Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for May 2023

Total of 463 entries : 1-50 ... 251-300 301-350 351-400 401-450 451-463
Showing up to 50 entries per page: fewer | more | all
[401] arXiv:2305.15071 (cross-list from cs.IT) [pdf, other]
Title: Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions
Yue Cao, Sifan Li, Chenchen Lv, Di Wang, Hongjian Sun, Jing Jiang, Fanlin Meng, Lexi Xu, Xinzhou Cheng
Comments: 34 pages, 6 figures, accepted by journal Renewable and Sustainable Energy Reviews
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[402] arXiv:2305.15148 (cross-list from cs.LG) [pdf, other]
Title: Theoretically Principled Federated Learning for Balancing Privacy and Utility
Xiaojin Zhang, Wenjie Li, Kai Chen, Shutao Xia, Qiang Yang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[403] arXiv:2305.15165 (cross-list from cs.LG) [pdf, other]
Title: Personalized DP-SGD using Sampling Mechanisms
Geon Heo, Junseok Seo, Steven Euijong Whang
Comments: 10 pages, 5 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[404] arXiv:2305.15203 (cross-list from cs.LG) [pdf, html, other]
Title: Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias
Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi
Comments: Accepted at IJCNN 2025
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[405] arXiv:2305.15241 (cross-list from cs.CV) [pdf, html, other]
Title: Robust Classification via a Single Diffusion Model
Huanran Chen, Yinpeng Dong, Zhengyi Wang, Xiao Yang, Chengqi Duan, Hang Su, Jun Zhu
Comments: Accepted by ICML 2024
Journal-ref: ICML 2024
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[406] arXiv:2305.15394 (cross-list from cs.LG) [pdf, other]
Title: Differentially-Private Decision Trees and Provable Robustness to Data Poisoning
Daniël Vos, Jelle Vos, Tianyu Li, Zekeriya Erkin, Sicco Verwer
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[407] arXiv:2305.15452 (cross-list from cs.LG) [pdf, other]
Title: Adaptive Data Analysis in a Balanced Adversarial Model
Kobbi Nissim, Uri Stemmer, Eliad Tsfadia
Comments: Accepted to NeurIPS 2023 (Spotlight)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[408] arXiv:2305.15538 (cross-list from cs.LG) [pdf, other]
Title: Post-processing Private Synthetic Data for Improving Utility on Selected Measures
Hao Wang, Shivchander Sudalairaj, John Henning, Kristjan Greenewald, Akash Srivastava
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Databases (cs.DB); Information Theory (cs.IT)
[409] arXiv:2305.15560 (cross-list from cs.CV) [pdf, html, other]
Title: Differentially Private Synthetic Data via Foundation Model APIs 1: Images
Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Harsha Nori, Sergey Yekhanin
Comments: Published in ICLR 2024
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[410] arXiv:2305.15594 (cross-list from cs.LG) [pdf, other]
Title: Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models
Haonan Duan, Adam Dziedzic, Nicolas Papernot, Franziska Boenisch
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[411] arXiv:2305.15723 (cross-list from cs.LG) [pdf, other]
Title: Learning across Data Owners with Joint Differential Privacy
Yangsibo Huang, Haotian Jiang, Daogao Liu, Mohammad Mahdian, Jieming Mao, Vahab Mirrokni
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[412] arXiv:2305.15759 (cross-list from stat.ML) [pdf, html, other]
Title: DP-LDMs: Differentially Private Latent Diffusion Models
Michael F. Liu, Saiyue Lyu, Margarita Vinaroz, Mijung Park
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[413] arXiv:2305.15792 (cross-list from cs.LG) [pdf, html, other]
Title: IDEA: Invariant Defense for Graph Adversarial Robustness
Shuchang Tao, Qi Cao, Huawei Shen, Yunfan Wu, Bingbing Xu, Xueqi Cheng
Comments: Submitted to Information Sciences
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[414] arXiv:2305.15829 (cross-list from cs.SE) [pdf, other]
Title: Definition and Detection of Defects in NFT Smart Contracts
Shuo Yang, Jiachi Chen, Zibin Zheng
Comments: Accepted by ISSTA 2023
Journal-ref: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, USA, Jul. 2023, pp. 373-384
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[415] arXiv:2305.15894 (cross-list from cs.CL) [pdf, other]
Title: Private Meeting Summarization Without Performance Loss
Seolhwa Lee, Anders Søgaard
Comments: SIGIR23 Main conference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[416] arXiv:2305.16035 (cross-list from cs.LG) [pdf, other]
Title: Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score
Shuhai Zhang, Feng Liu, Jiahao Yang, Yifan Yang, Changsheng Li, Bo Han, Mingkui Tan
Comments: Accepted at ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[417] arXiv:2305.16120 (cross-list from cs.SE) [pdf, other]
Title: An Empirical Study on Workflows and Security Policies in Popular GitHub Repositories
Jessy Ayala, Joshua Garcia
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[418] arXiv:2305.16202 (cross-list from cs.LG) [pdf, html, other]
Title: DP-SGD Without Clipping: The Lipschitz Neural Network Way
Louis Bethune, Thomas Massena, Thibaut Boissin, Yannick Prudent, Corentin Friedrich, Franck Mamalet, Aurelien Bellet, Mathieu Serrurier, David Vigouroux
Comments: 46 pages, published at International Conferences on Learning Representations (ICLR), 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[419] arXiv:2305.16474 (cross-list from cs.LG) [pdf, html, other]
Title: FairDP: Certified Fairness with Differential Privacy
Khang Tran, Ferdinando Fioretto, Issa Khalil, My T. Thai, Linh Thi Xuan Phan NhatHai Phan
Comments: Accepted at 3rd IEEE Conference on Secure and Trustworthy Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[420] arXiv:2305.16541 (cross-list from cs.LG) [pdf, other]
Title: Privacy-aware Gaussian Process Regression
Rui Tuo, Raktim Bhattacharya
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[421] arXiv:2305.16544 (cross-list from cs.LG) [pdf, other]
Title: Inductive detection of Influence Operations via Graph Learning
Nicholas A. Gabriel, David A. Broniatowski, Neil F. Johnson
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[422] arXiv:2305.16615 (cross-list from cs.SE) [pdf, other]
Title: AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities
Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Yuki Kume, Van Nguyen, Dinh Phung, John Grundy
Comments: 34 pages, Accepted at Empirical Software Engineering Journal
Journal-ref: Empirical Software Engineering (EMSE), 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[423] arXiv:2305.16771 (cross-list from math.ST) [pdf, other]
Title: Robust Nonparametric Regression under Poisoning Attack
Puning Zhao, Zhiguo Wan
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[424] arXiv:2305.16793 (cross-list from cs.GT) [pdf, html, other]
Title: Incentive Mechanism for Uncertain Tasks under Differential Privacy
Xikun Jiang, Chenhao Ying, Lei Li, Boris Düdder, Haiqin Wu, Haiming Jin, Yuan Luo
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[425] arXiv:2305.16868 (cross-list from cs.NI) [pdf, other]
Title: Location-aware Verification for Autonomous Truck Platooning Based on Blockchain and Zero-knowledge Proof
Wanxin Li, Collin Meese, Zijia Zhong, Hao Guo, Mark Nejad
Comments: Published in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). arXiv admin note: text overlap with arXiv:2010.14037
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[426] arXiv:2305.16883 (cross-list from cs.AI) [pdf, other]
Title: Argumentation Schemes for Blockchain Deanonymization
Dominic Deuber, Jan Gruber, Merlin Humml, Viktoria Ronge, Nicole Scheler
Comments: Presented at Sixteenth International Workshop on Juris-informatics (JURISIN 2022), Kyoto, Japan, June 13-14, 2022
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[427] arXiv:2305.16893 (cross-list from cs.DC) [pdf, other]
Title: CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain
Ivan Homoliak, Martin Perešíni, Patrik Holop, Jakub Handzuš, Fran Casino
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[428] arXiv:2305.16934 (cross-list from cs.CV) [pdf, other]
Title: On Evaluating Adversarial Robustness of Large Vision-Language Models
Yunqing Zhao, Tianyu Pang, Chao Du, Xiao Yang, Chongxuan Li, Ngai-Man Cheung, Min Lin
Comments: NeurIPS 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[429] arXiv:2305.17000 (cross-list from cs.SD) [pdf, html, other]
Title: DistriBlock: Identifying adversarial audio samples by leveraging characteristics of the output distribution
Matías Pizarro, Dorothea Kolossa, Asja Fischer
Comments: Available at: this https URL
Journal-ref: Proceedings of the Fortieth Conference on Uncertainty in Artificial Intelligence, PMLR 244:2956-2988, 2024
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[430] arXiv:2305.17071 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Online Learning to Rank with Click Feedback
Jinhang Zuo, Zhiyao Zhang, Zhiyong Wang, Shuai Li, Mohammad Hajiesmaili, Adam Wierman
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[431] arXiv:2305.17148 (cross-list from cs.LG) [pdf, html, other]
Title: Differentially Private Low-dimensional Synthetic Data from High-dimensional Datasets
Yiyun He, Thomas Strohmer, Roman Vershynin, Yizhe Zhu
Comments: 23 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Probability (math.PR); Statistics Theory (math.ST)
[432] arXiv:2305.17438 (cross-list from cs.CV) [pdf, html, other]
Title: On the Importance of Backbone to the Adversarial Robustness of Object Detectors
Xiao Li, Hang Chen, Xiaolin Hu
Comments: Accepted by IEEE TIFS
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[433] arXiv:2305.17444 (cross-list from cs.AI) [pdf, other]
Title: Query-Efficient Black-Box Red Teaming via Bayesian Optimization
Deokjae Lee, JunYeong Lee, Jung-Woo Ha, Jin-Hwa Kim, Sang-Woo Lee, Hwaran Lee, Hyun Oh Song
Comments: ACL 2023 Long Paper - Main Conference
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[434] arXiv:2305.17493 (cross-list from cs.LG) [pdf, html, other]
Title: The Curse of Recursion: Training on Generated Data Makes Models Forget
Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Yarin Gal, Nicolas Papernot, Ross Anderson
Comments: Fixed typos in eqn 4,5
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[435] arXiv:2305.17634 (cross-list from cs.DS) [pdf, other]
Title: Pure-DP Aggregation in the Shuffle Model: Error-Optimal and Communication-Efficient
Badih Ghazi, Ravi Kumar, Pasin Manurangsi
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[436] arXiv:2305.17666 (cross-list from cs.NI) [pdf, other]
Title: Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience: A Longitudinal Analysis during the Russia-Ukraine Conflict
Muhammad Yasir Muzayan Haq, Abhishta Abhishta, Raffaele Sommese, Mattijs Jonker, Lambert J.M. Nieuwenhuis
Journal-ref: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2023
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[437] arXiv:2305.17677 (cross-list from cs.DC) [pdf, other]
Title: BFRT: Blockchained Federated Learning for Real-time Traffic Flow Prediction
Collin Meese, Hang Chen, Syed Ali Asif, Wanxin Li, Chien-Chung Shen, Mark Nejad
Comments: Published in 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[438] arXiv:2305.17826 (cross-list from cs.CL) [pdf, other]
Title: NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[439] arXiv:2305.17868 (cross-list from cs.CV) [pdf, other]
Title: NaturalFinger: Generating Natural Fingerprint with Generative Adversarial Networks
Kang Yang, Kunhao Lai
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[440] arXiv:2305.17914 (cross-list from cs.SE) [pdf, other]
Title: ACETest: Automated Constraint Extraction for Testing Deep Learning Operators
Jingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo
Comments: Accepted by ISSTA 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[441] arXiv:2305.17989 (cross-list from cs.DC) [pdf, other]
Title: On the Minimal Knowledge Required for Solving Stellar Consensus
Robin Vassantlal, Hasan Heydari, Alysson Bessani
Comments: Preprint of a paper to appear at the 43rd IEEE International Conference on Distributed Computing Systems (ICDCS 2023)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[442] arXiv:2305.18006 (cross-list from quant-ph) [pdf, html, other]
Title: Autonomous Recognition of Erroneous Raw Key Bit Bias in Quantum Key Distribution
Matt Young, Marco Lucamarini, Stefano Pirandola
Comments: 9 pages, 3 figures, submitted to Scientific Reports in Nature
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[443] arXiv:2305.18070 (cross-list from cs.CV) [pdf, other]
Title: Forensic Video Steganalysis in Spatial Domain by Noise Residual Convolutional Neural Network
Mart Keizer, Zeno Geradts, Meike Kombrink
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[444] arXiv:2305.18393 (cross-list from cs.LG) [pdf, other]
Title: Training Private Models That Know What They Don't Know
Stephan Rabanser, Anvith Thudi, Abhradeep Thakurta, Krishnamurthy Dvijotham, Nicolas Papernot
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[445] arXiv:2305.18396 (cross-list from cs.LG) [pdf, html, other]
Title: LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers
Xuanqi Liu, Zhuotao Liu
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[446] arXiv:2305.18439 (cross-list from cs.CV) [pdf, other]
Title: Alteration-free and Model-agnostic Origin Attribution of Generated Images
Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[447] arXiv:2305.18447 (cross-list from cs.LG) [pdf, other]
Title: Unleashing the Power of Randomization in Auditing Differentially Private ML
Krishna Pillutla, Galen Andrew, Peter Kairouz, H. Brendan McMahan, Alina Oprea, Sewoong Oh
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Statistics Theory (math.ST)
[448] arXiv:2305.18456 (cross-list from cs.LG) [pdf, other]
Title: Baselines for Identifying Watermarked Large Language Models
Leonard Tang, Gavin Uberti, Tom Shlomi
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[449] arXiv:2305.18462 (cross-list from cs.CL) [pdf, other]
Title: Membership Inference Attacks against Language Models via Neighbourhood Comparison
Justus Mattern, Fatemehsadat Mireshghallah, Zhijing Jin, Bernhard Schölkopf, Mrinmaya Sachan, Taylor Berg-Kirkpatrick
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[450] arXiv:2305.18465 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning of Gboard Language Models with Differential Privacy
Zheng Xu, Yanxiang Zhang, Galen Andrew, Christopher A. Choquette-Choo, Peter Kairouz, H. Brendan McMahan, Jesse Rosenstock, Yuanbo Zhang
Comments: ACL industry track; v2 updating SecAgg details
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
Total of 463 entries : 1-50 ... 251-300 301-350 351-400 401-450 451-463
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack