close this message
arXiv smileybones

The Scheduled Database Maintenance 2025-09-17 11am-1pm UTC has been completed

  • The scheduled database maintenance has been completed.
  • We recommend that all users logout and login again..

Blog post
Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 ... 351-375 376-400 401-425 426-450 451-475 476-500 501-522
Showing up to 25 entries per page: fewer | more | all
[426] arXiv:2403.10646 (cross-list from cs.LG) [pdf, other]
Title: A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
Beatrice Casey, Joanna C. S. Santos, George Perry
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[427] arXiv:2403.10676 (cross-list from cs.IT) [pdf, html, other]
Title: Secure Distributed Storage: Optimal Trade-Off Between Storage Rate and Privacy Leakage
Remi A. Chou, Joerg Kliewer
Comments: 11 pages, 3 figures, two-column, accepted to IEEE Transactions on Information Theory, part of the results was presented at the 2020 IEEE International Symposium on Information Theory (ISIT)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[428] arXiv:2403.10717 (cross-list from cs.LG) [pdf, html, other]
Title: Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency
Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu
Comments: The Twelfth International Conference on Learning Representations (ICLR 2024)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[429] arXiv:2403.10790 (cross-list from quant-ph) [pdf, html, other]
Title: QuantumLeak: Stealing Quantum Neural Networks from Cloud-based NISQ Machines
Zhenxiao Fu, Min Yang, Cheng Chu, Yilun Xu, Gang Huang, Fan Chen
Journal-ref: published in IJCNN 2024
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[430] arXiv:2403.10856 (cross-list from cs.CL) [pdf, html, other]
Title: Zero-shot Generative Linguistic Steganography
Ke Lin, Yiyang Luo, Zijian Zhang, Ping Luo
Comments: 15 pages, 6 figures. Accepted at NAACL 2024
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[431] arXiv:2403.10883 (cross-list from cs.CV) [pdf, html, other]
Title: Improving Adversarial Transferability of Vision-Language Pre-training Models through Collaborative Multimodal Interaction
Jiyuan Fu, Zhaoyu Chen, Kaixun Jiang, Haijing Guo, Jiafeng Wang, Shuyong Gao, Wenqiang Zhang
Comments: This work won first place in CVPR 2024 Workshop Challenge: Black-box Adversarial Attacks on Vision Foundation Models
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[432] arXiv:2403.10995 (cross-list from cs.LG) [pdf, other]
Title: Edge Private Graph Neural Networks with Singular Value Perturbation
Tingting Tang, Yue Niu, Salman Avestimehr, Murali Annavaram
Comments: Accepted at Privacy Enhancing Technologies Symposium (PETS) 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[433] arXiv:2403.11052 (cross-list from cs.CV) [pdf, html, other]
Title: Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention
Jie Ren, Yaxin Li, Shenglai Zeng, Han Xu, Lingjuan Lyu, Yue Xing, Jiliang Tang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[434] arXiv:2403.11162 (cross-list from cs.CV) [pdf, html, other]
Title: CGI-DM: Digital Copyright Authentication for Diffusion Models via Contrasting Gradient Inversion
Xiaoyu Wu, Yang Hua, Chumeng Liang, Jiaru Zhang, Hao Wang, Tao Song, Haibing Guan
Comments: Accepted by CVPR 2024
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[435] arXiv:2403.11206 (cross-list from cs.LG) [pdf, html, other]
Title: CBR -- Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution
Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[436] arXiv:2403.11238 (cross-list from cs.DC) [pdf, html, other]
Title: JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable
Hao Cheng, Yuan Lu, Zhenliang Lu, Qiang Tang, Yuxuan Zhang, Zhenfeng Zhang
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[437] arXiv:2403.11297 (cross-list from cs.CL) [pdf, other]
Title: A Modified Word Saliency-Based Adversarial Attack on Text Classification Models
Hetvi Waghela, Sneha Rakshit, Jaydip Sen
Comments: The paper is a preprint of a version submitted in ICCIDA 2024. It consists of 10 pages and contains 7 tables
Journal-ref: Computational Intelligence and Data Analytics. ICCIDA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 236. Springer, Singapore
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[438] arXiv:2403.11343 (cross-list from cs.LG) [pdf, other]
Title: Federated Transfer Learning with Differential Privacy
Mengchu Li, Ye Tian, Yang Feng, Yi Yu
Comments: 89 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Statistics Theory (math.ST); Methodology (stat.ME); Machine Learning (stat.ML)
[439] arXiv:2403.11433 (cross-list from quant-ph) [pdf, html, other]
Title: Measuring Quantum Information Leakage Under Detection Threat
Farhad Farokhi, Sejeong Kim
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[440] arXiv:2403.11759 (cross-list from cs.NI) [pdf, html, other]
Title: Why E.T. Can't Phone Home: A Global View on IP-based Geoblocking at VoWiFi
Gabriel Karl Gegenhuber, Philipp Frenzel, Edgar Weippl
Journal-ref: 22nd Annual International Conference on Mobile Systems, Applications and Services (MobiSys 2024)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[441] arXiv:2403.11778 (cross-list from cs.SD) [pdf, html, other]
Title: Towards the Development of a Real-Time Deepfake Audio Detection System in Communication Platforms
Jonat John Mathew, Rakin Ahsan, Sae Furukawa, Jagdish Gautham Krishna Kumar, Huzaifa Pallan, Agamjeet Singh Padda, Sara Adamski, Madhu Reddiboina, Arjun Pankajakshan
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[442] arXiv:2403.11833 (cross-list from cs.CL) [pdf, html, other]
Title: SSCAE -- Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator
Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi
Journal-ref: IEEE Transactions on Dependable and Secure Computing (2024), pp. 1-17
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[443] arXiv:2403.11941 (cross-list from cs.CC) [pdf, html, other]
Title: Perfect Zero-Knowledge PCPs for #P
Tom Gur, Jack O'Connor, Nicholas Spooner
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[444] arXiv:2403.12060 (cross-list from cs.NI) [pdf, html, other]
Title: Blockchain-Empowered Immutable and Reliable Delivery Service (BIRDS) Using UAV Networks
Sana Hafeez, Habib Ullah Manzoor, Lina Mohjazi, Ahmed Zoha, Muhammad Ali Imran, Yao Sun
Comments: 6 pages, 6 figures,2023 IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (IEEE CAMAD), Edinburgh, UK
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[445] arXiv:2403.12075 (cross-list from cs.CY) [pdf, html, other]
Title: Adversarial Nibbler: An Open Red-Teaming Method for Identifying Diverse Harms in Text-to-Image Generation
Jessica Quaye, Alicia Parrish, Oana Inel, Charvi Rastogi, Hannah Rose Kirk, Minsuk Kahng, Erin van Liemt, Max Bartolo, Jess Tsang, Justin White, Nathan Clement, Rafael Mosquera, Juan Ciro, Vijay Janapa Reddi, Lora Aroyo
Comments: 10 pages, 6 figures
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[446] arXiv:2403.12313 (cross-list from cs.LG) [pdf, html, other]
Title: Improving LoRA in Privacy-preserving Federated Learning
Youbang Sun, Zitao Li, Yaliang Li, Bolin Ding
Comments: published at ICLR 2024, full paper 17 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[447] arXiv:2403.12399 (cross-list from cs.LG) [pdf, html, other]
Title: Dynamic Gradient Influencing for Viral Marketing Using Graph Neural Networks
Saurabh Sharma, Ambuj Singh
Comments: Accepted at WWW '25
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[448] arXiv:2403.12433 (cross-list from cs.DB) [pdf, html, other]
Title: Algorithmic Complexity Attacks on Dynamic Learned Indexes
Rui Yang, Evgenios M. Kornaropoulos, Yue Cheng
Comments: VLDB 2024
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[449] arXiv:2403.12446 (cross-list from cs.SE) [pdf, other]
Title: On the effectiveness of Large Language Models for GitHub Workflows
Xinyu Zhang, Siddharth Muralee, Sourag Cherupattamoolayil, Aravind Machiry
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[450] arXiv:2403.12830 (cross-list from cs.LG) [pdf, html, other]
Title: Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Approximate Unlearning Completeness
Cheng-Long Wang, Qi Li, Zihang Xiang, Yinzhi Cao, Di Wang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
Total of 522 entries : 1-25 ... 351-375 376-400 401-425 426-450 451-475 476-500 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack