Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for May 2021

Total of 366 entries : 1-50 ... 201-250 251-300 301-350 351-366
Showing up to 50 entries per page: fewer | more | all
[351] arXiv:2105.13530 (cross-list from cs.LG) [pdf, other]
Title: A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers
Xi Li, David J. Miller, Zhen Xiang, George Kesidis
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[352] arXiv:2105.13637 (cross-list from cs.LG) [pdf, html, other]
Title: The Power of Sampling: Dimension-free Risk Bounds in Private ERM
Yin Tat Lee, Daogao Liu, Zhou Lu
Comments: We add the dimension-independent upper bounds results
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[353] arXiv:2105.13678 (cross-list from quant-ph) [pdf, other]
Title: An efficient hybrid hash based privacy amplification algorithm for quantum key distribution
Yan Bingze, Li Qiong, Mao Haokun, Chen Nan
Comments: 14 pages, 4 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[354] arXiv:2105.14295 (cross-list from cs.AR) [pdf, other]
Title: ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels
Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[355] arXiv:2105.14357 (cross-list from cs.CL) [pdf, other]
Title: Constructing Flow Graphs from Procedural Cybersecurity Texts
Kuntal Kumar Pal, Kazuaki Kashihara, Pratyay Banerjee, Swaroop Mishra, Ruoyu Wang, Chitta Baral
Comments: 13 pages, 5 pages, accepted in the Findings of ACL 2021
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[356] arXiv:2105.14638 (cross-list from cs.CV) [pdf, other]
Title: DAAIN: Detection of Anomalous and Adversarial Input using Normalizing Flows
Samuel von Baußnern, Johannes Otterbach, Adrian Loy, Mathieu Salzmann, Thomas Wollmann
Comments: 14 pages, 4 figures, 4 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[357] arXiv:2105.14644 (cross-list from cs.LG) [pdf, other]
Title: Generating Adversarial Examples with Graph Neural Networks
Florian Jaeckle, M. Pawan Kumar
Comments: To be published in UAI 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[358] arXiv:2105.14695 (cross-list from cs.DS) [pdf, other]
Title: Halt Properties and Complexity Evaluations for Optimal DeepLLL Algorithm Families
Takuto Odagawa, Koji Nuida
Comments: 20 pages; (v2) Abstract slightly revised
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[359] arXiv:2105.14756 (cross-list from cs.CV) [pdf, other]
Title: A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access
AprilPyone MaungMaung, Hitoshi Kiya
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[360] arXiv:2105.14785 (cross-list from cs.LG) [pdf, other]
Title: Two Coupled Rejection Metrics Can Tell Adversarial Examples Apart
Tianyu Pang, Huishuai Zhang, Di He, Yinpeng Dong, Hang Su, Wei Chen, Jun Zhu, Tie-Yan Liu
Comments: CVPR 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[361] arXiv:2105.14803 (cross-list from cs.LG) [pdf, other]
Title: Gradient-based Data Subversion Attack Against Binary Classifiers
Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha
Comments: 26 pages, 3 Figures, 8 tables, adversarial attacks, data poisoning attacks, label contamination, transferability of attack, susceptibility
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[362] arXiv:2105.14988 (cross-list from math.CO) [pdf, other]
Title: Asymmetric All-or-nothing Transforms
Navid Nasr Esfahani, Douglas R. Stinson
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR)
[363] arXiv:2105.15007 (cross-list from cs.DS) [pdf, other]
Title: Locally Private $k$-Means Clustering with Constant Multiplicative Approximation and Near-Optimal Additive Error
Anamay Chaturvedi, Matthew Jones, Huy L. Nguyen
Comments: 61 pages
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[364] arXiv:2105.15010 (cross-list from cs.LG) [pdf, other]
Title: Query Attack by Multi-Identity Surrogates
Sizhe Chen, Zhehao Huang, Qinghua Tao, Xiaolin Huang
Comments: IEEE TRANSACTIONS ON ARTIFICIAL INTELLIGENCE
Journal-ref: IEEE TRANSACTIONS ON ARTIFICIAL INTELLIGENCE, 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[365] arXiv:2105.15035 (cross-list from cs.LG) [pdf, other]
Title: Machine Learning for Security in Vehicular Networks: A Comprehensive Survey
Anum Talpur, Mohan Gurusamy
Comments: Submitted in IEEE Communications Surveys & Tutorials
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[366] arXiv:2105.15057 (cross-list from cs.LG) [pdf, other]
Title: Dominant Patterns: Critical Features Hidden in Deep Neural Networks
Zhixing Ye, Shaofei Qin, Sizhe Chen, Xiaolin Huang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
Total of 366 entries : 1-50 ... 201-250 251-300 301-350 351-366
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack