We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 250

[ total of 346 entries: 1-50 | ... | 101-150 | 151-200 | 201-250 | 251-300 | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]
[251]  arXiv:2110.05429 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Approximate Quantiles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[252]  arXiv:2110.05797 (cross-list from cs.LG) [pdf, other]
Title: Zero-bias Deep Neural Network for Quickest RF Signal Surveillance
Comments: This paper has been accepted for publication in IEEE IPCCC 2021. arXiv admin note: text overlap with arXiv:2105.15098
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[253]  arXiv:2110.06018 (cross-list from cs.LG) [pdf, other]
Title: On the Security Risks of AutoML
Comments: Accepted as a full paper at USENIX Security '22
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[254]  arXiv:2110.06166 (cross-list from cs.LG) [src]
Title: Game Theory for Adversarial Attacks and Defenses
Authors: Shorya Sharma
Comments: With the agreement of my coauthors, I would like to withdraw the manuscript "Game Theory for Adversarial Attacks and Defenses". Some experimental procedures were not included in the manuscript, which makes a part of important claims not meaningful
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[255]  arXiv:2110.06255 (cross-list from cs.LG) [pdf, ps, other]
Title: Not all noise is accounted equally: How differentially private learning benefits from large sampling rates
Comments: 2021 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[256]  arXiv:2110.06452 (cross-list from cs.CY) [pdf, other]
Title: "I need a better description'': An Investigation Into User Expectations For Differential Privacy
Comments: A version of this paper appears in the proceedings of the 28th ACM Conference on Computer and Communications Security (CCS 2021)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[257]  arXiv:2110.06500 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Fine-tuning of Language Models
Comments: ICLR 2022. Code available at this https URL
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[258]  arXiv:2110.06559 (cross-list from cs.LG) [pdf, other]
Title: Infinitely Divisible Noise in the Low Privacy Regime
Comments: To appear at International Conference on Algorithmic Learning Theory (ALT), 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[259]  arXiv:2110.06802 (cross-list from cs.LG) [pdf, other]
Title: Identification of Attack-Specific Signatures in Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[260]  arXiv:2110.07028 (cross-list from cs.LG) [pdf, other]
Title: AI Total: Analyzing Security ML Models with Imperfect Data in Production
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[261]  arXiv:2110.07139 (cross-list from cs.CL) [pdf, other]
Title: Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer
Comments: Accepted by the main conference of EMNLP 2021 as a long paper. The camera-ready version
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[262]  arXiv:2110.07305 (cross-list from cs.LG) [pdf]
Title: DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Comments: 9 pages, 5 figures, 7 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[263]  arXiv:2110.07317 (cross-list from cs.LG) [pdf, other]
Title: ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection
Comments: Accepted to ICSE 2022 (Demonstrations). The first two authors contributed equally to this work
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[264]  arXiv:2110.07567 (cross-list from cs.LG) [pdf, other]
Title: Resource-constrained Federated Edge Learning with Heterogeneous Data: Formulation and Analysis
Comments: Under View
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[265]  arXiv:2110.07636 (cross-list from cs.LG) [pdf]
Title: A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity
Comments: 9 pages, 8 figures, 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[266]  arXiv:2110.07683 (cross-list from cs.LG) [pdf, other]
Title: Toward Realistic Backdoor Injection Attacks on DNNs using Rowhammer
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[267]  arXiv:2110.08042 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Attacks on ML Defense Models Competition
Comments: Competition Report
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[268]  arXiv:2110.08256 (cross-list from cs.LG) [pdf, other]
Title: Model-Agnostic Meta-Attack: Towards Reliable Evaluation of Adversarial Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[269]  arXiv:2110.08303 (cross-list from cs.OS) [pdf, other]
Title: Minimum Viable Device Drivers for ARM TrustZone
Comments: Eurosys 2022
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[270]  arXiv:2110.08321 (cross-list from cs.LG) [pdf, other]
Title: Efficient Representations for Privacy-Preserving Inference
Comments: 8 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[271]  arXiv:2110.08557 (cross-list from cs.LG) [pdf, other]
Title: DPNAS: Neural Architecture Search for Deep Learning with Differential Privacy
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[272]  arXiv:2110.08661 (cross-list from cs.SE) [pdf, other]
Title: Making Existing Software Quantum Safe: Lessons Learned
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[273]  arXiv:2110.08712 (cross-list from cs.LG) [pdf, other]
Title: Black-box Adversarial Attacks on Network-wide Multi-step Traffic State Prediction Models
Comments: Accepted to IEEE International Conference on Intelligent Transportation Systems (ITSC), 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[274]  arXiv:2110.08760 (cross-list from cs.LG) [pdf, other]
Title: Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Comments: The short version of this paper has been published in the IEEE International Conference on Data Mining (ICDM) 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[275]  arXiv:2110.08821 (cross-list from cs.SD) [pdf, other]
Title: Storage and Authentication of Audio Footage for IoAuT Devices Using Distributed Ledger Technology
Comments: 11 pages, 3 Figures, 1 code listing
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[276]  arXiv:2110.08932 (cross-list from cs.LG) [pdf, other]
Title: Poisoning Attacks on Fair Machine Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[277]  arXiv:2110.08983 (cross-list from cs.PL) [pdf, other]
Title: An Empirical Study of Protocols in Smart Contracts
Comments: 10 pages. In HATRA 2021
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[278]  arXiv:2110.09008 (cross-list from cs.LG) [pdf, other]
Title: When Are Linear Stochastic Bandits Attackable?
Comments: 27 pages, 3 figures, ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[279]  arXiv:2110.09437 (cross-list from cs.CY) [pdf, other]
Title: Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[280]  arXiv:2110.09495 (cross-list from cs.LG) [pdf, other]
Title: Protecting Anonymous Speech: A Generative Adversarial Network Methodology for Removing Stylistic Indicators in Text
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[281]  arXiv:2110.09660 (cross-list from cs.LG) [pdf, other]
Title: BEV-SGD: Best Effort Voting SGD for Analog Aggregation Based Federated Learning against Byzantine Attackers
Comments: Version 2:Revised some proofs, some typos, and some expressions of sentences
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[282]  arXiv:2110.09670 (cross-list from cs.LG) [pdf, other]
Title: Private measurement of nonlinear correlations between data hosted across multiple parties
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computation (stat.CO); Machine Learning (stat.ML)
[283]  arXiv:2110.09814 (cross-list from cs.SD) [pdf, other]
Title: Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Comments: 5 pages, 2 figures. Acceptted by 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Subjects: Sound (cs.SD); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Multimedia (cs.MM); Audio and Speech Processing (eess.AS)
[284]  arXiv:2110.09849 (cross-list from cs.AR) [pdf, other]
Title: Holistic Hardware Security Assessment Framework: A Microarchitectural Perspective
Comments: Appeared in the program of Energy-Secure System Architectures (ESSA) Workshop
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[285]  arXiv:2110.10133 (cross-list from cs.LG) [pdf, other]
Title: Locally Differentially Private Reinforcement Learning for Linear Mixture Markov Decision Processes
Comments: 25 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[286]  arXiv:2110.10287 (cross-list from cs.LG) [pdf, other]
Title: Multi-concept adversarial attacks
Comments: 20 pages, 28 figures, 9 tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[287]  arXiv:2110.10349 (cross-list from cs.LG) [pdf, ps, other]
Title: Distributed Reinforcement Learning for Privacy-Preserving Dynamic Edge Caching
Comments: 15 pages, 9 figures, under review with the IEEE Journal on Selected Areas in Communications
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[288]  arXiv:2110.10491 (cross-list from cs.SD) [pdf, ps, other]
Title: A Study On Data Augmentation In Voice Anti-Spoofing
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[289]  arXiv:2110.10523 (cross-list from cs.CV) [pdf, other]
Title: Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[290]  arXiv:2110.10524 (cross-list from cs.LG) [pdf, other]
Title: Statistical and Topological Properties of Gaussian Smoothed Sliced Probability Divergences
Authors: Alain Rakotomamonjy, Mokhtar Z. Alaya (LMAC), Maxime Berar (DocApp - LITIS), Gilles Gasso (DocApp - LITIS)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[291]  arXiv:2110.10601 (cross-list from cs.LG) [pdf]
Title: Color Teams for Machine Learning Development
Comments: 8 Pages, 6 Figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[292]  arXiv:2110.10655 (cross-list from cs.SI) [pdf, other]
Title: Socialbots on Fire: Modeling Adversarial Behaviors of Socialbots via Multi-Agent Hierarchical Reinforcement Learning
Comments: Accepted to The ACM Web Conference 2022
Subjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[293]  arXiv:2110.10897 (cross-list from cs.SI) [pdf, other]
Title: Privacy-Aware Identity Cloning Detection based on Deep Forest
Comments: The 19th International Conference on Service Oriented Computing (ICSOC 2021). arXiv admin note: text overlap with arXiv:2109.15179
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[294]  arXiv:2110.11024 (cross-list from cs.LG) [pdf, other]
Title: Watermarking Graph Neural Networks based on Backdoor Attacks
Comments: 13 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[295]  arXiv:2110.11208 (cross-list from cs.LG) [pdf, ps, other]
Title: User-Level Private Learning via Correlated Sampling
Comments: To appear in NeurIPS 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[296]  arXiv:2110.11411 (cross-list from cs.CV) [pdf, other]
Title: PROVES: Establishing Image Provenance using Semantic Signatures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[297]  arXiv:2110.11688 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Coordinate Descent for Composite Empirical Risk Minimization
Comments: 30 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[298]  arXiv:2110.11794 (cross-list from cs.CV) [pdf, other]
Title: Federated Unlearning via Class-Discriminative Pruning
Comments: WWW2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[299]  arXiv:2110.11876 (cross-list from cs.DS) [pdf, ps, other]
Title: Tight and Robust Private Mean Estimation with Few Users
Comments: 41 pages. To appear in the International Conference on Machine Learning (ICML), 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistics Theory (math.ST)
[300]  arXiv:2110.11891 (cross-list from cs.LG) [pdf, other]
Title: On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning
Comments: published in 31st USENIX Security Symposium
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[ total of 346 entries: 1-50 | ... | 101-150 | 151-200 | 201-250 | 251-300 | 301-346 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2208, contact, help  (Access key information)