Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for February 2023

Total of 370 entries : 1-50 ... 201-250 251-300 301-350 351-370
Showing up to 50 entries per page: fewer | more | all
[351] arXiv:2302.12959 (cross-list from cs.LG) [pdf, other]
Title: Chaotic Variational Auto encoder-based Adversarial Machine Learning
Pavan Venkata Sainadh Reddy, Yelleti Vivek, Gopi Pranay, Vadlamani Ravi
Comments: 24 pages, 6 figures and 5 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[352] arXiv:2302.13258 (cross-list from cs.DC) [pdf, other]
Title: Post Quantum Secure Blockchain-based Federated Learning for Mobile Edge Computing
Rongxin Xu, Shiva Raj Pokhrel, Qiujun Lan, Gang Li
Comments: 15 pages, 9 figures, 2 tables. Under Review
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[353] arXiv:2302.13286 (cross-list from cs.CV) [pdf, other]
Title: Benchmarking of Cancelable Biometrics for Deep Templates
Hatef Otroshi Shahreza, Pietro Melzi, Dailé Osorio-Roig, Christian Rathgeb, Christoph Busch, Sébastien Marcel, Ruben Tolosana, Ruben Vera-Rodriguez
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[354] arXiv:2302.13438 (cross-list from cs.LG) [pdf, other]
Title: P4L: Privacy Preserving Peer-to-Peer Learning for Infrastructureless Setups
Ioannis Arapakis, Panagiotis Papadopoulos, Kleomenis Katevas, Diego Perino
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[355] arXiv:2302.13464 (cross-list from cs.LG) [pdf, other]
Title: Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators
Keane Lucas, Matthew Jagielski, Florian Tramèr, Lujo Bauer, Nicholas Carlini
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[356] arXiv:2302.13567 (cross-list from cs.LG) [pdf, other]
Title: Towards Audit Requirements for AI-based Systems in Mobility Applications
Devi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider, Arndt von Twickel, Fabian Woitschek
Comments: To appear in Proceedings of the 9th International Conference on Information Systems Security and Privacy
Journal-ref: Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, pp. 339-348, 2023 , Lisbon, Portugal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[357] arXiv:2302.13585 (cross-list from cs.CY) [pdf, other]
Title: Before and after China's new Data Laws: Privacy in Apps
Konrad Kollnig, Lu Zhang, Jun Zhao, Nigel Shadbolt
Comments: Accepted for publication by the 7th Workshop on Technology and Consumer Protection (ConPro '23)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[358] arXiv:2302.13851 (cross-list from cs.LG) [pdf, other]
Title: Implicit Poisoning Attacks in Two-Agent Reinforcement Learning: Adversarial Policies for Training-Time Attacks
Mohammad Mohammadi, Jonathan Nöther, Debmalya Mandal, Adish Singla, Goran Radanovic
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[359] arXiv:2302.13861 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Diffusion Models Generate Useful Synthetic Images
Sahra Ghalebikesabi, Leonard Berrada, Sven Gowal, Ira Ktena, Robert Stanforth, Jamie Hayes, Soham De, Samuel L. Smith, Olivia Wiles, Borja Balle
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[360] arXiv:2302.13945 (cross-list from cs.LG) [pdf, other]
Title: On Differentially Private Federated Linear Contextual Bandits
Xingyu Zhou, Sayak Ray Chowdhury
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[361] arXiv:2302.13950 (cross-list from cs.CY) [pdf, other]
Title: Priorities for more effective tech regulation
Konrad Kollnig
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[362] arXiv:2302.14059 (cross-list from cs.LG) [pdf, other]
Title: Scalable Attribution of Adversarial Attacks via Multi-Task Learning
Zhongyi Guo, Keji Han, Yao Ge, Wei Ji, Yun Li
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[363] arXiv:2302.14099 (cross-list from cs.LG) [pdf, other]
Title: On Differentially Private Online Predictions
Haim Kaplan, Yishay Mansour, Shay Moran, Kobbi Nissim, Uri Stemmer
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[364] arXiv:2302.14154 (cross-list from cs.LG) [pdf, other]
Title: Near-Optimal Algorithms for Private Online Optimization in the Realizable Regime
Hilal Asi, Vitaly Feldman, Tomer Koren, Kunal Talwar
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[365] arXiv:2302.14349 (cross-list from quant-ph) [pdf, other]
Title: Advantages of Asynchronous Measurement-Device-Independent Quantum Key Distribution in Intercity Networks
Yuan-Mei Xie, Jun-Lin Bai, Yu-Shuo Lu, Chen-Xun Weng, Hua-Lei Yin, Zeng-Bing Chen
Comments: 15 pages, 4 figures
Journal-ref: Phys. Rev. Applied 19, 054070 (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[366] arXiv:2302.14514 (cross-list from math.OC) [pdf, other]
Title: Differentially Private Distributed Convex Optimization
Minseok Ryu, Kibaek Kim
Comments: arXiv admin note: text overlap with arXiv:2202.09409
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[367] arXiv:2302.14517 (cross-list from cs.LG) [pdf, other]
Title: Arbitrary Decisions are a Hidden Cost of Differentially Private Training
Bogdan Kulynych, Hsiang Hsu, Carmela Troncoso, Flavio P. Calmon
Comments: To appear in ACM FAccT 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (stat.ML)
[368] arXiv:2302.14615 (cross-list from math.OC) [pdf, html, other]
Title: Randomized Kaczmarz in Adversarial Distributed Setting
Longxiu Huang, Xia Li, Deanna Needell
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[369] arXiv:2302.14677 (cross-list from cs.CV) [pdf, other]
Title: Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger
Yi Yu, Yufei Wang, Wenhan Yang, Shijian Lu, Yap-peng Tan, Alex C. Kot
Comments: Accepted by CVPR 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[370] arXiv:2302.14860 (cross-list from quant-ph) [pdf, other]
Title: Revocable Cryptography from Learning with Errors
Prabhanjan Ananth, Alexander Poremba, Vinod Vaikuntanathan
Comments: 92 pages. Revised version. Proceedings of TCC 2023
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
Total of 370 entries : 1-50 ... 201-250 251-300 301-350 351-370
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack