We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 95

[ total of 91 entries: 1-25 | 17-41 | 42-66 | 67-91 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 2 Dec 2022 (continued, showing last 12 of 18 entries)

[67]  arXiv:2212.00135 [pdf, other]
Title: Answering Private Linear Queries Adaptively using the Common Mechanism
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[68]  arXiv:2212.00128 [pdf, ps, other]
Title: An Optimized Privacy-Utility Trade-off Framework for Differentially Private Data Sharing in Blockchain-based Internet of Things
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2212.00068 [pdf, ps, other]
Title: Differentially Private Enhanced Permissioned Blockchain for Private Data Sharing in Industrial IoT
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2212.00726 (cross-list from cs.CY) [pdf, other]
Title: Predicting Digital Asset Prices using Natural Language Processing: a survey
Authors: Trang Tran
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[71]  arXiv:2212.00612 (cross-list from cs.LG) [pdf, other]
Title: Purifier: Defending Data Inference Attacks via Transforming Confidence Scores
Comments: accepted by AAAI 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[72]  arXiv:2212.00573 (cross-list from cs.CY) [pdf, other]
Title: A perspective on the use of health digital twins in computational pathology
Authors: Manuel Cossio
Comments: 6 pages, 3 figures
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[73]  arXiv:2212.00484 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Data Synthetisation for Secure Information Sharing
Comments: 10 pages, 7 figures and 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[74]  arXiv:2212.00328 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Learning with Per-Sample Adaptive Clipping
Comments: To appear in AAAI 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[75]  arXiv:2212.00322 (cross-list from cs.LG) [pdf, other]
Title: Hijack Vertical Federated Learning Models with Adversarial Embedding
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[76]  arXiv:2212.00309 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Adaptive Optimization with Delayed Preconditioners
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[77]  arXiv:2212.00306 (cross-list from cs.LG) [pdf, other]
Title: Decentralized Matrix Factorization with Heterogeneous Differential Privacy
Authors: Wentao Hu, Hui Fang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[78]  arXiv:2212.00292 (cross-list from econ.GN) [pdf, other]
Title: Economics of NFTs: The Value of Creator Royalties
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Trading and Market Microstructure (q-fin.TR)

Thu, 1 Dec 2022

[79]  arXiv:2211.17230 [pdf, other]
Title: The Bounded Gaussian Mechanism for Differential Privacy
Authors: Bo Chen, Matthew Hale
Comments: 27 pages, submitted to Journal of Privacy and Confidentiality
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2211.17073 [pdf, other]
Title: Risks to Zero Trust in a Federated Mission Partner Environment
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2211.17019 [pdf, other]
Title: Real time QKD Post Processing based on Reconfigurable Hardware Acceleration
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2211.16993 [pdf, other]
Title: Post-Quantum $κ$-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets
Authors: Xingyu Yan (1), Licheng Wang (2), Weiqiang Wen (3), Ziyi Li (4), Jingwen Suo (1), Lize Gu (1) ((1) State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China. (2) School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, 100081, China. (3) LTCI, Telecom Paris, Institut Polytechnique de Paris, Paris, France. (4) State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences, Beijing, 100049, China.)
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Quantum Physics (quant-ph)
[83]  arXiv:2211.16987 [pdf, other]
Title: Secure Software Development Methodologies: A Multivocal Literature Review
Comments: 27 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2211.16942 [pdf]
Title: ALARM: Active LeArning of Rowhammer Mitigations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[85]  arXiv:2211.16891 [pdf, ps, other]
Title: Quantitative Information Flow for Hardware: Advancing the Attack Landscape
Comments: 4 pages, accepted at IEEE Latin American Symposium on Circuits and Systems (LASCAS), 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[86]  arXiv:2211.16735 [pdf, other]
Title: Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities
Authors: Aditya Basu (1), John Sampson (1), Zhiyun Qian (2), Trent Jaeger (1) ((1) The Pennsylvania State University, (2) University of California, Riverside)
Comments: 15 pages, 1 appendix, 2 tables, 12 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[87]  arXiv:2211.16626 [pdf, ps, other]
Title: Sludge for Good: Slowing and Imposing Costs on Cyber Attackers
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2211.17104 (cross-list from cs.MA) [pdf, other]
Title: Agent-Cells with $DNA$ Programming: A Dynamic Decentralized System
Authors: Arash Vaezi
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[89]  arXiv:2211.17070 (cross-list from cs.SI) [pdf, other]
Title: Differentially Private ADMM-Based Distributed Discrete Optimal Transport for Resource Allocation
Comments: 6 pages, 4 images, 1 algorithm, IEEE GLOBECOMM 2022
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[90]  arXiv:2211.16808 (cross-list from cs.LG) [pdf, other]
Title: Efficient Adversarial Input Generation via Neural Net Patching
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[91]  arXiv:2211.16669 (cross-list from cs.LG) [pdf, other]
Title: FedGPO: Heterogeneity-Aware Global Parameter Optimization for Efficient Federated Learning
Comments: 12 pages, 12 figures, IEEE International Symposium on Workload Characterization (IISWC)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[ total of 91 entries: 1-25 | 17-41 | 42-66 | 67-91 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2212, contact, help  (Access key information)