We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 117 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-117 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 7 Jun 2023

[1]  arXiv:2306.03825 [pdf, other]
Title: Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2306.03733 [pdf, other]
Title: A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Comments: Accepted to the International Conference on Machine Learning and Cybernetics (ICMLC) 2023
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[3]  arXiv:2306.03707 [pdf, other]
Title: Effective Intrusion Detection in Highly Imbalanced IoT Networks with Lightweight S2CGAN-IDS
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[4]  arXiv:2306.03643 [pdf, other]
Title: TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report)
Comments: In proceedings of Financial Cryptography 2023. This is the technical report of the published paper
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2306.03573 [pdf, other]
Title: mdTLS: How to Make middlebox-aware TLS more efficient?
Comments: 22 pages, 3 figures, 9 tables
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2306.03558 [pdf, other]
Title: Machine Unlearning: A Survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7]  arXiv:2306.03547 [pdf]
Title: A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage
Authors: Mazharul Islam
Comments: 146 Pages, Master's Thesis, 6 Chapters, 96 Figures, 11 Tables
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2306.03540 [pdf]
Title: Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG
Comments: 20 pages, 12 figurs
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE); Computer Science and Game Theory (cs.GT)
[9]  arXiv:2306.03528 [pdf, other]
Title: Adversarial Attacks and Defenses for Semantic Communication in Vehicular Metaverses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[10]  arXiv:2306.03488 [pdf, ps, other]
Title: Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
Comments: This is a long version of a paper accepted at CRYPTO'23
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[11]  arXiv:2306.03436 [pdf, other]
Title: Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[12]  arXiv:2306.03397 [pdf, other]
Title: A Survey on Federated Learning Poisoning Attacks and Defenses
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2306.03379 [pdf, other]
Title: OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[14]  arXiv:2306.03366 [pdf, other]
Title: X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands
Comments: 4 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[15]  arXiv:2306.03269 [pdf, other]
Title: Security Knowledge-Guided Fuzzing of Deep Learning Libraries
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[16]  arXiv:2306.03726 (cross-list from cs.LG) [pdf, other]
Title: Exploring Model Dynamics for Accumulative Poisoning Discovery
Comments: accepted by ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2306.03679 (cross-list from cs.CV) [pdf, other]
Title: Human-imperceptible, Machine-recognizable Images
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[18]  arXiv:2306.03321 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Blockchain Miners Provide Massive Energy Savings
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[19]  arXiv:2306.03257 (cross-list from cs.NE) [pdf, other]
Title: Generating Private Synthetic Data with Genetic Algorithms
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2306.03235 (cross-list from cs.LG) [pdf, other]
Title: Information Flow Control in Machine Learning through Modular Model Architecture
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Tue, 6 Jun 2023 (showing first 5 of 33 entries)

[21]  arXiv:2306.03054 [pdf, other]
Title: Discriminative Adversarial Privacy: Balancing Accuracy and Membership Privacy in Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2306.03013 [pdf, other]
Title: Hiding in Plain Sight: Disguising Data Stealing Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[23]  arXiv:2306.02895 [pdf, other]
Title: Evading Black-box Classifiers Without Breaking Eggs
Comments: Code at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[24]  arXiv:2306.02785 [pdf, other]
Title: Modular zk-Rollup On-Demand
Comments: url : this https URL
Journal-ref: Journal of Network and Computer Applications, 2023, 103678, ISSN 1084-8045,
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2306.02715 [pdf, other]
Title: Federated Intrusion Detection System based on Deep Belief Networks
Comments: 14 pages, 5 figues, 3 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 117 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-117 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2306, contact, help  (Access key information)