We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 75

[ total of 98 entries: 1-25 | 26-50 | 51-75 | 76-98 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 22 Jun 2022 (continued, showing last 12 of 42 entries)

[76]  arXiv:2206.10257 (cross-list from cs.GL) [pdf]
Title: Satoshi Nakamoto and the Origins of Bitcoin -- Narratio in Nomine, Datis et Numeris
Authors: Jens Ducrée
Comments: Main text:39 pages Number of references: 503 Appendix: 6 pages
Subjects: General Literature (cs.GL); Cryptography and Security (cs.CR)
[77]  arXiv:2206.09999 (cross-list from cs.AR) [pdf, other]
Title: Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices
Comments: To appear in DSN 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[78]  arXiv:2206.09868 (cross-list from cs.LG) [pdf, other]
Title: Understanding Robust Learning through the Lens of Representation Similarities
Comments: 35 pages, 29 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[79]  arXiv:2206.09734 (cross-list from cs.CY) [pdf]
Title: The Cost of the GDPR for Apps? Nearly Impossible to Study without Platform Data
Comments: Response to NBER preprint 'GDPR and the Lost Generation of Innovative Apps'
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[80]  arXiv:2206.09628 (cross-list from cs.LG) [pdf, other]
Title: Diversified Adversarial Attacks based on Conjugate Gradient Method
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[81]  arXiv:2206.09491 (cross-list from cs.LG) [pdf, other]
Title: On the Limitations of Stochastic Pre-processing Defenses
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[82]  arXiv:2206.09465 (cross-list from cs.SI) [pdf]
Title: Cybersecurity Law: Legal Jurisdiction and Authority
Comments: This report is developed for partial fulfillment of the requirements for the degree of Juris Masters of Law at GMU's Antonin Scalia Law School
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[83]  arXiv:2206.09458 (cross-list from cs.LG) [pdf, other]
Title: A Universal Adversarial Policy for Text Classifiers
Comments: Accepted for publication in Neural Networks (2022), see this https URL
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[84]  arXiv:2206.09159 (cross-list from quant-ph) [pdf, other]
Title: Beating the fault-tolerance bound and security loopholes for Byzantine agreement with a quantum solution
Comments: 20 pages, 10 figures. All comments are welcome
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[85]  arXiv:2206.09103 (cross-list from eess.AS) [pdf, ps, other]
Title: Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[86]  arXiv:2206.09097 (cross-list from cs.LG) [pdf, other]
Title: Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[87]  arXiv:2206.09075 (cross-list from cs.LG) [pdf, ps, other]
Title: Comment on Transferability and Input Transformation with Additive Noise
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 20 Jun 2022

[88]  arXiv:2206.08821 [pdf, other]
Title: Exploring Web3 From the View of Blockchain
Comments: Tech Report 2022
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2206.08722 [pdf, other]
Title: WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: ICDCS'22: Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, July 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[90]  arXiv:2206.08565 [pdf, other]
Title: Identifying Counterfeit Products using Blockchain Technology in Supply Chain System
Comments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)
Journal-ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2206.08396 [pdf, other]
Title: TACO: A Tree-based Approach to Customizing Location Obfuscation based on User Policies
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2206.08829 (cross-list from cs.LG) [pdf, other]
Title: FedNew: A Communication-Efficient and Privacy-Preserving Newton-Type Method for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[93]  arXiv:2206.08646 (cross-list from cs.DS) [pdf, other]
Title: Scalable Differentially Private Clustering via Hierarchically Separated Trees
Comments: To appear at KDD'22
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2206.08575 (cross-list from cs.LG) [pdf, other]
Title: Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization
Comments: ICML 2022; Codes at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[95]  arXiv:2206.08514 (cross-list from cs.LG) [pdf, other]
Title: A Unified Evaluation of Textual Backdoor Learning: Frameworks and Benchmarks
Comments: 19 pages
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[96]  arXiv:2206.08477 (cross-list from cs.CV) [pdf, other]
Title: Backdoor Attacks on Vision Transformers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2206.08451 (cross-list from cs.LG) [pdf, other]
Title: I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Comments: Under review at ACM Computing Surveys
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[98]  arXiv:2206.08401 (cross-list from econ.GN) [pdf, other]
Title: Are decentralized finance really decentralized? A social network analysis of the Aave protocol on the Ethereum blockchain
Comments: Accepted at 29th Annual Global Finance Conference featuring Professor Robert Engle, The 2003 Nobel Laureate in Economic Sciences
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Statistical Finance (q-fin.ST); Computation (stat.CO)
[ total of 98 entries: 1-25 | 26-50 | 51-75 | 76-98 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2206, contact, help  (Access key information)