Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2022

Total of 337 entries : 1-50 101-150 151-200 201-250 251-300 301-337
Showing up to 50 entries per page: fewer | more | all
[251] arXiv:2207.02337 (cross-list from cs.LG) [pdf, other]
Title: Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms
Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif
Comments: Accepted for publication in edited book titled "Federated and Transfer Learning", Springer, Cham
Journal-ref: Federated and Transfer Learning, Springer International Publishing, Cham, pp. 29-55, 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Distributed, Parallel, and Cluster Computing (cs.DC)
[252] arXiv:2207.02391 (cross-list from cs.CV) [pdf, other]
Title: Query-Efficient Adversarial Attack Based on Latin Hypercube Sampling
Dan Wang, Jiayu Lin, Yuan-Gen Wang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[253] arXiv:2207.02699 (cross-list from cs.LG) [pdf, other]
Title: Scaling Private Deep Learning with Low-Rank and Sparse Gradients
Ryuichi Ito, Seng Pei Liew, Tsubasa Takahashi, Yuya Sasaki, Makoto Onizuka
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[254] arXiv:2207.02794 (cross-list from cs.DS) [pdf, other]
Title: Private Matrix Approximation and Geometry of Unitary Orbits
Oren Mangoubi, Yikai Wu, Satyen Kale, Abhradeep Guha Thakurta, Nisheeth K. Vishnoi
Journal-ref: Proceedings of Thirty Fifth Conference on Learning Theory (COLT), PMLR 178:3547-3588, 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Metric Geometry (math.MG); Machine Learning (stat.ML)
[255] arXiv:2207.03202 (cross-list from cs.CY) [pdf, other]
Title: Privacy-Preserving Synthetic Educational Data Generation
Jill-Jênn Vie (SODA), Tomas Rigaux (SODA), Sein Minn (CEDAR)
Journal-ref: EC-TEL 2022, Sep 2022, Toulouse, France
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[256] arXiv:2207.03225 (cross-list from cs.SE) [pdf, other]
Title: Towards Immediate Feedback for Security Relevant Code in Development Environments
Markus Haug Ana Cristina Franco Da Silva, Stefan Wagner
Comments: submitted to the 16th Symposium and Summer School On Service-Oriented Computing 2022
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[257] arXiv:2207.03360 (cross-list from cs.LO) [pdf, other]
Title: On Session Typing, Probabilistic Polynomial Time, and Cryptographic Experiments (Long Version)
Ugo Dal Lago, Giulia Giusti
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[258] arXiv:2207.03445 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Stochastic Linear Bandits: (Almost) for Free
Osama A. Hanna, Antonious M. Girgis, Christina Fragouli, Suhas Diggavi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[259] arXiv:2207.03525 (cross-list from cs.DC) [pdf, other]
Title: Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform
Ryan Shivers, Mohammad Ashiqur Rahman, Md Jobair Hossain Faruk, Hossain Shahriar, Alfredo Cuzzocrea, Victor Clincy
Comments: arXiv admin note: substantial text overlap with arXiv:1910.00715
Journal-ref: 2021 IEEE International Conference on Big Data (Big Data)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Databases (cs.DB)
[260] arXiv:2207.03555 (cross-list from cs.HC) [pdf, other]
Title: Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework
Jiyoun Randolph, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Liang Zhao, Nazmus Sakib, Bilash Saha
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[261] arXiv:2207.03652 (cross-list from math.ST) [pdf, other]
Title: Private independence testing across two parties
Praneeth Vepakomma, Mohammad Mohammadi Amiri, Clément L. Canonne, Ramesh Raskar, Alex Pentland
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[262] arXiv:2207.03722 (cross-list from cs.DB) [pdf, other]
Title: Frequency-based Randomization for Guaranteeing Differential Privacy in Spatial Trajectories
Fengmei Jin, Wen Hua, Boyu Ruan, Xiaofang Zhou
Comments: 13 pages, 5 figures, 38th IEEE International Conference on Data Engineering (ICDE) 2022
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[263] arXiv:2207.03933 (cross-list from stat.ML) [pdf, other]
Title: A law of adversarial risk, interpolation, and label noise
Daniel Paleka, Amartya Sanyal
Comments: 22 pages, 8 figures. Accepted for ICLR 2023
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[264] arXiv:2207.04129 (cross-list from cs.LG) [pdf, other]
Title: How many perturbations break this model? Evaluating robustness beyond adversarial accuracy
Raphael Olivier, Bhiksha Raj
Journal-ref: Proceedings of the 40th International Conference on Machine Learning, PMLR 202:26583-26598, 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[265] arXiv:2207.04209 (cross-list from cs.LG) [pdf, other]
Title: Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[266] arXiv:2207.04380 (cross-list from cs.DS) [pdf, other]
Title: Connect the Dots: Tighter Discrete Approximations of Privacy Loss Distributions
Vadym Doroshenko, Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi
Comments: Appeared in Privacy Enhancing Technologies Symposium (PETS) 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[267] arXiv:2207.04381 (cross-list from cs.DS) [pdf, other]
Title: Faster Privacy Accounting via Evolving Discretization
Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi
Comments: Appeared in International Conference on Machine Learning (ICML) 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[268] arXiv:2207.04396 (cross-list from cs.LG) [pdf, other]
Title: Graph Generative Model for Benchmarking Graph Neural Networks
Minji Yoon, Yue Wu, John Palowitch, Bryan Perozzi, Ruslan Salakhutdinov
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[269] arXiv:2207.04497 (cross-list from cs.LG) [pdf, other]
Title: One-shot Neural Backdoor Erasing via Adversarial Weight Masking
Shuwen Chai, Jinghui Chen
Comments: Accepted by NeurIPS 2022 (19 pages, 6 figures, 10 tables)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[270] arXiv:2207.04521 (cross-list from cs.MM) [pdf, other]
Title: Information-Theoretic Bounds for Steganography in Multimedia
Hassan Y. El Arsh, Amr Abdelaziz, Ahmed Elliethy, Hussein A. Aly, T. Aaron Gulliver
Comments: arXiv admin note: substantial text overlap with arXiv:2111.04960
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[271] arXiv:2207.04686 (cross-list from cs.LG) [pdf, other]
Title: (Nearly) Optimal Private Linear Regression via Adaptive Clipping
Prateek Varshney, Abhradeep Thakurta, Prateek Jain
Comments: 41 Pages, Accepted in the 35th Annual Conference on Learning Theory (COLT 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[272] arXiv:2207.04809 (cross-list from cs.CV) [pdf, other]
Title: Fingerprint Liveness Detection Based on Quality Measures
Javier Galbally, Fernando Alonso-Fernandez, Julian Fierrez, Javier Ortega-Garcia
Comments: Published at IEEE International Conference on Biometrics, Identity and Security (BIdS). arXiv admin note: substantial text overlap with arXiv:2111.01898
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[273] arXiv:2207.04813 (cross-list from cs.CV) [pdf, other]
Title: On the vulnerability of fingerprint verification systems to fake fingerprint attacks
Javier Galbally, Julian Fierrez-Aguilar, Joaquin Rodriguez-Gonzalez, Fernando Alonso-Fernandez, Javier Ortega-Garcia, Marino Tapiador
Comments: Published at IEEE International Carnahan Conference on Security Technology (ICCST)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[274] arXiv:2207.04834 (cross-list from cs.SD) [pdf, other]
Title: Speaker Anonymization with Phonetic Intermediate Representations
Sarina Meyer, Florian Lux, Pavel Denisov, Julia Koch, Pascal Tilli, Ngoc Thang Vu
Comments: Accepted at Interspeech 2022
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[275] arXiv:2207.04895 (cross-list from cs.LG) [pdf, other]
Title: Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility
Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Statistics Theory (math.ST)
[276] arXiv:2207.05127 (cross-list from cs.LG) [pdf, other]
Title: RUSH: Robust Contrastive Learning via Randomized Smoothing
Yijiang Pang, Boyang Liu, Jiayu Zhou
Comments: incomplete validation, the defense strategy will fail when considering Expectation Over Test (EOT)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[277] arXiv:2207.05164 (cross-list from cs.LG) [pdf, other]
Title: Machine Learning Security in Industry: A Quantitative Survey
Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Battista Biggio, Katharina Krombholz
Comments: Accepted at TIFS, version with more detailed appendix containing more detailed statistical results. 17 pages, 6 tables and 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[278] arXiv:2207.05366 (cross-list from cs.CV) [pdf, other]
Title: Image and Model Transformation with Secret Key for Vision Transformer
Hitoshi Kiya, Ryota Iijima, MaungMaung Aprilpyone, Yuma Kinoshita
Comments: 10 pages, 5 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[279] arXiv:2207.05469 (cross-list from eess.AS) [pdf, other]
Title: End-to-end speech recognition modeling from de-identified data
Martin Flechl, Shou-Chun Yin, Junho Park, Peter Skala
Comments: Accepted to INTERSPEECH 2022
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD)
[280] arXiv:2207.05521 (cross-list from cs.LG) [pdf, other]
Title: Federated Unlearning: How to Efficiently Erase a Client in FL?
Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[281] arXiv:2207.05801 (cross-list from cs.LG) [pdf, other]
Title: RelaxLoss: Defending Membership Inference Attacks without Losing Utility
Dingfan Chen, Ning Yu, Mario Fritz
Comments: International Conference on Learning Representations (ICLR) 2022, 28 pages
Journal-ref: International Conference on Learning Representations 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[282] arXiv:2207.05810 (cross-list from cs.LG) [pdf, other]
Title: dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation
Sofiane Mahiou, Kai Xu, Georgi Ganev
Comments: Accepted at the Theory and Practice of Differential Privacy (TPDP) 2022, part of ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[283] arXiv:2207.05827 (cross-list from cs.LG) [pdf, html, other]
Title: Differentially Private Linear Bandits with Partial Distributed Feedback
Fengjiao Li, Xingyu Zhou, Bo Ji
Comments: 69 pages, this version is an extension from the preliminary one presented at IEEE/IFIP WiOpt 2022 and was accepted to IEEE Transactions on Network Science and Engineering (TNSE)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[284] arXiv:2207.05861 (cross-list from quant-ph) [pdf, other]
Title: A New Approach to Post-Quantum Non-Malleability
Xiao Liang, Omkant Pandey, Takashi Yamakawa
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[285] arXiv:2207.05937 (cross-list from cs.LG) [pdf, other]
Title: Game of Trojans: A Submodular Byzantine Approach
Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran
Comments: Submitted to GameSec 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[286] arXiv:2207.06154 (cross-list from cs.LG) [pdf, html, other]
Title: On the Robustness of Bayesian Neural Networks to Adversarial Attacks
Luca Bortolussi, Ginevra Carbone, Luca Laurenti, Andrea Patane, Guido Sanguinetti, Matthew Wicker
Comments: arXiv admin note: text overlap with arXiv:2002.04359
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[287] arXiv:2207.06271 (cross-list from cs.IT) [pdf, other]
Title: Secure Linear MDS Coded Matrix Inversion
Neophytos Charalambides, Mert Pilanci, Alfred Hero
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[288] arXiv:2207.06363 (cross-list from cs.IT) [pdf, other]
Title: Capacity Results for the Wiretapped Oblivious Transfer
Tianyou Pei, Wei Kang, Nan Liu
Comments: Submitted to IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[289] arXiv:2207.06819 (cross-list from cs.LG) [pdf, other]
Title: Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural Networks
Evan Caville, Wai Weng Lo, Siamak Layeghy, Marius Portmann
Comments: Accepted by Knowledge-Based Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[290] arXiv:2207.07209 (cross-list from cs.LG) [pdf, other]
Title: Sound Randomized Smoothing in Floating-Point Arithmetics
Václav Voráček, Matthias Hein
Comments: Accepted ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[291] arXiv:2207.07340 (cross-list from cs.CV) [pdf, other]
Title: DuetFace: Collaborative Privacy-Preserving Face Recognition via Channel Splitting in the Frequency Domain
Yuxi Mi, Yuge Huang, Jiazhen Ji, Hongquan Liu, Xingkun Xu, Shouhong Ding, Shuigeng Zhou
Comments: Accepted to ACM Multimedia 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[292] arXiv:2207.07444 (cross-list from quant-ph) [pdf, other]
Title: Federated Learning with Quantum Secure Aggregation
Yichi Zhang, Chao Zhang, Cai Zhang, Lixin Fan, Bei Zeng, Qiang Yang
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[293] arXiv:2207.07486 (cross-list from cs.NI) [pdf, other]
Title: Securing name resolution in the IoT: DNS over CoAP
Martine S. Lenders, Christian Amsüss, Cenk Gündogan, Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch
Comments: 25 pages, 15 figures, 6 tables; presented at CoNEXT 2023
Journal-ref: Proceedings of the ACM on Networking (PACMNET), Vol. 1, CoNEXT2, Article 6 (September 2023), 25 pages
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[294] arXiv:2207.07530 (cross-list from cs.CY) [pdf, html, other]
Title: Token-Based Payment Systems
Geoffrey Goodell
Comments: 8 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[295] arXiv:2207.07596 (cross-list from cs.CV) [pdf, other]
Title: Mobile Keystroke Biometrics Using Transformers
Giuseppe Stragapede, Paula Delgado-Santos, Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Aythami Morales
Comments: 6 pages, 6 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Signal Processing (eess.SP)
[296] arXiv:2207.07903 (cross-list from cs.IT) [pdf, other]
Title: Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network
Mir Shahnawaz Ahmed, Shahid Mehraj Shah
Comments: 18 Pages, 10 Figures, 6 Tables
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[297] arXiv:2207.07941 (cross-list from cs.LG) [pdf, other]
Title: MixTailor: Mixed Gradient Aggregation for Robust Learning Against Tailored Attacks
Ali Ramezani-Kebrya, Iman Tabrizian, Fartash Faghri, Petar Popovski
Comments: To appear at the Transactions on Machine Learning Research (TMLR)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[298] arXiv:2207.07972 (cross-list from cs.LG) [pdf, other]
Title: Certified Neural Network Watermarks with Randomized Smoothing
Arpit Bansal, Ping-yeh Chiang, Michael Curry, Rajiv Jain, Curtis Wigington, Varun Manjunatha, John P Dickerson, Tom Goldstein
Comments: ICML 2022
Journal-ref: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[299] arXiv:2207.08005 (cross-list from eess.SY) [pdf, other]
Title: Exploring The Resilience of Control Execution Skips against False Data Injection Attacks
Ipsita Koley, Sunandan Adhikary, Soumyajit Dey
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[300] arXiv:2207.08335 (cross-list from cs.DS) [pdf, other]
Title: Concurrent Composition Theorems for Differential Privacy
Salil Vadhan, Wanrong Zhang
Journal-ref: Proceedings of the 55th Annual ACM Symposium on Theory of Computing (STOC '23), June 20--23, 2023, Orlando, FL, USA
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Information Theory (cs.IT)
Total of 337 entries : 1-50 101-150 151-200 201-250 251-300 301-337
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack