We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 315

[ total of 346 entries: 1-50 | ... | 166-215 | 216-265 | 266-315 | 316-346 ]
[ showing 50 entries per page: fewer | more | all ]
[316]  arXiv:2110.14199 (cross-list from eess.SY) [pdf, ps, other]
Title: Arbitrarily Fast Switched Distributed Stabilization of Partially Unknown Interconnected Multiagent Systems: A Proactive Cyber Defense Perspective
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Optimization and Control (math.OC)
[317]  arXiv:2110.14430 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Neuron Pruning Purifies Backdoored Deep Models
Comments: To appear in NeurIPS 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[318]  arXiv:2110.14503 (cross-list from cs.LG) [pdf, other]
Title: Simple data balancing achieves competitive worst-group-accuracy
Comments: Accepted at CLeaR (Causal Learning and Reasoning) 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[319]  arXiv:2110.15252 (cross-list from cs.LG) [pdf, ps, other]
Title: FeO2: Federated Learning with Opt-Out Differential Privacy
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[320]  arXiv:2110.15317 (cross-list from cs.CL) [pdf, other]
Title: Bridge the Gap Between CV and NLP! A Gradient-based Textual Adversarial Attack Framework
Comments: Work on progress
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[321]  arXiv:2110.15415 (cross-list from cs.IT) [pdf, other]
Title: On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Subjects: Information Theory (cs.IT); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[322]  arXiv:2110.15869 (cross-list from cs.DC) [pdf, other]
Title: Trustworthy Pre-Processing of Sensor Data in Data On-chaining Workflows for Blockchain-based IoT Applications
Comments: Preprint version of full paper at ICSCO21
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[323]  arXiv:2110.00878 (cross-list from quant-ph) [pdf, other]
Title: Conditions for Advantageous Quantum Bitcoin Mining
Comments: 16 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[324]  arXiv:2110.01402 (cross-list from physics.ed-ph) [pdf, other]
Title: Quantum information and beyond -- with quantum candies
Comments: This is the journal version of: Lin, J. and Mor, T., 2020, December. Quantum Candies and Quantum Cryptography. In International Conference on the Theory and Practice of Natural Computing (pp. 69-81). Springer, Cham., arXiv preprint arXiv:2011.02837. Changes in this version: changed title and abstract, added sections on NLB, quaternionic computing and mixed states
Subjects: Physics Education (physics.ed-ph); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[325]  arXiv:2110.02483 (cross-list from stat.ML) [pdf, other]
Title: Detecting and Quantifying Malicious Activity with Simulation-based Inference
Comments: Short version, appeared at ICML workshop on Socially Responsible Machine Learning 2021
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
[326]  arXiv:2110.02836 (cross-list from quant-ph) [pdf, ps, other]
Title: Beyond quadratic speedups in quantum attacks on symmetric schemes
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[327]  arXiv:2110.03265 (cross-list from physics.optics) [pdf]
Title: Optical secret sharing with cascaded metasurface holography
Journal-ref: Sci. Adv. 7, eabf9718 (2021)
Subjects: Optics (physics.optics); Cryptography and Security (cs.CR)
[328]  arXiv:2110.04191 (cross-list from quant-ph) [pdf, ps, other]
Title: The Parallel Reversible Pebbling Game: Analyzing the Post-Quantum Security of iMHFs
Comments: 42 pages, 5 figures
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[329]  arXiv:2110.04391 (cross-list from eess.AS) [pdf, other]
Title: Aura: Privacy-preserving augmentation to improve test set diversity in noise suppression applications
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[330]  arXiv:2110.04775 (cross-list from eess.AS) [pdf, other]
Title: Estimating the confidence of speech spoofing countermeasure
Comments: Work in progress. Comments are welcome. Accepted by ICASSP2022. Code is available this https URL Not all the comments from anonymous reviewers can be addressed within 4 pages, apologize for that
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[331]  arXiv:2110.05431 (cross-list from eess.AS) [pdf, other]
Title: On the invertibility of a voice privacy system using embedding alignement
Authors: Pierre Champion (MULTISPEECH, LIUM), Thomas Thebaud (LIUM), Gaël Le Lan, Anthony Larcher (LIUM), Denis Jouvet (MULTISPEECH)
Journal-ref: ASRU 2021 - IEEE Automatic Speech Recognition and Understanding Workshop, Dec 2021, Cartagena, Colombia
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD)
[332]  arXiv:2110.05893 (cross-list from quant-ph) [pdf, other]
Title: Hide and seek with quantum resources: New and modified protocols for quantum steganography
Comments: It's shown that discrete modulation continuous variable QKD is useful in designing protocols of steganography free from weaknesses of an existing protocol
Journal-ref: Quant. Infor. Proc. 21 (2022) 164
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[333]  arXiv:2110.07136 (cross-list from eess.SP) [pdf, other]
Title: Federated Learning for COVID-19 Detection with Generative Adversarial Networks in Edge Cloud Computing
Comments: Accepted at IEEE Internet of Things Journal, 14 pages
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[334]  arXiv:2110.07768 (cross-list from eess.IV) [pdf, other]
Title: Application of Homomorphic Encryption in Medical Imaging
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[335]  arXiv:2110.07996 (cross-list from stat.ME) [pdf, other]
Title: Multivariate Mean Comparison under Differential Privacy
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[336]  arXiv:2110.08449 (cross-list from stat.ML) [pdf, other]
Title: Adversarial Attacks on Gaussian Process Bandits
Comments: Accepted to ICML 2022
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[337]  arXiv:2110.08676 (cross-list from stat.ML) [pdf, other]
Title: Noise-Augmented Privacy-Preserving Empirical Risk Minimization with Dual-purpose Regularizer and Privacy Budget Retrieval and Recycling
Authors: Yinan Li, Fang Liu
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[338]  arXiv:2110.09469 (cross-list from quant-ph) [pdf, other]
Title: Quantum Lock: A Provable Quantum Communication Advantage
Comments: Replacement of paper "Hybrid PUF: A Novel Way to Enhance the Security of Classical PUFs" (arXiv:2110.09469)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[339]  arXiv:2110.09927 (cross-list from eess.IV) [pdf, other]
Title: Conditional De-Identification of 3D Magnetic Resonance Images
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[340]  arXiv:2110.10498 (cross-list from math.OC) [pdf, other]
Title: Differential Privacy in Multi-Party Resource Sharing
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[341]  arXiv:2110.11724 (cross-list from quant-ph) [pdf, other]
Title: On the Connection Between Quantum Pseudorandomness and Quantum Hardware Assumptions
Comments: 33 pages, 4 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[342]  arXiv:2110.14426 (cross-list from stat.ML) [pdf, other]
Title: Locally Differentially Private Bayesian Inference
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[343]  arXiv:2110.14465 (cross-list from stat.ME) [pdf, other]
Title: Unbiased Statistical Estimation and Valid Confidence Intervals Under Differential Privacy
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[344]  arXiv:2110.14701 (cross-list from quant-ph) [pdf, other]
Title: Cybersecurity for Quantum Computing
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[345]  arXiv:2110.15449 (cross-list from stat.ME) [pdf, ps, other]
Title: Privacy-Preserving Inference on the Ratio of Two Gaussians Using Sums
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR); Applications (stat.AP)
[346]  arXiv:2110.11254 (cross-list from quant-ph) [pdf, other]
Title: Quantum Teleportation with One Classical Bit
Authors: Abhishek Parakh
Comments: 6 pages, 1 figure, typos corrected
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[ total of 346 entries: 1-50 | ... | 166-215 | 216-265 | 266-315 | 316-346 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2212, contact, help  (Access key information)