We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 50

[ total of 84 entries: 1-25 | 26-50 | 51-75 | 76-84 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 28 Jun 2022 (continued, showing last 7 of 25 entries)

[51]  arXiv:2206.12766 (cross-list from cs.DB) [pdf]
Title: Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Journal-ref: 2021 IEEE International Conference on Digital Health (ICDH)
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[52]  arXiv:2206.12749 (cross-list from cs.LG) [pdf, ps, other]
Title: Design and Analysis of Robust Resilient Diffusion over Multi-Task Networks Against Byzantine Attacks
Comments: 16 pages, 22 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[53]  arXiv:2206.12714 (cross-list from cs.CV) [pdf, other]
Title: Defending Multimodal Fusion Models against Single-Source Adversaries
Comments: CVPR 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54]  arXiv:2206.12685 (cross-list from cs.CV) [pdf]
Title: Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising
Journal-ref: IAES International Journal of Artificial Intelligence, Vol. 11, No. 3, September 2022, pp. 961~968, ISSN: 2252-8938
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[55]  arXiv:2206.12669 (cross-list from cs.IT) [pdf, other]
Title: Crypto Makes AI Evolve
Authors: Behrouz Zolfaghari (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Elnaz Rabieinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Abbas Yazdinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Reza M. Parizi (College of Computing and Software Engineering, Kennesaw State University, GA, USA), Ali Dehghantanha (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[56]  arXiv:2206.12654 (cross-list from cs.LG) [pdf, other]
Title: BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
Comments: 30 pages, 14 figures, 10 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[57]  arXiv:2206.12527 (cross-list from eess.SP) [pdf, other]
Title: Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Comments: 5 pages, 5 figures
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)

Mon, 27 Jun 2022

[58]  arXiv:2206.12251 [pdf]
Title: Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[59]  arXiv:2206.12236 [pdf, other]
Title: Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison
Comments: Accepted by EAI SecureComm 2022, 20 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2206.12227 [pdf, other]
Title: Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[61]  arXiv:2206.12224 [pdf, other]
Title: MPClan: Protocol Suite for Privacy-Conscious Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (cs.LG)
[62]  arXiv:2206.12093 [pdf, ps, other]
Title: An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2206.11974 [pdf, other]
Title: Keep Your Transactions On Short Leashes
Authors: Bennet Yee
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2206.11961 [pdf, ps, other]
Title: LRPC codes with multiple syndromes: near ideal-size KEMs without ideals
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2206.12401 (cross-list from cs.IR) [pdf, other]
Title: Debiasing Learning for Membership Inference Attacks Against Recommender Systems
Comments: Accepted by KDD 2022
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2206.12395 (cross-list from cs.LG) [pdf, other]
Title: Data Leakage in Federated Averaging
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[67]  arXiv:2206.12270 (cross-list from cs.LG) [pdf, other]
Title: Using Autoencoders on Differentially Private Federated Learning GANs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[68]  arXiv:2206.12183 (cross-list from cs.LG) [pdf, other]
Title: "You Can't Fix What You Can't Measure": Privately Measuring Demographic Performance Disparities in Federated Learning
Comments: 14 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[69]  arXiv:2206.12100 (cross-list from cs.LG) [pdf, other]
Title: zPROBE: Zero Peek Robustness Checks for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[70]  arXiv:2206.11973 (cross-list from q-fin.RM) [pdf]
Title: Liquidity Risks in Lending Protocols (LPs): Evidence from Aave Protocol
Authors: Xiaotong Sun
Subjects: Risk Management (q-fin.RM); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); Trading and Market Microstructure (q-fin.TR)

Fri, 24 Jun 2022 (showing first 5 of 14 entries)

[71]  arXiv:2206.11840 [pdf, other]
Title: Design Exploration and Security Assessment of PUF-on-PUF Implementations
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[72]  arXiv:2206.11821 [pdf, other]
Title: A Survey of DeFi Security: Challenges and Opportunities
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2206.11793 [pdf, other]
Title: Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Comments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[74]  arXiv:2206.11641 [pdf, other]
Title: Advancing Blockchain-based Federated Learning through Verifiable Off-chain Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[75]  arXiv:2206.11586 [pdf, ps, other]
Title: MAGIC: A Method for Assessing Cyber Incidents Occurrence
Comments: 16 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[ total of 84 entries: 1-25 | 26-50 | 51-75 | 76-84 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2206, contact, help  (Access key information)