We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 73

[ total of 93 entries: 1-25 | 24-48 | 49-73 | 74-93 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 9 Aug 2022 (continued, showing last 5 of 26 entries)

[74]  arXiv:2208.03948 (cross-list from cs.CV) [pdf, other]
Title: AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Comments: this https URL&hl=en
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[75]  arXiv:2208.03567 (cross-list from cs.LG) [pdf, other]
Title: On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[76]  arXiv:2208.03466 (cross-list from cs.CY) [pdf, ps, other]
Title: Preventing or Mitigating Adversarial Supply Chain Attacks; a legal analysis
Comments: 23 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[77]  arXiv:2208.03409 (cross-list from cs.LG) [pdf, other]
Title: DP$^2$-VAE: Differentially Private Pre-trained Variational Autoencoders
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[78]  arXiv:2208.03392 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning for Medical Applications: A Taxonomy, Current Trends, and Research Challenges
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Mon, 8 Aug 2022

[79]  arXiv:2208.03276 [pdf, other]
Title: Modeling Self-Propagating Malware with Epidemiological Models
Subjects: Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Applications (stat.AP)
[80]  arXiv:2208.03169 [pdf, other]
Title: FBI: Fingerprinting models with Benign Inputs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81]  arXiv:2208.02999 [pdf, other]
Title: Cryptoeconomic Security for Data Availability Committees
Comments: 35 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2208.02917 [pdf, ps, other]
Title: Padding-only defenses add delay in Tor
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2208.02906 [pdf, other]
Title: Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions
Comments: 8 pages, 7 figures and Supporting Information
Subjects: Cryptography and Security (cs.CR); Applied Physics (physics.app-ph); Optics (physics.optics)
[84]  arXiv:2208.02883 [pdf, other]
Title: Beware of Discarding Used SRAMs: Information is Stored Permanently
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[85]  arXiv:2208.02877 [pdf, other]
Title: A Forward-secure Efficient Two-factor Authentication Protocol
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2208.02858 [pdf, other]
Title: An Empirical Study on Ethereum Private Transactions and the Security Implications
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.02857 [pdf, other]
Title: Identity-Based Authentication for On-Demand Charging of Electric Vehicles
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2208.02820 [pdf, other]
Title: MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Comments: 15 pages. The journal extension of our conference paper in AAAI 2022 (this https URL). arXiv admin note: substantial text overlap with arXiv:2112.03476
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[89]  arXiv:2208.03309 (cross-list from cs.LG) [pdf, other]
Title: Lethal Dose Conjecture on Data Poisoning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[90]  arXiv:2208.03111 (cross-list from cs.LG) [pdf, other]
Title: Data-free Backdoor Removal based on Channel Lipschitzness
Comments: Accepted to ECCV 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[91]  arXiv:2208.02905 (cross-list from cs.CY) [pdf, ps, other]
Title: Can the Government Compel Decryption? Don't Trust -- Verify
Comments: 16 pages. This is the full version of a forthcoming publication in Proceedings of the 2022 Symposium on Computer Science and Law
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[92]  arXiv:2208.02878 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Counterfactuals via Functional Mechanism
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[93]  arXiv:2208.02868 (cross-list from cs.LG) [pdf, other]
Title: GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation
Comments: This article will be presented in the International Conference on Compilers, Architectures, and Synthesis for Embedded Systems (CASES) 2022 and will appear as part of the ESWEEK-TCAD special issue
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 93 entries: 1-25 | 24-48 | 49-73 | 74-93 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)