Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for November 2021

Total of 338 entries : 1-50 151-200 201-250 251-300 301-338
Showing up to 50 entries per page: fewer | more | all
[301] arXiv:2111.09076 (cross-list from cs.LG) [pdf, other]
Title: To Trust or Not To Trust Prediction Scores for Membership Inference Attacks
Dominik Hintersdorf, Lukas Struppek, Kristian Kersting
Comments: 15 pages, 8 figures, 10 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[302] arXiv:2111.09085 (cross-list from cs.LG) [pdf, other]
Title: Network Generation with Differential Privacy
Xu Zheng, Nicholas McCarthy, Jer Hayes
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[303] arXiv:2111.09278 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Federated Learning on Heterogeneous Data
Maxence Noble, Aurélien Bellet, Aymeric Dieuleveut
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[304] arXiv:2111.09461 (cross-list from cs.AI) [pdf, other]
Title: Advancing COVID-19 Diagnosis with Privacy-Preserving Collaboration in Artificial Intelligence
Xiang Bai, Hanchen Wang, Liya Ma, Yongchao Xu, Jiefeng Gan, Ziwei Fan, Fan Yang, Ke Ma, Jiehua Yang, Song Bai, Chang Shu, Xinyu Zou, Renhao Huang, Changzheng Zhang, Xiaowu Liu, Dandan Tu, Chuou Xu, Wenqing Zhang, Xi Wang, Anguo Chen, Yu Zeng, Dehua Yang, Ming-Wei Wang, Nagaraj Holalkere, Neil J. Halin, Ihab R. Kamel, Jia Wu, Xuehua Peng, Xiang Wang, Jianbo Shao, Pattanasak Mongkolwat, Jianjun Zhang, Weiyang Liu, Michael Roberts, Zhongzhao Teng, Lucian Beer, Lorena Escudero Sanchez, Evis Sala, Daniel Rubin, Adrian Weller, Joan Lasenby, Chuangsheng Zheng, Jianming Wang, Zhen Li, Carola-Bibiane Schönlieb, Tian Xia
Comments: Nature Machine Intelligence
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[305] arXiv:2111.09506 (cross-list from quant-ph) [pdf, other]
Title: Certified Random Number Generation from Quantum Steering
Dominick J. Joch, Sergei Slussarenko, Yuanlong Wang, Alex Pepper, Shouyi Xie, Bin-Bin Xu, Ian R. Berkman, Sven Rogge, Geoff J. Pryde
Comments: 7 pages, 3 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Optics (physics.optics)
[306] arXiv:2111.09679 (cross-list from cs.LG) [pdf, other]
Title: Enhanced Membership Inference Attacks against Machine Learning Models
Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri
Comments: To appear at ACM CCS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[307] arXiv:2111.09999 (cross-list from cs.CV) [pdf, other]
Title: TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems
Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe
Comments: Accepted for publication in the IEEE Transactions on Information Forensics & Security (TIFS)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[308] arXiv:2111.10126 (cross-list from cs.IT) [pdf, other]
Title: On the Download Rate of Homomorphic Secret Sharing
Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[309] arXiv:2111.10130 (cross-list from cs.LG) [pdf, other]
Title: Fooling Adversarial Training with Inducing Noise
Zhirui Wang, Yifei Wang, Yisen Wang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[310] arXiv:2111.10167 (cross-list from cs.SE) [pdf, other]
Title: UEFI virtual machine firmware hardening through snapshots and attack surface reduction
Mikhail Krichanov, Vitaly Cheptsov
Comments: 7 pages, 2 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[311] arXiv:2111.10291 (cross-list from cs.LG) [pdf, other]
Title: Meta Adversarial Perturbations
Chia-Hung Yuan, Pin-Yu Chen, Chia-Mu Yu
Comments: Published in AAAI 2022 Workshop
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[312] arXiv:2111.10481 (cross-list from cs.CV) [pdf, other]
Title: PatchCensor: Patch Robustness Certification for Transformers via Exhaustive Testing
Yuheng Huang, Lei Ma, Yuanchun Li
Comments: This paper has been accepted by ACM Transactions on Software Engineering and Methodology (TOSEM'23) in "Continuous Special Section: AI and SE." Please include TOSEM for any citations
Journal-ref: ACM Trans. Softw. Eng. Methodol. (2023)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[313] arXiv:2111.10752 (cross-list from cs.LG) [pdf, other]
Title: Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability
Yifeng Xiong, Jiadong Lin, Min Zhang, John E. Hopcroft, Kun He
Comments: 11 pages, 6 figures, accepted by CVPR 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[314] arXiv:2111.10759 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model
Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai
Comments: 16 pages, 9 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[315] arXiv:2111.11056 (cross-list from cs.CV) [pdf, other]
Title: Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes
Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve
Comments: Accepted for publication in 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Workshop on ImageNet: Past,Present, and Future
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[316] arXiv:2111.11785 (cross-list from cs.AI) [pdf, other]
Title: Realistic simulation of users for IT systems in cyber ranges
Alexandre Dey (IRISA), Benjamin Costé, Éric Totel, Adrien Bécue
Comments: in French
Journal-ref: CAID 2021 : applications de l'Intelligence Artificielle aux probl{\'e}matiques d{\'e}fense, Nov 2021, Rennes, France
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[317] arXiv:2111.11867 (cross-list from quant-ph) [pdf, other]
Title: Quantum Analogue of Entropy Based DDoS Detection
Del Rajan
Comments: Revised version, 5 pages main text, 3 pages supplementary material
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[318] arXiv:2111.11870 (cross-list from cs.CV) [pdf, other]
Title: DBIA: Data-free Backdoor Injection Attack against Transformer Networks
Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[319] arXiv:2111.11924 (cross-list from cs.DC) [pdf, other]
Title: A Variant RSA Acceleration with Parallelization
Jun-jie Liu, Kang-Too Tsang, Yu-Hui Deng
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[320] arXiv:2111.12231 (cross-list from cs.CV) [pdf, other]
Title: Universal Deep Network for Steganalysis of Color Image based on Channel Representation
Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang
Comments: To be improved version
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[321] arXiv:2111.12364 (cross-list from cs.DC) [pdf, other]
Title: Crawling the MobileCoin Quorum System
Charmaine Ndolo, Sebastian Henningsen, Martin Florian
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[322] arXiv:2111.12786 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Nonparametric Regression Under a Growth Condition
Noah Golowich
Comments: 41 pages; appeared in COLT 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[323] arXiv:2111.12981 (cross-list from cs.DS) [pdf, other]
Title: Efficient Mean Estimation with Pure Differential Privacy via a Sum-of-Squares Exponential Mechanism
Samuel B. Hopkins, Gautam Kamath, Mahbod Majid
Comments: 66 pages, STOC 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[324] arXiv:2111.13038 (cross-list from cs.IT) [pdf, other]
Title: On the dimension and structure of the square of the dual of a Goppa code
Rocco Mora, Jean-Pierre Tillich
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[325] arXiv:2111.13213 (cross-list from cs.CV) [pdf, other]
Title: OTB-morph: One-Time Biometrics via Morphing applied to Face Templates
Mahdi Ghafourian, Julian Fierrez, Ruben Vera-Rodriguez, Ignacio Serna, Aythami Morales
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[326] arXiv:2111.13244 (cross-list from cs.CV) [pdf, other]
Title: Going Grayscale: The Road to Understanding and Improving Unlearnable Examples
Zhuoran Liu, Zhengyu Zhao, Alex Kolmus, Tijn Berns, Twan van Laarhoven, Tom Heskes, Martha Larson
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[327] arXiv:2111.13304 (cross-list from cs.CY) [pdf, other]
Title: Data Fusion Challenges Privacy: What Can Privacy Regulation Do?
Gábor Erdélyi, Olivia J. Erdélyi, Andreas W. Kempa-Liehr
Comments: 19 pages
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[328] arXiv:2111.13500 (cross-list from cs.DC) [pdf, other]
Title: A Trust and Reputation System for IoT Exploiting Distributed Ledger Technology
Seyed Amid Moeinzadeh Mirhosseini, Ali Fanian, T. Aaron Gulliver
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[329] arXiv:2111.13617 (cross-list from cs.LG) [pdf, other]
Title: DP-SGD vs PATE: Which Has Less Disparate Impact on GANs?
Georgi Ganev
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[330] arXiv:2111.13895 (cross-list from cs.LG) [pdf, other]
Title: Towards Understanding the Impact of Model Size on Differential Private Classification
Yinchen Shen, Zhiguo Wang, Ruoyu Sun, Xiaojing Shen
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[331] arXiv:2111.14564 (cross-list from cs.CV) [pdf, other]
Title: MedRDF: A Robust and Retrain-Less Diagnostic Framework for Medical Pretrained Models Against Adversarial Attack
Mengting Xu, Tao Zhang, Daoqiang Zhang
Comments: TMI under review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[332] arXiv:2111.14609 (cross-list from cs.LG) [pdf, other]
Title: An Investigation on Learning, Polluting, and Unlearning the Spam Emails for Lifelong Learning
Nishchal Parne, Kyathi Puppaala, Nithish Bhupathi, Ripon Patgiri
Comments: Submitted to Elsevier for possible publication
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[333] arXiv:2111.14683 (cross-list from cs.LG) [pdf, other]
Title: Anomaly Localization in Model Gradients Under Backdoor Attacks Against Federated Learning
Zeki Bilgin
Comments: 13 pages and the code is available
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[334] arXiv:2111.14838 (cross-list from cs.LG) [pdf, other]
Title: Evaluating Privacy-Preserving Machine Learning in Critical Infrastructures: A Case Study on Time-Series Classification
Dominique Mercier, Adriano Lucieri, Mohsin Munir, Andreas Dengel, Sheraz Ahmed
Comments: 9 pages, 4 figures. 6 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[335] arXiv:2111.14992 (cross-list from eess.SP) [pdf, other]
Title: Network Traffic Shaping for Enhancing Privacy in IoT Systems
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Comments: 18 pages, 10 figures, submitted to IEEE Transactions on Networking
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[336] arXiv:2111.15023 (cross-list from cs.IR) [pdf, other]
Title: Georacle: Enabling Geospatially Aware Smart Contracts
Taha Azzaoui
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[337] arXiv:2111.15031 (cross-list from cs.LG) [pdf, other]
Title: MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels
Robert J. Joyce, Dev Amlani, Charles Nicholas, Edward Raff
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[338] arXiv:2111.15521 (cross-list from cs.LG) [pdf, other]
Title: Node-Level Differentially Private Graph Neural Networks
Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal, Prateek Jain
Comments: 20 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
Total of 338 entries : 1-50 151-200 201-250 251-300 301-338
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack