We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 2

[ total of 114 entries: 1-25 | 3-27 | 28-52 | 53-77 | 78-102 | 103-114 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 31 May 2023 (continued, showing last 22 of 24 entries)

[3]  arXiv:2305.18928 [pdf, other]
Title: Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2305.18909 [pdf]
Title: Password-Based Authentication and The Experiences of End Users
Comments: 31 pages, 15 tables, 2 figures
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2305.18852 [pdf, other]
Title: Majority Voting Approach to Ransomware Detection
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2305.18799 [pdf, ps, other]
Title: Methods for Collisions in Some Algebraic Hash Functions
Authors: Simran Tinani
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[7]  arXiv:2305.18667 [pdf, other]
Title: Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids
Comments: 2023 IEEE Electric Ship Technologies Symposium (ESTS)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[8]  arXiv:2305.18639 [pdf, other]
Title: Securing Cloud File Systems using Shielded Execution
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[9]  arXiv:2305.18545 [pdf, other]
Title: Blockchain Censorship
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[10]  arXiv:2305.18384 [pdf, other]
Title: Backdoor Attacks Against Incremental Learners: An Empirical Evaluation Study
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[11]  arXiv:2305.19254 (cross-list from cs.LG) [pdf, other]
Title: What Can We Learn from Unlearnable Datasets?
Comments: 17 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[12]  arXiv:2305.19218 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Online Learning to Rank with Stochastic Click Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[13]  arXiv:2305.19198 (cross-list from cs.HC) [pdf, other]
Title: Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[14]  arXiv:2305.18737 (cross-list from quant-ph) [pdf, other]
Title: Phase Correction using Deep Learning for Satellite-to-Ground CV-QKD
Subjects: Quantum Physics (quant-ph); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[15]  arXiv:2305.18651 (cross-list from cs.LG) [pdf, other]
Title: UMD: Unsupervised Model Detection for X2X Backdoor Attacks
Comments: ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[16]  arXiv:2305.18607 (cross-list from cs.SE) [pdf, other]
Title: How Effective Are Neural Networks for Fixing Security Vulnerabilities
Comments: This paper has been accepted to appear in the proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023), and to be presented at the conference, that will be held in Seattle, USA, 17-21 July 2023
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[17]  arXiv:2305.18503 (cross-list from cs.CL) [pdf, other]
Title: From Adversarial Arms Race to Model-centric Evaluation: Motivating a Unified Automatic Robustness Evaluation Framework
Comments: Accepted to Findings of ACL 2023
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2305.18465 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning of Gboard Language Models with Differential Privacy
Comments: ACL industry track
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[19]  arXiv:2305.18462 (cross-list from cs.CL) [pdf, other]
Title: Membership Inference Attacks against Language Models via Neighbourhood Comparison
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2305.18456 (cross-list from cs.LG) [pdf, other]
Title: Baselines for Identifying Watermarked Large Language Models
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[21]  arXiv:2305.18447 (cross-list from cs.LG) [pdf, other]
Title: Unleashing the Power of Randomization in Auditing Differentially Private ML
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Statistics Theory (math.ST)
[22]  arXiv:2305.18439 (cross-list from cs.CV) [pdf, other]
Title: Alteration-free and Model-agnostic Origin Attribution of Generated Images
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[23]  arXiv:2305.18396 (cross-list from cs.LG) [pdf, other]
Title: LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[24]  arXiv:2305.18393 (cross-list from cs.LG) [pdf, other]
Title: Training Private Models That Know What They Don't Know
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Tue, 30 May 2023 (showing first 3 of 24 entries)

[25]  arXiv:2305.17918 [pdf, other]
Title: An Experimental Analysis of RowHammer in HBM2 DRAM Chips
Comments: To appear at DSN Disrupt 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[26]  arXiv:2305.17879 [pdf, other]
Title: Reversible Deep Neural Network Watermarking:Matching the Floating-point Weights
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[27]  arXiv:2305.17798 [pdf, other]
Title: Ceibaco: REST API and Single Page Application for the generation and evaluation of bijective S-boxes
Subjects: Cryptography and Security (cs.CR)
[ total of 114 entries: 1-25 | 3-27 | 28-52 | 53-77 | 78-102 | 103-114 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2305, contact, help  (Access key information)