We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 76

[ total of 124 entries: 1-25 | 2-26 | 27-51 | 52-76 | 77-101 | 102-124 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 16 Apr 2024 (continued, showing last 12 of 46 entries)

[77]  arXiv:2404.09750 (cross-list from quant-ph) [pdf, other]
Title: Layered Uploading for Quantum Convolutional Neural Networks
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[78]  arXiv:2404.09722 (cross-list from cs.LG) [pdf, other]
Title: VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[79]  arXiv:2404.09536 (cross-list from cs.DC) [pdf, other]
Title: Beyond Noise: Privacy-Preserving Decentralized Learning with Virtual Nodes
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[80]  arXiv:2404.09413 (cross-list from stat.ML) [pdf, other]
Title: On the Optimal Regret of Locally Private Linear Contextual Bandit
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81]  arXiv:2404.09391 (cross-list from cs.LG) [pdf, other]
Title: Privacy at a Price: Exploring its Dual Impact on AI Fairness
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[82]  arXiv:2404.09349 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness Limits via Scaling-Law and Human-Alignment Studies
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[83]  arXiv:2404.09315 (cross-list from math.GR) [pdf, ps, other]
Title: Binary bi-braces and applications to cryptography
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[84]  arXiv:2404.09165 (cross-list from cs.IT) [pdf, ps, other]
Title: Private Multiple Linear Computation: A Flexible Communication-Computation Tradeoff
Comments: Accepted by IEEE ISIT 2024
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[85]  arXiv:2404.08847 (cross-list from cs.IR) [pdf, other]
Title: LazyDP: Co-Designing Algorithm-Software for Scalable Training of Differentially Private Recommendation Models
Journal-ref: Published at 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-29), 2024
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86]  arXiv:2404.08715 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Log-Location-Scale Regression Using Functional Mechanism
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
[87]  arXiv:2404.08690 (cross-list from cs.CL) [pdf, other]
Title: Towards Building a Robust Toxicity Predictor
Comments: ACL 2023 /
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[88]  arXiv:2404.08642 (cross-list from cs.NI) [pdf, ps, other]
Title: Integrating Multi -WAN, VPN and IEEE 802.3ad for Advanced IPSEC
Authors: Stefan Ćertić
Comments: 13 pages, 2 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 15 Apr 2024 (showing first 13 of 16 entries)

[89]  arXiv:2404.08631 [pdf, other]
Title: FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models
Comments: To appear in IEEE Symposium on Security and Privacy, 2024
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2404.08562 [pdf, other]
Title: Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[91]  arXiv:2404.08310 [pdf, other]
Title: Manifest V3 Unveiled: Navigating the New Era of Browser Extensions
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2404.08309 [pdf, other]
Title: Subtoxic Questions: Dive Into Attitude Change of LLM's Response in Jailbreak Attempts
Comments: 4 pages, 2 figures. This paper was submitted to The 7th Deep Learning Security and Privacy Workshop (DLSP 2024) and was accepted as extended abstract, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[93]  arXiv:2404.08306 [pdf, other]
Title: Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[94]  arXiv:2404.08250 [pdf, other]
Title: A Systematic Construction Approach for All $4\times 4$ Involutory MDS Matrices
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2404.08232 [pdf, other]
Title: Navigating Quantum Security Risks in Networked Environments: A Comprehensive Study of Quantum-Safe Network Protocols
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2404.08231 [pdf, other]
Title: Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:2404.08165 [pdf, other]
Title: Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer?
Comments: 24 pages, 21 figures, 7 tables
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2404.08160 [pdf, other]
Title: A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2404.08144 [pdf, other]
Title: LLM Agents can Autonomously Exploit One-day Vulnerabilities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[100]  arXiv:2404.08517 (cross-list from cs.SE) [pdf, other]
Title: Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[101]  arXiv:2404.08273 (cross-list from cs.CV) [pdf, other]
Title: Struggle with Adversarial Defense? Try Diffusion
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[ total of 124 entries: 1-25 | 2-26 | 27-51 | 52-76 | 77-101 | 102-124 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)