We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 52

[ total of 73 entries: 1-25 | 3-27 | 28-52 | 53-73 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 17 Mar 2023 (continued, showing last 15 of 18 entries)

[53]  arXiv:2303.09079 [pdf, other]
Title: SSL-Cleanse: Trojan Detection and Mitigation in Self-Supervised Learning
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[54]  arXiv:2303.09043 [pdf, ps, other]
Title: HE is all you need: Compressing FHE Ciphertexts using Additive HE
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2303.09024 [pdf, other]
Title: DeeBBAA: A benchmark Deep Black Box Adversarial Attack against Cyber-Physical Power Systems
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[56]  arXiv:2303.09008 [pdf, other]
Title: Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps
Comments: Accepted at the Web Conference 2023
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2303.08973 [pdf, other]
Title: Cryptographic Primitives based on Compact Knapsack Problem
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2303.08886 [pdf, other]
Title: vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash
Comments: 8 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2303.08882 [pdf, ps, other]
Title: Generic Decoding of Restricted Errors
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[60]  arXiv:2303.09527 (cross-list from cs.IR) [pdf, other]
Title: Fairness-aware Differentially Private Collaborative Filtering
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:2303.09289 (cross-list from cs.LG) [pdf, other]
Title: Image Classifiers Leak Sensitive Attributes About Their Classes
Comments: 40 pages, 32 figures, 4 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[62]  arXiv:2303.09272 (cross-list from cs.LG) [pdf, other]
Title: Copyright Protection and Accountability of Generative AI:Attack, Watermarking and Attribution
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[63]  arXiv:2303.09051 (cross-list from cs.CV) [pdf, other]
Title: Robust Evaluation of Diffusion-Based Adversarial Purification
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2303.09045 (cross-list from cs.LG) [pdf]
Title: Web and Mobile Platforms for Managing Elections based on IoT And Machine Learning Algorithms
Journal-ref: International Journal of Engineering Applied Sciences and Technology, 2022, Vol 7, No 7, 29-35
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[65]  arXiv:2303.08956 (cross-list from cs.AI) [pdf]
Title: Exploring the Relevance of Data Privacy-Enhancing Technologies for AI Governance Use Cases
Comments: arXiv admin note: text overlap with arXiv:2012.08347
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[66]  arXiv:2303.08944 (cross-list from cs.LG) [pdf, other]
Title: Certifiable (Multi)Robustness Against Patch Attacks Using ERM
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[67]  arXiv:2303.08865 (cross-list from quant-ph) [pdf, other]
Title: Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority
Comments: 27+10 pages, 5 figures. This work supersedes arXiv:2102.12949
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)

Thu, 16 Mar 2023

[68]  arXiv:2303.08432 [pdf, other]
Title: Verifiable encodings in multigroup fully homomorphic encryption
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2303.08221 [pdf, other]
Title: Compact and Divisible E-Cash with Threshold Issuance
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2303.08676 (cross-list from quant-ph) [pdf, ps, other]
Title: Publicly-Verifiable Deletion via Target-Collapsing Functions
Comments: 52 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[71]  arXiv:2303.08544 (cross-list from cs.GT) [pdf, other]
Title: Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems
Comments: 12 pages, 8 figures
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[72]  arXiv:2303.08500 (cross-list from cs.LG) [pdf, other]
Title: The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73]  arXiv:2303.08355 (cross-list from cs.LG) [pdf, other]
Title: Efficient and Secure Federated Learning for Financial Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 73 entries: 1-25 | 3-27 | 28-52 | 53-73 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)