We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 240

[ total of 346 entries: 1-25 | ... | 166-190 | 191-215 | 216-240 | 241-265 | 266-290 | 291-315 | 316-340 | 341-346 ]
[ showing 25 entries per page: fewer | more | all ]
[241]  arXiv:2110.04337 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Token Attacks on Vision Transformers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[242]  arXiv:2110.04471 (cross-list from cs.LG) [pdf, ps, other]
Title: Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[243]  arXiv:2110.04571 (cross-list from cs.LG) [pdf, other]
Title: Widen The Backdoor To Let More Attackers In
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[244]  arXiv:2110.04731 (cross-list from cs.IT) [pdf, ps, other]
Title: Universal Adversarial Attacks on Neural Networks for Power Allocation in a Massive MIMO System
Comments: accepted for publication in IEEE Wireless Communications Letters
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[245]  arXiv:2110.04995 (cross-list from cs.LG) [pdf, other]
Title: The Skellam Mechanism for Differentially Private Federated Learning
Comments: Paper published in NeurIPS 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Probability (math.PR); Machine Learning (stat.ML)
[246]  arXiv:2110.05014 (cross-list from cs.IT) [pdf, other]
Title: An Information-Theoretic Analysis of The Cost of Decentralization for Learning and Inference Under Privacy Constraints
Comments: Under review
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[247]  arXiv:2110.05044 (cross-list from cs.CV) [pdf, other]
Title: Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques
Comments: Version 4 corresponds to the version of the manuscript accepted for publication in IEEE TIFS. Revisions: A few broken URLs have been fixed. Consists of: 29 pages, 2 figures, 10 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[248]  arXiv:2110.05054 (cross-list from cs.SD) [pdf, other]
Title: Source Mixing and Separation Robust Audio Steganography
Comments: Accepted to ICASSP 2022
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[249]  arXiv:2110.05057 (cross-list from cs.LG) [pdf, other]
Title: Can Stochastic Gradient Langevin Dynamics Provide Differential Privacy for Deep Learning?
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[250]  arXiv:2110.05223 (cross-list from cs.LG) [pdf, other]
Title: Continual Learning with Differential Privacy
Comments: The paper will appear at ICONIP21
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[251]  arXiv:2110.05429 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Approximate Quantiles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[252]  arXiv:2110.05797 (cross-list from cs.LG) [pdf, other]
Title: Zero-bias Deep Neural Network for Quickest RF Signal Surveillance
Comments: This paper has been accepted for publication in IEEE IPCCC 2021. arXiv admin note: text overlap with arXiv:2105.15098
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[253]  arXiv:2110.06018 (cross-list from cs.LG) [pdf, other]
Title: On the Security Risks of AutoML
Comments: Accepted as a full paper at USENIX Security '22
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[254]  arXiv:2110.06166 (cross-list from cs.LG) [src]
Title: Game Theory for Adversarial Attacks and Defenses
Authors: Shorya Sharma
Comments: With the agreement of my coauthors, I would like to withdraw the manuscript "Game Theory for Adversarial Attacks and Defenses". Some experimental procedures were not included in the manuscript, which makes a part of important claims not meaningful
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[255]  arXiv:2110.06255 (cross-list from cs.LG) [pdf, ps, other]
Title: Not all noise is accounted equally: How differentially private learning benefits from large sampling rates
Comments: 2021 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[256]  arXiv:2110.06452 (cross-list from cs.CY) [pdf, other]
Title: "I need a better description'': An Investigation Into User Expectations For Differential Privacy
Comments: A version of this paper appears in the proceedings of the 28th ACM Conference on Computer and Communications Security (CCS 2021)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[257]  arXiv:2110.06500 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Fine-tuning of Language Models
Comments: ICLR 2022. Code available at this https URL
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[258]  arXiv:2110.06559 (cross-list from cs.LG) [pdf, other]
Title: Infinitely Divisible Noise in the Low Privacy Regime
Comments: To appear at International Conference on Algorithmic Learning Theory (ALT), 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[259]  arXiv:2110.06802 (cross-list from cs.LG) [pdf, other]
Title: Identification of Attack-Specific Signatures in Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[260]  arXiv:2110.07028 (cross-list from cs.LG) [pdf, other]
Title: AI Total: Analyzing Security ML Models with Imperfect Data in Production
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[261]  arXiv:2110.07139 (cross-list from cs.CL) [pdf, other]
Title: Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer
Comments: Accepted by the main conference of EMNLP 2021 as a long paper. The camera-ready version
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[262]  arXiv:2110.07305 (cross-list from cs.LG) [pdf]
Title: DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Comments: 9 pages, 5 figures, 7 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[263]  arXiv:2110.07317 (cross-list from cs.LG) [pdf, other]
Title: ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection
Comments: Accepted to ICSE 2022 (Demonstrations). The first two authors contributed equally to this work
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[264]  arXiv:2110.07567 (cross-list from cs.LG) [pdf, other]
Title: Resource-constrained Federated Edge Learning with Heterogeneous Data: Formulation and Analysis
Comments: Under View
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[265]  arXiv:2110.07636 (cross-list from cs.LG) [pdf]
Title: A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity
Comments: 9 pages, 8 figures, 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 346 entries: 1-25 | ... | 166-190 | 191-215 | 216-240 | 241-265 | 266-290 | 291-315 | 316-340 | 341-346 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2212, contact, help  (Access key information)