We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 51

[ total of 71 entries: 1-25 | 2-26 | 27-51 | 52-71 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 25 Jan 2023 (continued, showing last 4 of 14 entries)

[52]  arXiv:2301.10053 (cross-list from cs.LG) [pdf, other]
Title: A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[53]  arXiv:2301.10028 (cross-list from cs.CY) [pdf]
Title: Super forecasting the technological singularity risks from artificial intelligence
Journal-ref: Evol. Syst. 2022, pp. 1 11, Jun. 2022
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[54]  arXiv:2301.09892 (cross-list from cs.GT) [pdf, other]
Title: Learning Effective Strategies for Moving Target Defense with Switching Costs
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[55]  arXiv:2301.09732 (cross-list from cs.LG) [pdf, other]
Title: Backdoor Attacks in Peer-to-Peer Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Tue, 24 Jan 2023

[56]  arXiv:2301.09378 [pdf, ps, other]
Title: Citadel: Self-Sovereign Identities on Dusk Network
Authors: Xavier Salleras
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2301.09258 [pdf]
Title: Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2301.09207 [pdf, other]
Title: VeraSel: Verifiable Random Selection for Mixnets Construction
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[59]  arXiv:2301.09185 [pdf]
Title: A New Paradigm for Improved Image Steganography by using Adaptive Number of Dominant Discrete Cosine Transform Coefficients
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2301.09041 [pdf, other]
Title: Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[61]  arXiv:2301.08824 [pdf, ps, other]
Title: An Automated Vulnerability Detection Framework for Smart Contracts
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2301.08806 [pdf, other]
Title: TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts
Comments: To appear in IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[63]  arXiv:2301.08778 [pdf, other]
Title: Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2301.09325 (cross-list from cs.IT) [pdf, ps, other]
Title: cc-differential uniformity, (almost) perfect cc-nonlinearity, and equivalences
Comments: 18 pages. Comments welcome
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[65]  arXiv:2301.09255 (cross-list from cs.CV) [pdf, other]
Title: Combined Use of Federated Learning and Image Encryption for Privacy-Preserving Image Classification with Vision Transformer
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2301.09236 (cross-list from quant-ph) [pdf, other]
Title: On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions
Comments: 55 pages
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[67]  arXiv:2301.09203 (cross-list from cs.DS) [pdf, ps, other]
Title: Relaxed Models for Adversarial Streaming: The Advice Model and the Bounded Interruptions Model
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[68]  arXiv:2301.09201 (cross-list from cs.IR) [pdf, other]
Title: SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69]  arXiv:2301.08925 (cross-list from eess.AS) [pdf, other]
Title: New Challenges for Content Privacy in Speech and Audio
Comments: Accepted for publication in ISCA SPSC Symposium 2022
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[70]  arXiv:2301.08811 (cross-list from cs.MA) [pdf, ps, other]
Title: Differential Privacy in Cooperative Multiagent Planning
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[71]  arXiv:2301.08751 (cross-list from cs.LG) [pdf, other]
Title: Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Comments: Accepted at SafeAI 2023: AAAI's Workshop on Artificial Intelligence Safety
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[ total of 71 entries: 1-25 | 2-26 | 27-51 | 52-71 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2301, contact, help  (Access key information)