We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 91

[ total of 88 entries: 1-25 | 14-38 | 39-63 | 64-88 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 6 Feb 2023 (continued, showing last 3 of 24 entries)

[64]  arXiv:2302.01677 (cross-list from cs.LG) [pdf, other]
Title: Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[65]  arXiv:2302.01622 (cross-list from eess.IV) [pdf]
Title: Private, fair and accurate: Training large-scale, privacy-preserving AI models in radiology
Comments: 3 tables, 5 figures, 11 supplementary materials
Subjects: Image and Video Processing (eess.IV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[66]  arXiv:2302.01190 (cross-list from stat.ML) [pdf, other]
Title: On the Efficacy of Differentially Private Few-shot Image Classification
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Fri, 3 Feb 2023

[67]  arXiv:2302.01235 [pdf, ps, other]
Title: Physical Zero-Knowledge Proof for Five Cells
Comments: arXiv admin note: text overlap with arXiv:2202.09788
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2302.01225 [pdf, ps, other]
Title: Asymmetric Cryptosystem Using Careful Synchronization
Authors: Jakub Ruszil
Comments: 17 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2302.01215 [pdf, other]
Title: Fixing Hardware Security Bugs with Large Language Models
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2302.01177 [pdf, other]
Title: Order but Not Execute in Order
Comments: 12 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[71]  arXiv:2302.01131 [pdf, other]
Title: An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2302.01026 [pdf]
Title: Generalized Uncertainty Principles for Quantum Cryptography
Authors: Randy Kuang
Comments: 7 pages, 5 figures, conference invited speech at ICCCAS, then to be published by JCM
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2302.01024 [pdf, other]
Title: SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2302.00947 [pdf, other]
Title: SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[75]  arXiv:2302.00876 [pdf, other]
Title: Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[76]  arXiv:2302.00750 [pdf]
Title: Developing Hands-on Labs for Source Code Vulnerability Detection with AI
Authors: Maryam Taeb
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[77]  arXiv:2302.00732 [pdf, other]
Title: Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[78]  arXiv:2302.01326 (cross-list from cs.LG) [pdf, other]
Title: Federated Analytics: A survey
Comments: To appear in APSIPA Transactions on Signal and Information Processing, Volume 12, Issue 1
Journal-ref: APSIPA Transactions on Signal and Information Processing, Volume 12, Issue 1, 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[79]  arXiv:2302.01316 (cross-list from cs.CV) [pdf, other]
Title: Are Diffusion Models Vulnerable to Membership Inference Attacks?
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[80]  arXiv:2302.01182 (cross-list from cs.CR) [pdf, other]
Title: Blocking JavaScript without Breaking the Web: An Empirical Investigation
Journal-ref: petsymposium 2023
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)

Thu, 2 Feb 2023

[81]  arXiv:2302.00338 [pdf]
Title: A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks
Authors: Yousri Daldoul
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[82]  arXiv:2302.00325 [pdf]
Title: Privacy Dashboards for Citizens and GDPR Services for Small Data Holders: A Literature Review
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[83]  arXiv:2302.00271 [pdf, other]
Title: CATFL: Certificateless Authentication-based Trustworthy Federated Learning for 6G Semantic Communications
Comments: Accepted by WCNC workshop 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[84]  arXiv:2302.00210 [pdf]
Title: Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[85]  arXiv:2302.00418 (cross-list from cs.DC) [pdf, other]
Title: Performance of EdDSA and BLS Signatures in Committee-Based Consensus
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[86]  arXiv:2302.00095 (cross-list from cs.AR) [pdf, ps, other]
Title: XCRYPT: Accelerating Lattice Based Cryptography with Memristor Crossbar Arrays
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[87]  arXiv:2302.00077 (cross-list from cs.LG) [pdf, other]
Title: Personalized Privacy Auditing and Optimization at Test Time
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[88]  arXiv:2302.00037 (cross-list from cs.LG) [pdf, other]
Title: Differentially-Private Hierarchical Clustering with Provable Approximation Guarantees
Comments: 27 pages, 1 figure
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[ total of 88 entries: 1-25 | 14-38 | 39-63 | 64-88 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2302, contact, help  (Access key information)