We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 57

[ total of 97 entries: 1-10 | ... | 28-37 | 38-47 | 48-57 | 58-67 | 68-77 | 78-87 | 88-97 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 22 Nov 2022 (continued, showing 10 of 40 entries)

[58]  arXiv:2211.11321 (cross-list from cs.LG) [pdf, other]
Title: SPIN: Simulated Poisoning and Inversion Network for Federated Learning-Based 6G Vehicular Networks
Comments: 6 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[59]  arXiv:2211.11290 (cross-list from eess.SY) [pdf, ps, other]
Title: Koopman interpretation and analysis of a public-key cryptosystem: Diffie-Hellman key exchange
Comments: 8 pages. This work has been submitted to IFAC for possible publication
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Dynamical Systems (math.DS)
[60]  arXiv:2211.11236 (cross-list from cs.CV) [pdf, other]
Title: Boosting the Transferability of Adversarial Attacks with Global Momentum Initialization
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[61]  arXiv:2211.11189 (cross-list from cs.DS) [pdf, ps, other]
Title: Lemmas of Differential Privacy
Comments: Comments, feedback, and suggested additions welcome
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[62]  arXiv:2211.11030 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Cheap Talk
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[63]  arXiv:2211.10933 (cross-list from cs.CV) [pdf, other]
Title: Invisible Backdoor Attack with Dynamic Triggers against Person Re-identification
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[64]  arXiv:2211.10908 (cross-list from cs.CV) [pdf, other]
Title: ESTAS: Effective and Stable Trojan Attacks in Self-supervised Encoders with One Target Unlabelled Sample
Authors: Jiaqi Xue, Qian Lou
Comments: 10 pages, 7 figures, 6 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[65]  arXiv:2211.10894 (cross-list from cs.AR) [pdf, other]
Title: TuRaN: True Random Number Generation Using Supply Voltage Underscaling in SRAMs
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[66]  arXiv:2211.10844 (cross-list from cs.LG) [pdf, other]
Title: Learning to Generate Image Embeddings with User-level Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[67]  arXiv:2211.10782 (cross-list from cs.LG) [pdf, other]
Title: Let Graph be the Go Board: Gradient-free Node Injection Attack for Graph Neural Networks via Reinforcement Learning
Comments: AAAI 2023. arXiv admin note: substantial text overlap with arXiv:2202.09389
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 97 entries: 1-10 | ... | 28-37 | 38-47 | 48-57 | 58-67 | 68-77 | 78-87 | 88-97 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2211, contact, help  (Access key information)