We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 91

[ total of 85 entries: 1-50 | 36-85 ]
[ showing 50 entries per page: fewer | more | all ]

Tue, 21 Mar 2023 (continued, showing last 21 of 25 entries)

[36]  arXiv:2303.11079 [pdf, other]
Title: Differentially Private Algorithms for Synthetic Power System Datasets
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Optimization and Control (math.OC)
[37]  arXiv:2303.10955 [pdf, ps, other]
Title: Attacks Against Security Context in 5G Network
Comments: The 6th International Symposium on Mobile Internet Security (MobiSec 22)
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2303.10877 [pdf]
Title: Practical Solutions in Fully Homomorphic Encryption -- A Survey Analyzing Existing Acceleration Methods
Comments: 18 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2303.10795 [pdf, other]
Title: iRogue: Identifying Rogue Behavior from App Reviews
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2303.10628 [pdf, other]
Title: Geometric Stability Estimates For 3D-Object Encryption Through Permutations and Rotations
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[41]  arXiv:2303.10594 [pdf, other]
Title: AdaptGuard: Defending Against Universal Attacks for Model Adaptation
Comments: 15 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[42]  arXiv:2303.10555 [pdf, other]
Title: Revisiting LiDAR Spoofing Attack Capabilities against Object Detection: Improvements, Measurement, and New Attack
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[43]  arXiv:2303.10517 [pdf, other]
Title: Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[44]  arXiv:2303.10500 [pdf, other]
Title: Blockchain-Based, Confidentiality-Preserving Orchestration of Collaborative Workflows
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2303.10473 [pdf]
Title: Report of the Medical Image De-Identification (MIDI) Task Group -- Best Practices and Recommendations
Comments: 131 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[46]  arXiv:2303.10399 [pdf, other]
Title: FedRight: An Effective Model Copyright Protection for Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[47]  arXiv:2303.10370 [pdf, other]
Title: How to Model Privacy Threats in the Automotive Domain
Comments: Accepted in 9th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2023)
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2303.11242 (cross-list from cs.LG) [pdf, other]
Title: Make Landscape Flatter in Differentially Private Federated Learning
Comments: CVPR2023, 18 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[49]  arXiv:2303.11157 (cross-list from cs.GT) [pdf, other]
Title: Differentially Private Games via Payoff Perturbation
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[50]  arXiv:2303.11102 (cross-list from cs.SE) [pdf, other]
Title: Challenges of Producing Software Bill Of Materials for Java
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[51]  arXiv:2303.11040 (cross-list from cs.CV) [pdf, other]
Title: Benchmarking Robustness of 3D Object Detection to Common Corruptions in Autonomous Driving
Comments: CVPR 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[52]  arXiv:2303.10874 (cross-list from cs.CY) [pdf]
Title: Building a Resilient Cybersecurity Posture: A Framework for Leveraging Prevent, Detect and Respond Functions and Law Enforcement Collaboration
Comments: 7 pages, 1 figure
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[53]  arXiv:2303.10837 (cross-list from cs.LG) [pdf, other]
Title: FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[54]  arXiv:2303.10824 (cross-list from cs.CV) [pdf, other]
Title: k-SALSA: k-anonymous synthetic averaging of retinal images via local style alignment
Comments: European Conference on Computer Vision (ECCV), 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[55]  arXiv:2303.10509 (cross-list from cs.CY) [pdf, ps, other]
Title: Risk-Limiting Audits for Condorcet Elections
Comments: 15 pages, accepted for Voting'23
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[56]  arXiv:2303.10303 (cross-list from cs.LG) [pdf, other]
Title: The Challenge of Differentially Private Screening Rules
Comments: 5 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 20 Mar 2023

[57]  arXiv:2303.09893 [pdf, other]
Title: Moving Target Defense for Service-oriented Mission-critical Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[58]  arXiv:2303.09850 [pdf, other]
Title: Autopsy of Ethereum's Post-Merge Reward System
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[59]  arXiv:2303.09820 [pdf, other]
Title: Decoding algorithm for HL-codes and performance of the DHH-cryptosystem -- a candidate for post-quantum cryptography
Comments: 24 pages, 4 figures, 14 references
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[60]  arXiv:2303.09732 [pdf, other]
Title: Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation
Comments: Accepted by USENIX Security 2023. arXiv admin note: text overlap with arXiv:2205.00199
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:2303.09731 [pdf, other]
Title: Exorcising ''Wraith'': Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks
Comments: Accepted by USENIX Sercurity 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[62]  arXiv:2303.10137 (cross-list from cs.CV) [pdf, other]
Title: A Recipe for Watermarking Diffusion Models
Comments: 23 pages, 22 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[63]  arXiv:2303.10078 (cross-list from cs.LG) [pdf, other]
Title: Fuzziness-tuned: Improving the Transferability of Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[64]  arXiv:2303.09999 (cross-list from cs.IR) [pdf, other]
Title: STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
Comments: 11 pages, 3 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[65]  arXiv:2303.09858 (cross-list from eess.IV) [pdf, other]
Title: MedLocker: A Transferable Adversarial Watermarking for Preventing Unauthorized Analysis of Medical Image Dataset
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Multimedia (cs.MM)
[66]  arXiv:2303.09767 (cross-list from cs.LG) [pdf, other]
Title: It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness
Comments: 41 pages, 25 figures, under review
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[67]  arXiv:2303.09606 (cross-list from cs.SE) [pdf, ps, other]
Title: Static Analysis for Android GDPR Compliance Assurance
Authors: Mugdha Khedkar
Comments: To be published in ICSE 2023 Doctoral Symposium (International Conference on Software Engineering)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)

Fri, 17 Mar 2023

[68]  arXiv:2303.09279 [pdf, other]
Title: Privacy-Preserving Video Conferencing via Thermal-Generative Images
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[69]  arXiv:2303.09150 [pdf, other]
Title: MASCARA: Systematically Generating Memorable And Secure Passphrases
Comments: This paper appeared on ACM ASIACCS '23 conference. The pdf includes Github repository with all data and code
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[70]  arXiv:2303.09113 [pdf, other]
Title: Security of Blockchains at Capacity
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[71]  arXiv:2303.09079 [pdf, other]
Title: SSL-Cleanse: Trojan Detection and Mitigation in Self-Supervised Learning
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[72]  arXiv:2303.09043 [pdf, ps, other]
Title: HE is all you need: Compressing FHE Ciphertexts using Additive HE
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2303.09024 [pdf, other]
Title: DeeBBAA: A benchmark Deep Black Box Adversarial Attack against Cyber-Physical Power Systems
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[74]  arXiv:2303.09008 [pdf, other]
Title: Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps
Comments: Accepted at the Web Conference 2023
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2303.08973 [pdf, other]
Title: Cryptographic Primitives based on Compact Knapsack Problem
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2303.08886 [pdf, other]
Title: vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash
Comments: 8 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2303.08882 [pdf, ps, other]
Title: Generic Decoding of Restricted Errors
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[78]  arXiv:2303.09527 (cross-list from cs.IR) [pdf, other]
Title: Fairness-aware Differentially Private Collaborative Filtering
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[79]  arXiv:2303.09289 (cross-list from cs.LG) [pdf, other]
Title: Image Classifiers Leak Sensitive Attributes About Their Classes
Comments: 40 pages, 32 figures, 4 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[80]  arXiv:2303.09272 (cross-list from cs.LG) [pdf, other]
Title: Copyright Protection and Accountability of Generative AI:Attack, Watermarking and Attribution
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[81]  arXiv:2303.09051 (cross-list from cs.CV) [pdf, other]
Title: Robust Evaluation of Diffusion-Based Adversarial Purification
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[82]  arXiv:2303.09045 (cross-list from cs.LG) [pdf]
Title: Web and Mobile Platforms for Managing Elections based on IoT And Machine Learning Algorithms
Journal-ref: International Journal of Engineering Applied Sciences and Technology, 2022, Vol 7, No 7, 29-35
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[83]  arXiv:2303.08956 (cross-list from cs.AI) [pdf]
Title: Exploring the Relevance of Data Privacy-Enhancing Technologies for AI Governance Use Cases
Comments: arXiv admin note: text overlap with arXiv:2012.08347
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[84]  arXiv:2303.08944 (cross-list from cs.LG) [pdf, other]
Title: Certifiable (Multi)Robustness Against Patch Attacks Using ERM
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[85]  arXiv:2303.08865 (cross-list from quant-ph) [pdf, other]
Title: Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority
Comments: 27+10 pages, 5 figures. This work supersedes arXiv:2102.12949
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 85 entries: 1-50 | 36-85 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)