We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 88

[ total of 80 entries: 1-25 | 6-30 | 31-55 | 56-80 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 20 Sep 2022 (continued, showing last 13 of 20 entries)

[56]  arXiv:2209.08673 [pdf, other]
Title: Proofs of Proof-of-Stake with Sublinear Complexity
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2209.08541 [pdf, other]
Title: Distribution inference risks: Identifying and mitigating sources of leakage
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[58]  arXiv:2209.08463 [pdf, other]
Title: Active Defense Analysis of Blockchain Forking through the Spatial-Temporal Lens
Comments: 10 pages,10 figures
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2209.08370 [pdf, other]
Title: Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens
Comments: 2022 Engineering Graduate Research Symposium (EGRS)
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2209.08356 [pdf, other]
Title: Et tu, Blockchain? Outsmarting Smart Contracts via Social Engineering
Comments: 14th annual Graduate Academic Conference (GAC). arXiv admin note: text overlap with arXiv:2105.00132
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2209.09197 (cross-list from cs.AR) [pdf, other]
Title: Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting
Comments: 5 pages, 5 figures, accepted in IEEE NANO 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2209.09117 (cross-list from cs.CV) [pdf, other]
Title: Part-Based Models Improve Adversarial Robustness
Comments: Code can be found at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2209.09024 (cross-list from cs.LG) [pdf, other]
Title: Dataset Inference for Self-Supervised Models
Comments: Accepted at NeurIPS 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[64]  arXiv:2209.09008 (cross-list from cs.IT) [pdf, other]
Title: Encrypted Semantic Communication Using Adversarial Training for Privacy Preserving
Comments: submitted to IEEE Wireless Communications Letters
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[65]  arXiv:2209.08744 (cross-list from cs.LG) [pdf, other]
Title: AdvDO: Realistic Adversarial Attacks for Trajectory Prediction
Comments: To appear in ECCV 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[66]  arXiv:2209.08615 (cross-list from cs.LG) [pdf, other]
Title: Membership Inference Attacks and Generalization: A Causal Perspective
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[67]  arXiv:2209.08467 (cross-list from cs.LG) [pdf, other]
Title: Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data
Journal-ref: IEEE Transactions on Fuzzy Systems, vol. 29, no. 1, pp. 46-58, Jan. 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[68]  arXiv:2209.08412 (cross-list from cs.LG) [pdf, other]
Title: pFedDef: Defending Grey-Box Attacks for Personalized Federated Learning
Comments: 16 pages, 5 figures (11 images if counting sub-figures separately), longer version of paper submitted to CrossFL 2022 poster workshop, code available at (this https URL)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 19 Sep 2022

[69]  arXiv:2209.08067 [pdf, ps, other]
Title: Web Application Weakness Ontology Based on Vulnerability Data
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2209.08048 [pdf, other]
Title: 'Surprised, Shocked, Worried': User Reactions to Facebook Data Collection from Third Parties
Comments: Accepted to PETS (Privacy Enhancing Technologies Symposium) 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[71]  arXiv:2209.07957 [pdf, other]
Title: Malicious Source Code Detection Using Transformer
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[72]  arXiv:2209.07936 [pdf, other]
Title: PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot
Comments: Manuscript submitted to IEEE Trans. Dependable Secure Comput
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[73]  arXiv:2209.07842 [pdf, other]
Title: An Overview of Cyber Security and Privacy on the Electric Vehicle Charging Infrastructure
Comments: 12 pages, 5 tables, 3 figures
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2209.07775 [pdf, other]
Title: Jaco: An Offline Running Privacy-aware Voice Assistant
Journal-ref: In Proceedings of the 2022 ACM-IEEE International Conference on Human-Robot Interaction (HRI 2022). IEEE Press, 618-622
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[75]  arXiv:2209.07716 [pdf, other]
Title: Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning
Comments: NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[76]  arXiv:2209.07620 [pdf, other]
Title: Fuzzy-based forest fire prevention and detection by wireless sensor networks
Journal-ref: The 13th International Conference on Soft Computing Models in Industrial and Environmental Applications, 2018
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2209.08018 (cross-list from cs.LG) [pdf, other]
Title: IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective
Comments: Published in Engineering Applications of Artificial Intelligence (Elsevier, IF:7.8); Code/An AutoML tutorial is available at Github link: this https URL
Journal-ref: Engineering Applications of Artificial Intelligence 116C (2022) 105366
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[78]  arXiv:2209.07833 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Distributed Expectation Maximization for Gaussian Mixture Model using Subspace Perturbation
Journal-ref: ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, pp. 4263-4267
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[79]  arXiv:2209.07807 (cross-list from cs.LG) [pdf, other]
Title: Model Inversion Attacks against Graph Neural Networks
Comments: Accepted by TKDE. arXiv admin note: substantial text overlap with arXiv:2106.02820
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[80]  arXiv:2209.07534 (cross-list from cs.LG) [pdf, other]
Title: Improving Robust Fairness via Balance Adversarial Training
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 80 entries: 1-25 | 6-30 | 31-55 | 56-80 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)