We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 5

[ total of 102 entries: 1-25 | 6-30 | 31-55 | 56-80 | 81-102 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 1 Dec 2022 (continued, showing last 8 of 13 entries)

[6]  arXiv:2211.16942 [pdf]
Title: ALARM: Active LeArning of Rowhammer Mitigations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[7]  arXiv:2211.16891 [pdf, ps, other]
Title: Quantitative Information Flow for Hardware: Advancing the Attack Landscape
Comments: 4 pages, accepted at IEEE Latin American Symposium on Circuits and Systems (LASCAS), 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[8]  arXiv:2211.16735 [pdf, other]
Title: Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities
Authors: Aditya Basu (1), John Sampson (1), Zhiyun Qian (2), Trent Jaeger (1) ((1) The Pennsylvania State University, (2) University of California, Riverside)
Comments: 15 pages, 1 appendix, 2 tables, 12 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[9]  arXiv:2211.16626 [pdf, ps, other]
Title: Sludge for Good: Slowing and Imposing Costs on Cyber Attackers
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2211.17104 (cross-list from cs.MA) [pdf, other]
Title: Agent-Cells with $DNA$ Programming: A Dynamic Decentralized System
Authors: Arash Vaezi
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[11]  arXiv:2211.17070 (cross-list from cs.SI) [pdf, other]
Title: Differentially Private ADMM-Based Distributed Discrete Optimal Transport for Resource Allocation
Comments: 6 pages, 4 images, 1 algorithm, IEEE GLOBECOMM 2022
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[12]  arXiv:2211.16808 (cross-list from cs.LG) [pdf, other]
Title: Efficient Adversarial Input Generation via Neural Net Patching
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[13]  arXiv:2211.16669 (cross-list from cs.LG) [pdf, other]
Title: FedGPO: Heterogeneity-Aware Global Parameter Optimization for Efficient Federated Learning
Comments: 12 pages, 12 figures, IEEE International Symposium on Workload Characterization (IISWC)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 30 Nov 2022

[14]  arXiv:2211.16304 [pdf, other]
Title: Analysis of Anomalous Behavior in Network Systems Using Deep Reinforcement Learning with CNN Architecture
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2211.16235 [pdf]
Title: DCDetector: An IoT terminal vulnerability mining system based on distributed deep ensemble learning under source code representation
Authors: Wen Zhou
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[16]  arXiv:2211.16212 [pdf, other]
Title: Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2211.16128 [pdf, ps, other]
Title: Trustless unknown-order groups
Comments: this https URL
Journal-ref: Mathematical Cryptology, 2022, 1 (2), pp.25-39
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[18]  arXiv:2211.16082 [pdf, other]
Title: Data Privacy Protection in DeFi Protocols
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[19]  arXiv:2211.15993 [pdf, other]
Title: An Empirical Study on Snapshot DAOs
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2211.15929 [pdf, other]
Title: Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2211.15926 [pdf, other]
Title: Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[22]  arXiv:2211.15918 [pdf, other]
Title: Similarity Distribution based Membership Inference Attack on Person Re-identification
Comments: 9 pages, 7 figures, Accepted by AAAI 2023
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2211.15804 [pdf, other]
Title: Towards faster settlement in HTLC-based Cross-Chain Atomic Swaps
Authors: Subhra Mazumdar
Comments: Invited Submission (Security and Privacy) to The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, 2022, 11 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[24]  arXiv:2211.15784 [pdf, other]
Title: A Survey of Relevant Text Mining Technology
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2211.15732 [pdf, other]
Title: Cache Me If You Can: Accuracy-Aware Inference Engine for Differentially Private Data Exploration
Comments: To appear in VLDB'23
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[26]  arXiv:2211.16495 (cross-list from cs.LG) [pdf, other]
Title: Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs
Comments: to appear at ASPDAC'23
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[27]  arXiv:2211.16192 (cross-list from cs.CV) [pdf, other]
Title: Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[28]  arXiv:2211.16044 (cross-list from cs.SD) [pdf, other]
Title: Model Extraction Attack against Self-supervised Speech Models
Comments: Submitted to ICASSP 2023
Subjects: Sound (cs.SD); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[29]  arXiv:2211.15893 (cross-list from cs.LG) [pdf, other]
Title: Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[30]  arXiv:2211.15875 (cross-list from cs.LG) [pdf, other]
Title: Training Time Adversarial Attack Aiming the Vulnerability of Continual Learning
Comments: Accepted at NeurIPS 2022 ML Safety Workshop
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 102 entries: 1-25 | 6-30 | 31-55 | 56-80 | 81-102 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2211, contact, help  (Access key information)