We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 40

[ total of 117 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | ... | 111-117 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 6 Jun 2023 (continued, showing 10 of 33 entries)

[41]  arXiv:2306.01762 [pdf, other]
Title: Pre-trained transformer for adversarial purification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[42]  arXiv:2306.01754 [pdf, other]
Title: Transformer-based Vulnerability Detection in Code at EditTime: Zero-shot, Few-shot, or Fine-tuning?
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[43]  arXiv:2306.01751 [pdf, ps, other]
Title: Differential Privacy with Random Projections and Sign Random Projections
Authors: Ping Li, Xiaoyun Li
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[44]  arXiv:2306.02677 (cross-list from cs.LG) [pdf, other]
Title: A Privacy-Preserving Federated Learning Approach for Kernel methods
Comments: Preprint version of the full paper with supplementary material
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[45]  arXiv:2306.02587 (cross-list from cs.LG) [pdf, other]
Title: Jammer classification with Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[46]  arXiv:2306.02563 (cross-list from cs.LG) [pdf, other]
Title: Large-Scale Distributed Learning via Private On-Device Locality-Sensitive Hashing
Comments: 18 pages, 10 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[47]  arXiv:2306.02496 (cross-list from cs.DC) [pdf, other]
Title: Hawk: DevOps-driven Transparency and Accountability in Cloud Native Systems
Comments: preprint, accepted for the 16th IEEE International Conference on Cloud Computing 2023, IEEE Cloud 2023
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[48]  arXiv:2306.02487 (cross-list from cs.AI) [pdf, other]
Title: Discussion Paper: The Threat of Real Time Deepfakes
Journal-ref: FRANKOVITS, Guy; YISROEL, Mirsky. Discussion Paper: The Threat of Real Time Deepfakes. In: Proceedings of the 2st Workshop on Security Implications of Deepfakes and Cheapfakes. 2023
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[49]  arXiv:2306.02368 (cross-list from cs.LG) [pdf, other]
Title: Revisiting Data-Free Knowledge Distillation with Poisoned Teachers
Comments: Accepted to ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[50]  arXiv:2306.02179 (cross-list from cs.GT) [pdf, other]
Title: Buying Time: Latency Racing vs. Bidding in Fair Transaction Ordering
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[ total of 117 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | 61-70 | 71-80 | ... | 111-117 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2306, contact, help  (Access key information)