Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 ... 376-400 401-425 426-450 451-475 476-500 501-522
Showing up to 25 entries per page: fewer | more | all
[451] arXiv:2403.13000 (cross-list from cs.LG) [pdf, other]
Title: Duwak: Dual Watermarks in Large Language Models
Chaoyi Zhu, Jeroen Galjaard, Pin-Yu Chen, Lydia Y. Chen
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[452] arXiv:2403.13027 (cross-list from cs.LG) [pdf, html, other]
Title: Towards Better Statistical Understanding of Watermarking LLMs
Zhongze Cai, Shang Liu, Hanzhao Wang, Huaiyang Zhong, Xiaocheng Li
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[453] arXiv:2403.13108 (cross-list from cs.LG) [pdf, html, other]
Title: Resilience in Online Federated Learning: Mitigating Model-Poisoning Attacks via Partial Sharing
Ehsan Lari, Reza Arablouei, Vinay Chakravarthi Gogineni, Stefan Werner
Comments: 13 pages, 9 figures, Submitted to TSIPN
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Signal Processing (eess.SP)
[454] arXiv:2403.13345 (cross-list from cs.IT) [pdf, html, other]
Title: Local Approximation of Secrecy Capacity
Emmanouil M. Athanasakos, Nicholas Kalouptsidis, Hariprasad Manjunath
Comments: Submitted to EUSIPCO 2024
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[455] arXiv:2403.13374 (cross-list from cs.LG) [pdf, html, other]
Title: Byzantine-resilient Federated Learning With Adaptivity to Data Heterogeneity
Shiyuan Zuo, Xingrun Yan, Rongfei Fan, Han Hu, Hangguan Shan, Tony Q. S. Quek
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[456] arXiv:2403.13502 (cross-list from cs.LG) [pdf, html, other]
Title: Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov
Journal-ref: IEEE Open Journal of the Industrial Electronics Society, 5 (2024) 428-440
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[457] arXiv:2403.13523 (cross-list from cs.LG) [pdf, html, other]
Title: Have You Poisoned My Data? Defending Neural Networks against Data Poisoning
Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini
Comments: Paper accepted for publication at European Symposium on Research in Computer Security (ESORICS) 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[458] arXiv:2403.13820 (cross-list from cs.LG) [pdf, html, other]
Title: Identity information based on human magnetocardiography signals
Pengju Zhang, Chenxi Sun, Jianwei Zhang, Hong Guo
Comments: 7 pages, 5 figures. Author manuscript accepted for AAAI 2024 Spring Symposium on Clinical Foundation Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[459] arXiv:2403.13848 (cross-list from cs.LG) [pdf, other]
Title: Smooth Sensitivity for Learning Differentially-Private yet Accurate Rule Lists
Timothée Ly (LAAS-ROC), Julien Ferry (EPM), Marie-José Huguet (LAAS-ROC), Sébastien Gambs (UQAM), Ulrich Aivodji (ETS)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[460] arXiv:2403.13944 (cross-list from cs.CY) [pdf, html, other]
Title: Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints
Arkaprabha Bhattacharya, Kevin Lee, Vineeth Ravi, Jessica Staddon, Rosanna Bellini
Comments: 20 pages, 9 figures, 8 tables, This paper will be published in CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[461] arXiv:2403.14077 (cross-list from cs.AI) [pdf, html, other]
Title: Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics
Shan Jia, Reilin Lyu, Kangran Zhao, Yize Chen, Zhiyuan Yan, Yan Ju, Chuanbo Hu, Xin Li, Baoyuan Wu, Siwei Lyu
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[462] arXiv:2403.14188 (cross-list from cond-mat.dis-nn) [pdf, html, other]
Title: Quantum-activated neural reservoirs on-chip open up large hardware security models for resilient authentication
Zhao He, Maxim S. Elizarov, Ning Li, Fei Xiang, Andrea Fratalocchi
Subjects: Disordered Systems and Neural Networks (cond-mat.dis-nn); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[463] arXiv:2403.14250 (cross-list from eess.IV) [pdf, html, other]
Title: Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations
Xun Lin, Yi Yu, Song Xia, Jue Jiang, Haoran Wang, Zitong Yu, Yizhong Liu, Ying Fu, Shuai Wang, Wenzhong Tang, Alex Kot
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[464] arXiv:2403.14332 (cross-list from cs.DS) [pdf, html, other]
Title: A Differentially Private Clustering Algorithm for Well-Clustered Graphs
Weiqiang He, Hendrik Fichtenberger, Pan Peng
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[465] arXiv:2403.14421 (cross-list from cs.LG) [pdf, html, other]
Title: DP-RDM: Adapting Diffusion Models to Private Domains Without Fine-Tuning
Jonathan Lebensold, Maziar Sanjabi, Pietro Astolfi, Adriana Romero-Soriano, Kamalika Chaudhuri, Mike Rabbat, Chuan Guo
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[466] arXiv:2403.14450 (cross-list from quant-ph) [pdf, html, other]
Title: Maximal $α$-Leakage for Quantum Privacy Mechanisms
Bo-Yu Yang, Hsuan Yu, Hao-Chung Cheng
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[467] arXiv:2403.14772 (cross-list from cs.CV) [pdf, html, other]
Title: Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures
Sayanton V. Dibbo, Adam Breuer, Juston Moore, Michael Teti
Comments: ECCV 2024
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[468] arXiv:2403.14774 (cross-list from cs.CV) [pdf, html, other]
Title: Few-Shot Adversarial Prompt Learning on Vision-Language Models
Yiwei Zhou, Xiaobo Xia, Zhiwei Lin, Bo Han, Tongliang Liu
Comments: NeurIPS 2024
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[469] arXiv:2403.14885 (cross-list from cs.AI) [pdf, html, other]
Title: Establishing a leader in a pairwise comparisons method
Jacek Szybowski, Konrad Kułakowski, Jiri Mazurek, Sebastian Ernst
Comments: 9 figures, 19 pages
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Discrete Mathematics (cs.DM)
[470] arXiv:2403.14905 (cross-list from eess.SP) [pdf, html, other]
Title: Adaptive Coded Federated Learning: Privacy Preservation and Straggler Mitigation
Chengxi Li, Ming Xiao, Mikael Skoglund
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[471] arXiv:2403.15010 (cross-list from cs.CV) [pdf, html, other]
Title: Clean-image Backdoor Attacks
Dazhong Rong, Guoyao Yu, Shuheng Shen, Xinyi Fu, Peng Qian, Jianhai Chen, Qinming He, Xing Fu, Weiqiang Wang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[472] arXiv:2403.15045 (cross-list from cs.LG) [pdf, html, other]
Title: DP-Dueling: Learning from Preference Feedback without Compromising User Privacy
Aadirupa Saha, Hilal Asi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[473] arXiv:2403.15074 (cross-list from q-fin.GN) [pdf, other]
Title: Tax Policy Handbook for Crypto Assets
Arindam Misra
Comments: 105 pages, 59 figures and 4 Tables
Subjects: General Finance (q-fin.GN); Cryptography and Security (cs.CR)
[474] arXiv:2403.15285 (cross-list from cs.NI) [pdf, html, other]
Title: Blockchain-based Pseudonym Management for Vehicle Twin Migrations in Vehicular Edge Metaverse
Jiawen Kang, Xiaofeng Luo, Jiangtian Nie, Tianhao Wu, Haibo Zhou, Yonghua Wang, Dusit Niyato, Shiwen Mao, Shengli Xie
Comments: 14 pages, 9 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[475] arXiv:2403.15400 (cross-list from cs.CY) [pdf, html, other]
Title: Efficient Weighting Schemes for Auditing Instant-Runoff Voting Elections
Alexander Ek, Philip B. Stark, Peter J. Stuckey, Damjan Vukcevic
Comments: 15 pages, 4, figures, presented at Voting'24. The current version includes some improved wording and fixes a few errors
Journal-ref: FC 2024 Workshops, Lecture Notes in Computer Science 14746 (2025) 18-32
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Applications (stat.AP)
Total of 522 entries : 1-25 ... 376-400 401-425 426-450 451-475 476-500 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack