We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 37

[ total of 110 entries: 1-25 | 13-37 | 38-62 | 63-87 | 88-110 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 29 May 2023 (continued, showing last 11 of 24 entries)

[38]  arXiv:2305.17000 (cross-list from cs.SD) [pdf, other]
Title: Leveraging characteristics of the output probability distribution for identifying adversarial audio examples
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[39]  arXiv:2305.16934 (cross-list from cs.CV) [pdf, other]
Title: On Evaluating Adversarial Robustness of Large Vision-Language Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[40]  arXiv:2305.16893 (cross-list from cs.DC) [pdf, other]
Title: CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[41]  arXiv:2305.16883 (cross-list from cs.AI) [pdf, other]
Title: Argumentation Schemes for Blockchain Deanonymization
Comments: Presented at Sixteenth International Workshop on Juris-informatics (JURISIN 2022), Kyoto, Japan, June 13-14, 2022
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[42]  arXiv:2305.16868 (cross-list from cs.NI) [pdf, other]
Title: Location-aware Verification for Autonomous Truck Platooning Based on Blockchain and Zero-knowledge Proof
Comments: Published in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). arXiv admin note: text overlap with arXiv:2010.14037
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[43]  arXiv:2305.16793 (cross-list from cs.GT) [pdf, other]
Title: Incentive Mechanism for Uncertain Tasks under Differential Privacy
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[44]  arXiv:2305.16771 (cross-list from math.ST) [pdf, other]
Title: Robust Nonparametric Regression under Poisoning Attack
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2305.16615 (cross-list from cs.SE) [pdf, other]
Title: AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities
Comments: 34 pages, Accepted at Empirical Software Engineering Journal
Journal-ref: Empirical Software Engineering (EMSE), 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[46]  arXiv:2305.16544 (cross-list from cs.LG) [pdf, other]
Title: Inductive detection of Influence Operations via Graph Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[47]  arXiv:2305.16541 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy-aware Gaussian Process Regression
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[48]  arXiv:2305.16474 (cross-list from cs.LG) [pdf, other]
Title: FairDP: Certified Fairness with Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)

Fri, 26 May 2023 (showing first 14 of 18 entries)

[49]  arXiv:2305.16251 [pdf, other]
Title: A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[50]  arXiv:2305.16135 [pdf, ps, other]
Title: Ring Signature from Bonsai Tree: How to Preserve the Long-Term Anonymity
Authors: Mingxing Hu
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2305.15999 [pdf, other]
Title: An Overview of FPGA-inspired Obfuscation Techniques
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[52]  arXiv:2305.15986 [pdf, other]
Title: ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2305.15772 [pdf, other]
Title: Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem
Comments: accepted in COMPSAC 2023 Workshop DSML: The 1st IEEE International Workshop on Data Science & Machine Learning for Cybersecurity, IoT & Digital Forensics
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2305.15697 [pdf, other]
Title: Privacy Protectability: An Information-theoretical Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multimedia (cs.MM)
[55]  arXiv:2305.15488 [pdf, other]
Title: Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks
Comments: 10 pages, 6 tables, 2 figures. Preprint, under review
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2305.16202 (cross-list from cs.LG) [pdf, other]
Title: DP-SGD Without Clipping: The Lipschitz Neural Network Way
Comments: 39 pages, preprint
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[57]  arXiv:2305.16120 (cross-list from cs.SE) [pdf, other]
Title: An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[58]  arXiv:2305.16035 (cross-list from cs.LG) [pdf, other]
Title: Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score
Comments: Accepted at ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[59]  arXiv:2305.15894 (cross-list from cs.CL) [pdf]
Title: Private Meeting Summarization Without Performance Loss
Comments: SIGIR23 Main conference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[60]  arXiv:2305.15792 (cross-list from cs.LG) [pdf, other]
Title: IDEA: Invariant Causal Defense for Graph Adversarial Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[61]  arXiv:2305.15759 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Latent Diffusion Models
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2305.15723 (cross-list from cs.LG) [pdf, other]
Title: Learning across Data Owners with Joint Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[ total of 110 entries: 1-25 | 13-37 | 38-62 | 63-87 | 88-110 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2305, contact, help  (Access key information)