We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 25

[ total of 121 entries: 1-50 | 26-75 | 76-121 ]
[ showing 50 entries per page: fewer | more | all ]

Tue, 6 Jun 2023 (continued, showing last 8 of 33 entries)

[26]  arXiv:2306.02563 (cross-list from cs.LG) [pdf, other]
Title: Large-Scale Distributed Learning via Private On-Device Locality-Sensitive Hashing
Comments: 18 pages, 10 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[27]  arXiv:2306.02496 (cross-list from cs.DC) [pdf, other]
Title: Hawk: DevOps-driven Transparency and Accountability in Cloud Native Systems
Comments: preprint, accepted for the 16th IEEE International Conference on Cloud Computing 2023, IEEE Cloud 2023
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[28]  arXiv:2306.02487 (cross-list from cs.AI) [pdf, other]
Title: Discussion Paper: The Threat of Real Time Deepfakes
Journal-ref: FRANKOVITS, Guy; YISROEL, Mirsky. Discussion Paper: The Threat of Real Time Deepfakes. In: Proceedings of the 2st Workshop on Security Implications of Deepfakes and Cheapfakes. 2023
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[29]  arXiv:2306.02368 (cross-list from cs.LG) [pdf, other]
Title: Revisiting Data-Free Knowledge Distillation with Poisoned Teachers
Comments: Accepted to ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[30]  arXiv:2306.02179 (cross-list from cs.GT) [pdf, other]
Title: Buying Time: Latency Racing vs. Bidding in Fair Transaction Ordering
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[31]  arXiv:2306.02165 (cross-list from cs.AI) [pdf, other]
Title: Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[32]  arXiv:2306.02002 (cross-list from cs.LG) [pdf, other]
Title: Can Directed Graph Neural Networks be Adversarially Robust?
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[33]  arXiv:2306.01886 (cross-list from cs.DC) [pdf, other]
Title: Auditable data structures: theory and applications
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)

Mon, 5 Jun 2023

[34]  arXiv:2306.01655 [pdf, other]
Title: Poisoning Network Flow Classifiers
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[35]  arXiv:2306.01616 [pdf, other]
Title: Blockchain Model for Environment/Infrastructure Monitoring in Cloud-Enabled High-Altitude Platform Systems
Comments: 53 pages, 17 figures, 3 tables, accepted by Elsevier Vehicular Communications on May 26, 2023
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2306.01401 [pdf, ps, other]
Title: Network Agnostic MPC with Statistical Security
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2306.01364 [pdf, other]
Title: Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation
Comments: Accepted to IJCAI 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[38]  arXiv:2306.01356 [pdf, other]
Title: FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2306.01317 [pdf, other]
Title: Compatibility and Timing Attacks for JPEG Steganalysis
Authors: Etienne Levecque (CRIStAL), Patrick Bas (CRIStAL), Jan Butora (CRIStAL)
Comments: Workshop on Information Hiding and Multimedia Security, ACM, Jun 2023, Chicago, United States
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2306.01299 [pdf, other]
Title: Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2306.01241 [pdf, ps, other]
Title: Committee Moderation on Encrypted Messaging Platforms
Comments: Presented at the 44th IEEE Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2306.01684 (cross-list from cs.LG) [pdf, other]
Title: Harnessing large-language models to generate private synthetic text
Comments: 25 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[43]  arXiv:2306.01613 (cross-list from cs.LG) [pdf, other]
Title: Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization
Comments: Accepted to IEEE Transactions on Neural Networks and Learning Systems. arXiv admin note: text overlap with arXiv:2003.00040
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[44]  arXiv:2306.01545 (cross-list from cs.CL) [pdf, other]
Title: PassGPT: Password Modeling and (Guided) Generation with Large Language Models
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[45]  arXiv:2306.01471 (cross-list from cs.CL) [pdf, other]
Title: Guiding Text-to-Text Privatization by Syntax
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2306.01400 (cross-list from cs.LG) [pdf, other]
Title: Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[47]  arXiv:2306.01342 (cross-list from cs.LG) [pdf, other]
Title: Covert Communication Based on the Poisoning Attack in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[48]  arXiv:2306.01322 (cross-list from cs.LG) [pdf, other]
Title: Privacy Distillation: Reducing Re-identification Risk of Multimodal Diffusion Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[49]  arXiv:2306.01272 (cross-list from cs.CV) [pdf, other]
Title: DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2306.01181 (cross-list from cs.LG) [pdf, other]
Title: TMI! Finetuned Models Leak Private Information from their Pretraining Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[51]  arXiv:2306.01143 (cross-list from cs.LG) [pdf, other]
Title: Federated Graph Learning for Low Probability of Detection in Wireless Ad-Hoc Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)

Fri, 2 Jun 2023 (showing first 24 of 28 entries)

[52]  arXiv:2306.00934 [pdf, other]
Title: Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[53]  arXiv:2306.00766 [pdf, other]
Title: Impact of using a privacy model on smart buildings data for CO2 prediction
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2306.00674 [pdf]
Title: CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[55]  arXiv:2306.00623 [pdf, other]
Title: Physical Attacks on the Railway System
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2306.00610 [pdf, other]
Title: Spying on the Spy: Security Analysis of Hidden Cameras
Comments: 19 pages. Conference: NSS 2023: 17th International Conference on Network and System Security
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2306.00589 [pdf, other]
Title: ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships
Comments: 16 pages, 3 figures, IEEE Transactions on Technology and Society
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[58]  arXiv:2306.00553 [pdf, other]
Title: EduChain: A Blockchain-based Education Data Management System
Journal-ref: CBCC 2020. Communications in Computer and Information Science, vol 1305. Springer, Singapore
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[59]  arXiv:2306.00462 [pdf]
Title: Harnessing the Potential of Blockchain in DevOps: A Framework for Distributed Integration and Development
Comments: pages 10, figures 6
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2306.00419 [pdf, other]
Title: Challenges and Remedies to Privacy and Security in AIGC: Exploring the Potential of Privacy Computing, Blockchain, and Beyond
Comments: 43 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2306.00377 [pdf]
Title: Developing and Building Ontologies in Cyber Security
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[62]  arXiv:2306.00314 [pdf]
Title: Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach
Comments: 17 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[63]  arXiv:2306.00284 [pdf]
Title: Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Quantum Physics (quant-ph)
[64]  arXiv:2306.00234 [pdf, other]
Title: Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed
Comments: 7 pages, 10 figures, Conference paper, Accepted in publication for 2023 IEEE World AI IoT Congress (AIIoT)
Journal-ref: 2023 IEEE World AI IoT Congress (AIIoT) Conference
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2306.00136 [pdf]
Title: A Holistic Framework for Safeguarding of SMEs-A Case Study
Comments: A modified version of this work has been submitted to the Workshop IOSEC 2023 in the context of the 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN) and published in IEEE Xplore
Journal-ref: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 2023, pp. 1-5,
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2306.00133 [pdf, ps, other]
Title: A Note On Interpreting Canary Exposure
Comments: short note, edited to add a sentence on independence of canary losses, including adding Pillutla et al
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67]  arXiv:2306.00095 [pdf]
Title: Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System
Comments: 6 pages, 12 figures. Published in IEEE Global Communications Conference (GLOBECOM), 2022
Journal-ref: 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 6091-6096
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2306.00920 (cross-list from cs.LG) [pdf, other]
Title: Better Private Linear Regression Through Better Private Feature Selection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[69]  arXiv:2306.00816 (cross-list from cs.CV) [pdf, other]
Title: Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[70]  arXiv:2306.00794 (cross-list from cs.SD) [pdf, other]
Title: SlothSpeech: Denial-of-service Attack Against Speech Recognition Models
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[71]  arXiv:2306.00694 (cross-list from cs.SE) [pdf, other]
Title: UNGOML: Automated Classification of unsafe Usages in Go
Comments: 13 pages, accepted at the 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR 2023)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[72]  arXiv:2306.00687 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review
Comments: 38 pages, 11 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[73]  arXiv:2306.00578 (cross-list from cs.LG) [pdf, other]
Title: Does Black-box Attribute Inference Attacks on Graph Neural Networks Constitute Privacy Risk?
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[74]  arXiv:2306.00353 (cross-list from stat.ML) [pdf, other]
Title: Constructing Semantics-Aware Adversarial Examples with Probabilistic Perspective
Comments: 17 pages, 14 figures
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[75]  arXiv:2306.00308 (cross-list from cs.PL) [pdf, other]
Title: A Formal Model for Secure Multiparty Computation
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[ total of 121 entries: 1-50 | 26-75 | 76-121 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2306, contact, help  (Access key information)