We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 55

[ total of 65 entries: 1-25 | 6-30 | 31-55 | 56-65 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 24 Jan 2023 (continued, showing last 1 of 16 entries)

[56]  arXiv:2301.08751 (cross-list from cs.LG) [pdf, other]
Title: Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Comments: Accepted at SafeAI 2023: AAAI's Workshop on Artificial Intelligence Safety
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)

Mon, 23 Jan 2023

[57]  arXiv:2301.08700 [pdf, other]
Title: Blind Spots: Automatically detecting ignored program inputs
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[58]  arXiv:2301.08668 [pdf, ps, other]
Title: Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2301.08570 [pdf, ps, other]
Title: Distributed Non-Interference
Authors: Roberto Gorrieri
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[60]  arXiv:2301.08517 [pdf, other]
Title: Cohere: Privacy Management in Large Scale Systems
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2301.08428 [pdf, other]
Title: Defending SDN against packet injection attacks using deep learning
Comments: 15 Pages, 15 Figures
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2301.08523 (cross-list from cs.GT) [pdf, ps, other]
Title: Side Contract Commitment Attacks on Blockchains
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[63]  arXiv:2301.08427 (cross-list from cs.CL) [pdf, ps, other]
Title: Which Features are Learned by CodeBert: An Empirical Study of the BERT-based Source Code Representation Learning
Comments: 1 table, 2 figures
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL)
[64]  arXiv:2301.08403 (cross-list from cs.LG) [pdf, other]
Title: Sequence Generation via Subsequence Similarity: Theory and Application to UAV Identification
Comments: 12 pages, 5 figures, 2 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Applications (stat.AP); Machine Learning (stat.ML)
[65]  arXiv:2301.08295 (cross-list from cs.IT) [pdf, other]
Title: Polar Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Polar Code Design
Comments: 36 pages, 10 figures, 2 tables, submitted to IEEE Journal on Selected Areas in Information Theory
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[ total of 65 entries: 1-25 | 6-30 | 31-55 | 56-65 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2301, contact, help  (Access key information)