10898 [pdf, other]
Title: HybridRAM: The first quantum approach for key recovery attacks on Rainbow
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2206.10835 [pdf, other]
Title: Interpreting Graph-based Sybil Detection Methods as Low-Pass Filtering
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[62]  arXiv:2206.10753 [pdf, other]
Title: Secure and Efficient Query Processing in Outsourced Databases
Authors: Dmytro Bogatov
Comments: Ph.D. thesis
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[63]  arXiv:2206.10746 [pdf]
Title: A Practical Methodology for ML-Based EM Side Channel Disassemblers
Authors: Cesar N. Arguello (1), Hunter Searle (1), Sara Rampazzi (1), Kevin R. B. Butler (1) ((1) University of Florida)
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2206.10685 [pdf, other]
Title: Differentially Private Maximal Information Coefficients
Comments: 38 pages, to appear in ICML 2022
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Methodology (stat.ME)
[65]  arXiv:2206.11187 (cross-list from cs.AI) [pdf, other]
Title: Automated Compliance Blueprint Optimization with Artificial Intelligence
Comments: 5 pages
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[66]  arXiv:2206.10989 (cross-list from cs.CV) [pdf, other]
Title: Identity Documents Authentication based on Forgery Detection of Guilloche Pattern
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[67]  arXiv:2206.10924 (cross-list from cs.CL) [pdf]
Title: Enhancing Networking Cipher Algorithms with Natural Language
Authors: John E. Ortega
Comments: 12 pages, David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022 pp. 43-54, 2022. CS & IT - CSCP 2022 DOI: 10.5121/csit.2022.121013
Journal-ref: David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022, pp. 43-54, 2022. CS & IT
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[68]  arXiv:2206.10875 (cross-list from cs.LG) [pdf, other]
Title: Guided Diffusion Model for Adversarial Purification from Random Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[69]  arXiv:2206.10858 (cross-list from cs.LG) [pdf, other]
Title: Robust Universal Adversarial Perturbations
Comments: 16 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[70]  arXiv:2206.10673 (cross-list from cs.CV) [pdf, ps, other]
Title: Natural Backdoor Datasets
Comments: 18 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)

Wed, 22 Jun 2022 (showing first 3 of 42 entries)

[71]  arXiv:2206.10525 [pdf, other]
Title: Three-way optimization of privacy and utility of location data
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR)
[72]  arXiv:2206.10473 [pdf]
Title: Securing the Future Internet of Things with Post-Quantum Cryptography
Comments: Accepted version
Journal-ref: Security and Privacy 5 (2), e20, 2022
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2206.10413 [pdf, other]
Title: Multilayer Block Models for Exploratory Analysis of Computer Event Logs
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[ total of 112 entries: 1-25 | 24-48 | 49-73 | 74-98 | 99-112 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2206, contact, help  (Access key information)