We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 8

[ total of 121 entries: 1-10 | 9-18 | 19-28 | 29-38 | 39-48 | ... | 119-121 ]
[ showing 10 entries per page: fewer | more | all ]

Thu, 25 Apr 2024 (continued, showing 10 of 22 entries)

[9]  arXiv:2404.15587 [pdf, other]
Title: Security Analysis of WiFi-based Sensing Systems: Threats from Perturbation Attacks
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2404.15582 [pdf, other]
Title: Armored Core of PKI: Remove Signing Keys for CA via Physically Unclonable Function
Comments: Initial version of the paper
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2404.15446 [pdf, other]
Title: OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[12]  arXiv:2404.15895 (cross-list from cs.CY) [pdf, other]
Title: Global Trends in Cryptocurrency Regulation: An Overview
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[13]  arXiv:2404.15834 (cross-list from cs.DC) [pdf, ps, other]
Title: FEDSTR: Money-In AI-Out | A Decentralized Marketplace for Federated Learning and LLM Training on the NOSTR Protocol
Comments: 19 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[14]  arXiv:2404.15746 (cross-list from stat.ML) [pdf, other]
Title: Collaborative Heterogeneous Causal Inference Beyond Meta-analysis
Comments: submitted to ICML
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[15]  arXiv:2404.15744 (cross-list from cs.LG) [pdf, other]
Title: A General Black-box Adversarial Attack on Graph-based Fake News Detectors
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[16]  arXiv:2404.15687 (cross-list from cs.SE) [pdf, other]
Title: Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Comments: This paper was accepted in the proceedings of the 33nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024)
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[17]  arXiv:2404.15656 (cross-list from cs.LG) [pdf, other]
Title: MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[18]  arXiv:2404.15598 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning with Only Positive Labels by Exploring Label Correlations
Comments: To be published in IEEE Transactions on Neural Networks and Learning Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 121 entries: 1-10 | 9-18 | 19-28 | 29-38 | 39-48 | ... | 119-121 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2404, contact, help  (Access key information)