We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 87

[ total of 99 entries: 1-10 | ... | 58-67 | 68-77 | 78-87 | 88-97 | 98-99 ]
[ showing 10 entries per page: fewer | more | all ]

Fri, 30 Sep 2022 (continued, showing 10 of 16 entries)

[88]  arXiv:2209.14727 [pdf]
Title: FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS
Authors: Khloud Al Jallad
Comments: arXiv admin note: text overlap with arXiv:2209.13961
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[89]  arXiv:2209.14673 [pdf, other]
Title: Chameleon Cache: Approximating Fully Associative Caches with Random Replacement to Prevent Contention-Based Cache Attacks
Comments: 12 pages, 9 figures, 6 algorithms, 1 table
Journal-ref: 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), page 13-24
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[90]  arXiv:2209.14603 [pdf, other]
Title: Dataset Distillation for Medical Dataset Sharing
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[91]  arXiv:2209.14547 [pdf, other]
Title: A Secure Federated Learning Framework for Residential Short Term Load Forecasting
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[92]  arXiv:2209.14517 [pdf]
Title: The Fungibility of Non-Fungible Tokens: A Quantitative Analysis of ERC-721 Metadata
Comments: 8 pages inc. appendix, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[93]  arXiv:2209.14987 (cross-list from cs.LG) [pdf, other]
Title: No Free Lunch in "Privacy for Free: How does Dataset Condensation Help Privacy"
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[94]  arXiv:2209.14831 (cross-list from cs.CV) [pdf, other]
Title: Access Control with Encrypted Feature Maps for Object Detection Models
Comments: arXiv admin note: substantial text overlap with arXiv:2206.05422
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[95]  arXiv:2209.14826 (cross-list from cs.LG) [pdf, other]
Title: Towards Lightweight Black-Box Attacks against Deep Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[96]  arXiv:2209.14692 (cross-list from cs.CV) [pdf, other]
Title: Digital and Physical Face Attacks: Reviewing and One Step Further
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[97]  arXiv:2209.14462 (cross-list from cs.GT) [pdf, ps, other]
Title: What Can Cryptography Do For Decentralized Mechanism Design
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[ total of 99 entries: 1-10 | ... | 58-67 | 68-77 | 78-87 | 88-97 | 98-99 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2210, contact, help  (Access key information)