We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 67

[ total of 103 entries: 1-10 | ... | 38-47 | 48-57 | 58-67 | 68-77 | 78-87 | 88-97 | 98-103 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 29 Nov 2022 (continued, showing last 6 of 25 entries)

[68]  arXiv:2211.15410 (cross-list from cs.LG) [pdf, other]
Title: Private Multi-Winner Voting for Machine Learning
Comments: Accepted at PoPETS 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[69]  arXiv:2211.15363 (cross-list from cs.CL) [pdf, other]
Title: On the Security Vulnerabilities of Text-to-SQL Models
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG); Software Engineering (cs.SE)
[70]  arXiv:2211.15356 (cross-list from cs.DS) [pdf, other]
Title: A quantum algorithm to estimate the closeness to the Strict Avalanche criterion in Boolean functions
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[71]  arXiv:2211.14886 (cross-list from cs.CY) [pdf, other]
Title: Managing Controlled Unclassified Information in Research Institutions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[72]  arXiv:2211.14769 (cross-list from cs.AI) [pdf, other]
Title: Navigation as the Attacker Wishes? Towards Building Byzantine-Robust Embodied Agents under Federated Learning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73]  arXiv:2211.14428 (cross-list from cs.LG) [pdf, other]
Title: Utility Assessment of Synthetic Data Generation Methods
Comments: Published in Privacy in Statistical Databases Conference 2022 USB Proceedings
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 28 Nov 2022 (showing first 4 of 30 entries)

[74]  arXiv:2211.14233 [pdf, ps, other]
Title: strategFTO: Untimed control for timed opacity
Comments: This work is partially supported by the ANR-NRF French-Singaporean research program ProMiS (ANR-19-CE25-0015 / 2019 ANR NRF 0092) and the ANR research program BisoUS. Experiments presented in this paper were carried out using the Grid'5000 testbed, supported by a scientific interest group hosted by Inria and including CNRS, RENATER and several universities as well as other organizations
Journal-ref: Proceedings of the 8th International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2022)
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[75]  arXiv:2211.14206 [pdf, ps, other]
Title: McEliece cryptosystem based on Plotkin construction with QC-MDPC and QC-LDPC codes
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2211.14196 [pdf, other]
Title: Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2211.14062 [pdf, other]
Title: M$^2$M: A general method to perform various data analysis tasks from a differentially private sketch
Comments: Published at the 18th International Workshop on Security and Trust Management (STM 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 103 entries: 1-10 | ... | 38-47 | 48-57 | 58-67 | 68-77 | 78-87 | 88-97 | 98-103 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2212, contact, help  (Access key information)