We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 65

[ total of 87 entries: 1-10 | ... | 36-45 | 46-55 | 56-65 | 66-75 | 76-85 | 86-87 ]
[ showing 10 entries per page: fewer | more | all ]

Fri, 30 Sep 2022 (continued, showing 10 of 16 entries)

[66]  arXiv:2209.14727 [pdf]
Title: FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS
Authors: Khloud Al Jallad
Comments: arXiv admin note: text overlap with arXiv:2209.13961
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[67]  arXiv:2209.14673 [pdf, other]
Title: Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks
Comments: 12 pages, 9 figures, 6 algorithms, 1 table
Journal-ref: 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), page 13-24
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[68]  arXiv:2209.14603 [pdf, other]
Title: Dataset Distillation for Medical Dataset Sharing
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[69]  arXiv:2209.14547 [pdf, other]
Title: A Secure Federated Learning Framework for Residential Short Term Load Forecasting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[70]  arXiv:2209.14517 [pdf]
Title: The Fungibility of Non-Fungible Tokens: A Quantitative Analysis of ERC-721 Metadata
Comments: 8 pages inc. appendix, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[71]  arXiv:2209.14987 (cross-list from cs.LG) [pdf, other]
Title: No Free Lunch in "Privacy for Free: How does Dataset Condensation Help Privacy"
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[72]  arXiv:2209.14831 (cross-list from cs.CV) [pdf, other]
Title: Access Control with Encrypted Feature Maps for Object Detection Models
Comments: arXiv admin note: substantial text overlap with arXiv:2206.05422
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73]  arXiv:2209.14826 (cross-list from cs.LG) [pdf, other]
Title: Towards Lightweight Black-Box Attacks against Deep Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[74]  arXiv:2209.14692 (cross-list from cs.CV) [pdf, other]
Title: Digital and Physical Face Attacks: Reviewing and One Step Further
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[75]  arXiv:2209.14462 (cross-list from cs.GT) [pdf, ps, other]
Title: What Can Cryptography Do For Decentralized Mechanism Design
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[ total of 87 entries: 1-10 | ... | 36-45 | 46-55 | 56-65 | 66-75 | 76-85 | 86-87 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2210, contact, help  (Access key information)