We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 72

[ total of 123 entries: 1-25 | 23-47 | 48-72 | 73-97 | 98-122 | 123 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 6 Jun 2023 (showing first 25 of 33 entries)

[73]  arXiv:2306.03054 [pdf, other]
Title: Discriminative Adversarial Privacy: Balancing Accuracy and Membership Privacy in Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[74]  arXiv:2306.03013 [pdf, other]
Title: Hiding in Plain Sight: Disguising Data Stealing Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[75]  arXiv:2306.02895 [pdf, other]
Title: Evading Black-box Classifiers Without Breaking Eggs
Comments: Code at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[76]  arXiv:2306.02785 [pdf, other]
Title: Modular zk-Rollup On-Demand
Comments: url : this https URL
Journal-ref: Journal of Network and Computer Applications, 2023, 103678, ISSN 1084-8045,
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2306.02715 [pdf, other]
Title: Federated Deep Learning for Intrusion Detection in IoT Networks
Comments: 14 pages, 5 figues, 3 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[78]  arXiv:2306.02642 [pdf, other]
Title: Efficient Algorithms for Modeling SBoxes Using MILP
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2306.02612 [pdf]
Title: Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia
Comments: 8 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[80]  arXiv:2306.02473 [pdf, other]
Title: Anomaly Detection Techniques in Smart Grid Systems: A Review
Comments: 7 pages, 3 figures and conference paper (accepted for publication in 2023 IEEE World AI IOT Congress (AIIOT)
Journal-ref: 2023 IEEE World AI IOT Congress (AIIOT)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81]  arXiv:2306.02384 [pdf, other]
Title: Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2306.02378 [pdf, other]
Title: Encryption by using base-n systems with many characters
Authors: Armin Hoenen
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2306.02270 [pdf, other]
Title: Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2306.02256 [pdf, other]
Title: Less is More: Revisiting Gaussian Mechanism for Differential Privacy
Authors: Tianxi Ji, Pan Li
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2306.02131 [pdf, ps, other]
Title: Exploring the Environmental Benefits of In-Process Isolation for Software Resilience
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[86]  arXiv:2306.02111 [pdf, other]
Title: Simulating Noisy Quantum Circuits for Cryptographic Algorithms
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[87]  arXiv:2306.01996 [pdf, other]
Title: BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2306.01989 [pdf, other]
Title: Optimized Vectorization Implementation of CRYSTALS-Dilithium
Comments: 13 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2306.01983 [pdf]
Title: Mitigating Backdoor Attack Via Prerequisite Transformation
Authors: Han Gao
Comments: 7 pages,7 figures,2 tables
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[90]  arXiv:2306.01953 [pdf, other]
Title: Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[91]  arXiv:2306.01862 [pdf, other]
Title: Systemic Risk and Vulnerability Analysis of Multi-cloud Environments
Comments: 27 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2306.01809 [pdf, other]
Title: Adversarial Attack Based on Prediction-Correction
Comments: This manuscript was submitted to CVPR 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[93]  arXiv:2306.01762 [pdf, other]
Title: Pre-trained transformer for adversarial purification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[94]  arXiv:2306.01754 [pdf, other]
Title: Transformer-based Vulnerability Detection in Code at EditTime: Zero-shot, Few-shot, or Fine-tuning?
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[95]  arXiv:2306.01751 [pdf, ps, other]
Title: Differential Privacy with Random Projections and Sign Random Projections
Authors: Ping Li, Xiaoyun Li
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[96]  arXiv:2306.02677 (cross-list from cs.LG) [pdf, other]
Title: A Privacy-Preserving Federated Learning Approach for Kernel methods
Comments: Preprint version of the full paper with supplementary material
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[97]  arXiv:2306.02587 (cross-list from cs.LG) [pdf, other]
Title: Jammer classification with Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 123 entries: 1-25 | 23-47 | 48-72 | 73-97 | 98-122 | 123 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2306, contact, help  (Access key information)