We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 60

[ total of 92 entries: 1-25 | 11-35 | 36-60 | 61-85 | 86-92 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 31 Jan 2023 (continued, showing last 17 of 37 entries)

[61]  arXiv:2301.11995 [pdf, other]
Title: A New Symmetric Homomorphic Functional Encryption over a Hidden Ring for Polynomial Public Key Encapsulations
Comments: 21 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2301.13104 (cross-list from cs.CV) [pdf, other]
Title: Equivariant Differentially Private Deep Learning
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2301.13005 (cross-list from cs.DC) [pdf]
Title: Farm Environmental Data Analyzer using a Decentralised system and R
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[64]  arXiv:2301.12778 (cross-list from cs.LG) [pdf, other]
Title: A Comprehensive Investigation of Feature and Model Importance in Android Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[65]  arXiv:2301.12684 (cross-list from math.OC) [pdf, other]
Title: Attack Impact Evaluation for Stochastic Control Systems through Alarm Flag State Augmentation
Comments: 8 pages. arXiv admin note: substantial text overlap with arXiv:2203.16803
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[66]  arXiv:2301.12623 (cross-list from cs.DC) [pdf, other]
Title: FedPass: Privacy-Preserving Vertical Federated Deep Learning with Adaptive Obfuscation
Comments: 6 figures, 9 tables
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67]  arXiv:2301.12595 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Adversarial Bandits
Authors: Yuzhe Ma, Zhijin Zhou
Comments: Accepted by ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[68]  arXiv:2301.12576 (cross-list from cs.LG) [pdf, other]
Title: Uncovering Adversarial Risks of Test-Time Adaptation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[69]  arXiv:2301.12554 (cross-list from cs.LG) [pdf, other]
Title: Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[70]  arXiv:2301.12535 (cross-list from cs.LG) [pdf, ps, other]
Title: Concurrent Shuffle Differential Privacy Under Continual Observation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[71]  arXiv:2301.12532 (cross-list from cs.GT) [pdf, ps, other]
Title: Credible, Optimal Auctions via Blockchains
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[72]  arXiv:2301.12526 (cross-list from cs.IT) [pdf, other]
Title: The Secure CEO Problem With Physical Identifiers Under Logarithmic Loss and Quadratic Distortion Measures
Comments: A part of this paper was presented at SITA2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[73]  arXiv:2301.12377 (cross-list from cs.SE) [pdf, other]
Title: What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Comments: This paper is accepted at the International Conference on Software Engineering (ICSE) 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[74]  arXiv:2301.12360 (cross-list from cs.LG) [pdf, other]
Title: ADL-ID: Adversarial Disentanglement Learning for Wireless Device Fingerprinting Temporal Domain Adaptation
Comments: The paper has been accepted at IEEE ICC'23 - MWN Symposium
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[75]  arXiv:2301.12348 (cross-list from cs.SE) [pdf, other]
Title: Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[76]  arXiv:2301.12195 (cross-list from cs.LG) [pdf, other]
Title: Does Federated Learning Really Need Backpropagation?
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[77]  arXiv:2301.11989 (cross-list from cs.LG) [pdf, other]
Title: Practical Differentially Private Hyperparameter Tuning with Subsampling
Comments: 30 pages, 7 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 30 Jan 2023 (showing first 8 of 15 entries)

[78]  arXiv:2301.11882 [pdf, other]
Title: Privacy-Preserving Methods for Outlier-Resistant Average Consensus and Shallow Ranked Vote Leader Election
Comments: 10 pages + references, 2 figures, 2 algorithms, 7 theorems
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2301.11824 [pdf, other]
Title: PECAN: A Deterministic Certified Defense Against Backdoor Attacks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[80]  arXiv:2301.11804 [pdf, other]
Title: TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection
Comments: Will be presented at the IEEE International Symposium on Circuits and Systems (ISCAS), 2023
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2301.11767 [pdf, other]
Title: CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[82]  arXiv:2301.11745 [pdf, other]
Title: Side Auth: Synthesizing Virtual Sensors for Authentication
Authors: Yan Long, Kevin Fu
Journal-ref: New Security Paradigms Workshop 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[83]  arXiv:2301.11601 [pdf, other]
Title: Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64
Comments: 22 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[84]  arXiv:2301.11586 [pdf, other]
Title: Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2301.11569 [pdf]
Title: Vulnerablity analysis of Azure Blockchain Workbench key management system
Authors: Dmitry Tanana
Comments: 4 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[ total of 92 entries: 1-25 | 11-35 | 36-60 | 61-85 | 86-92 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2302, contact, help  (Access key information)