Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2020

Total of 347 entries : 1-25 ... 226-250 251-275 276-300 301-325 326-347
Showing up to 25 entries per page: fewer | more | all
[301] arXiv:2010.10799 (cross-list from cs.IT) [pdf, other]
Title: Biometric Identification Systems With Noisy Enrollment for Gaussian Source
Vamoua Yachongka, Hideki Yagi, Yasutada Oohama
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[302] arXiv:2010.10981 (cross-list from cs.LG) [pdf, other]
Title: Amnesiac Machine Learning
Laura Graves, Vineel Nagisetty, Vijay Ganesh
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[303] arXiv:2010.10987 (cross-list from cs.LG) [pdf, other]
Title: Certified Distributional Robustness on Smoothed Classifiers
Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[304] arXiv:2010.10996 (cross-list from cs.LG) [pdf, other]
Title: GFL: A Decentralized Federated Learning Framework Based On Blockchain
Yifan Hu, Yuhang Zhou, Jun Xiao, Chao Wu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[305] arXiv:2010.11082 (cross-list from cs.LG) [pdf, other]
Title: On Differentially Private Stochastic Convex Optimization with Heavy-tailed Data
Di Wang, Hanshen Xiao, Srini Devadas, Jinhui Xu
Comments: Published in ICML 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[306] arXiv:2010.11186 (cross-list from quant-ph) [pdf, other]
Title: Secure Software Leasing from Standard Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
Comments: 40 pages. Fixed minor issues in Sec 1.5 and 3.2
Journal-ref: Theory of Cryptography - 9th International Conference, TCC 2021, Proceedings, Part I, LNCS 13042, page 31-61
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[307] arXiv:2010.11352 (cross-list from cs.SD) [pdf, other]
Title: Class-Conditional Defense GAN Against End-to-End Speech Attacks
Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich
Comments: 5 pages
Journal-ref: 46th IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP), 2021
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[308] arXiv:2010.11425 (cross-list from cs.LG) [pdf, other]
Title: Differentially-Private Federated Linear Bandits
Abhimanyu Dubey, Alex Pentland
Comments: 22 pages. Camera-ready for NeurIPS 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Machine Learning (stat.ML)
[309] arXiv:2010.11463 (cross-list from cs.LG) [pdf, other]
Title: MixCon: Adjusting the Separability of Data Representations for Harder Data Recovery
Xiaoxiao Li, Yangsibo Huang, Binghui Peng, Zhao Song, Kai Li
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[310] arXiv:2010.11658 (cross-list from quant-ph) [pdf, other]
Title: On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
Kai-Min Chung, Serge Fehr, Yu-Hsuan Huang, Tai-Ning Liao
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[311] arXiv:2010.11722 (cross-list from cs.RO) [pdf, other]
Title: Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles
Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Comments: 16 pages, 9 figures, paper accepted for the presentation at the Transportation Research Board 100th Annual Meeting
Journal-ref: Transportation Research Board 100th Annual Meeting - 2021
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[312] arXiv:2010.11754 (cross-list from cs.CC) [pdf, other]
Title: Separation Results for Boolean Function Classes
Aniruddha Biswas, Palash Sarkar
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[313] arXiv:2010.11782 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Binary Image Recognition Systems
Eric Balkanski, Harrison Chase, Kojin Oshiba, Alexander Rilee, Yaron Singer, Richard Wang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[314] arXiv:2010.11947 (cross-list from cs.CL) [pdf, other]
Title: A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric
Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier
Comments: 11 pages, 7 figures
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[315] arXiv:2010.12026 (cross-list from cs.CY) [pdf, other]
Title: "Healthy surveillance": Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Niklas Kühl, Dominik Martin, Clemens Wolff, Melanie Volkamer
Comments: 54th Annual Hawaii International Conference on System Sciences (HICSS-54)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[316] arXiv:2010.12080 (cross-list from cs.LG) [pdf, other]
Title: Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Edward Raff, Bobby Filar, James Holt
Comments: to appear in IEEE International Conference on Data Mining Workshop (ICDM) on Deep Learning for Cyber Threat Intelligence (DL-CTI)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[317] arXiv:2010.12280 (cross-list from cs.GT) [pdf, other]
Title: Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts
Z. Motaqy, G. Almashaqbeh, B. Bahrak, N.Yazdani
Comments: Final Version
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[318] arXiv:2010.12415 (cross-list from econ.GN) [pdf, other]
Title: Exploring investor behavior in Bitcoin: a study of the disposition effect
Jürgen E. Schatzmann, Bernhard Haslhofer
Journal-ref: Digit Finance (2023)
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); General Finance (q-fin.GN)
[319] arXiv:2010.12640 (cross-list from cs.LG) [pdf, other]
Title: Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning
ibrahim Yilmaz, Ambareen Siraj
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[320] arXiv:2010.12751 (cross-list from cs.LG) [pdf, other]
Title: Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan
Comments: This paper has been published in the 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[321] arXiv:2010.12799 (cross-list from cs.LG) [pdf, other]
Title: Private Outsourced Bayesian Optimization
Dmitrii Kharkovskii, Zhongxiang Dai, Bryan Kian Hsiang Low
Comments: 37th International Conference on Machine Learning (ICML 2020), Extended version with proofs, 27 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[322] arXiv:2010.12809 (cross-list from cs.SD) [pdf, other]
Title: Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations
Yael Mathov, Tal Ben Senior, Asaf Shabtai, Yuval Elovici
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[323] arXiv:2010.12816 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Online Submodular Maximization
Sebastian Perez-Salazar, Rachel Cummings
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[324] arXiv:2010.12980 (cross-list from cs.SE) [pdf, other]
Title: A Blockchain based and GDPR-compliant design of a system for digital education certificates
Fernanda Molina, Gustavo Betarte, Carlos Luna
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[325] arXiv:2010.12981 (cross-list from cs.NI) [pdf, other]
Title: The Benefits of Deploying Smart Contracts on Trusted Third Parties
Carlos Molina-Jimenez, Ioannis Sfyrakis, Linmao Song, Hazem Danny Al Nakib, Jon Crowcroft
Comments: The document consists of 14 pages and includes four figures, one table and 76 references. It the work of five authors. Carlos Molina-Jimenez is the corresponding and responsible author
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
Total of 347 entries : 1-25 ... 226-250 251-275 276-300 301-325 326-347
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack