We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 215

[ total of 346 entries: 1-25 | ... | 141-165 | 166-190 | 191-215 | 216-240 | 241-265 | 266-290 | 291-315 | ... | 341-346 ]
[ showing 25 entries per page: fewer | more | all ]
[216]  arXiv:2110.00708 (cross-list from cs.CV) [pdf, other]
Title: Universal Adversarial Spoofing Attacks against Face Recognition
Comments: Accepted to International Joint Conference on Biometrics (IJCB 2021)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[217]  arXiv:2110.00917 (cross-list from cs.IT) [pdf]
Title: Binary code optimization
Comments: in Persian language
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[218]  arXiv:2110.00972 (cross-list from cs.CV) [pdf, other]
Title: A Robust Scheme for 3D Point Cloud Copy Detection
Comments: submitted for review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[219]  arXiv:2110.01162 (cross-list from cs.DC) [pdf, other]
Title: Controlling Resource Allocation using Blockchain-Based Delegation
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[220]  arXiv:2110.01398 (cross-list from cs.DC) [pdf]
Title: Enabling Blockchain Scalability and Interoperability with Mobile Computing through LayerOne.X
Comments: 40 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[221]  arXiv:2110.01439 (cross-list from cs.PL) [pdf, other]
Title: SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation
Comments: CSF 2022 pre-print with extra appendices
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[222]  arXiv:2110.01639 (cross-list from cs.LG) [pdf, other]
Title: An energy-based model for neuro-symbolic reasoning on knowledge graphs
Comments: Accepted for publication at the 20th IEEE International Conference on Machine Learning and Applications (ICMLA 2021)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[223]  arXiv:2110.01643 (cross-list from cs.CL) [pdf, other]
Title: Privacy enabled Financial Text Classification using Differential Privacy and Federated Learning
Comments: 4 pages. Accepted at ECONLP-EMNLP'21
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[224]  arXiv:2110.01818 (cross-list from cs.NE) [pdf, other]
Title: An Improved Genetic Algorithm and Its Application in Neural Network Adversarial Attack
Comments: 18 pages, 9 figures, 9 tables and 23 References
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[225]  arXiv:2110.02159 (cross-list from cs.LG) [pdf, other]
Title: Label differential privacy via clustering
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT)
[226]  arXiv:2110.02177 (cross-list from cs.LG) [pdf, other]
Title: Secure Aggregation for Buffered Asynchronous Federated Learning
Comments: arXiv admin note: substantial overlap with arXiv:2109.14236
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (stat.ML)
[227]  arXiv:2110.02364 (cross-list from cs.LG) [pdf, other]
Title: Adversarial defenses via a mixture of generators
Journal-ref: International Conference on Neural Information Processing, ICONIP 2021, CCIS 1516, 566-574
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[228]  arXiv:2110.02516 (cross-list from cs.CV) [pdf, other]
Title: Attack as the Best Defense: Nullifying Image-to-image Translation GANs via Limit-aware Adversarial Attack
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[229]  arXiv:2110.02784 (cross-list from cs.MA) [pdf, other]
Title: Cooperative Multi-Agent Actor-Critic for Privacy-Preserving Load Scheduling in a Residential Microgrid
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[230]  arXiv:2110.02797 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Robustness Comparison of Vision Transformer and MLP-Mixer to CNNs
Comments: Code: this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[231]  arXiv:2110.03017 (cross-list from cs.LG) [pdf, other]
Title: Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA)
[232]  arXiv:2110.03106 (cross-list from cs.LG) [pdf, other]
Title: Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[233]  arXiv:2110.03301 (cross-list from cs.LG) [pdf, other]
Title: EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[234]  arXiv:2110.03369 (cross-list from cs.LG) [pdf, other]
Title: The Connection between Out-of-Distribution Generalization and Privacy of ML Models
Comments: Prior version accepted at Workshop on Privacy Preserving Machine Learning, NeurIPS 2020. Code: this https URL
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[235]  arXiv:2110.03464 (cross-list from cs.CV) [pdf, other]
Title: Differential Anomaly Detection for Facial Images
Comments: Accepted at WIFS'21
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[236]  arXiv:2110.03620 (cross-list from cs.LG) [pdf, other]
Title: Hyperparameter Tuning with Renyi Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[237]  arXiv:2110.03735 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Unlearning of Backdoors via Implicit Hypergradient
Comments: In proceeding of the Tenth International Conference on Learning Representations (ICLR 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[238]  arXiv:2110.03991 (cross-list from cs.LG) [pdf, other]
Title: Combining Differential Privacy and Byzantine Resilience in Distributed SGD
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[239]  arXiv:2110.04094 (cross-list from cs.IT) [pdf, other]
Title: Privacy-Aware Communication Over a Wiretap Channel with Generative Networks
Comments: 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2022)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[240]  arXiv:2110.04190 (cross-list from cs.DS) [pdf, other]
Title: On Explicit Constructions of Extremely Depth Robust Graphs
Comments: 12 pages, 1 figure. This is the full version of the paper published at STACS 2022. We noticed a mistake in the references for the computational intractability of the depth robustness of the graphs and fixed it
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Combinatorics (math.CO)
[ total of 346 entries: 1-25 | ... | 141-165 | 166-190 | 191-215 | 216-240 | 241-265 | 266-290 | 291-315 | ... | 341-346 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2211, contact, help  (Access key information)