Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for March 2024

Total of 522 entries : 1-25 ... 401-425 426-450 451-475 476-500 501-522
Showing up to 25 entries per page: fewer | more | all
[476] arXiv:2403.15511 (cross-list from cs.LG) [pdf, html, other]
Title: Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems
Phai Vu Dinh, Diep N. Nguyen, Dinh Thai Hoang, Quang Uy Nguyen, Eryk Dutkiewicz, Son Pham Bao
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[477] arXiv:2403.15600 (cross-list from cs.SE) [pdf, html, other]
Title: Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers
Sivana Hamer, Marcelo d'Amorim, Laurie Williams
Comments: 8 pages, 2 figures, accepted at Deep Learning Security and Privacy Workshop (DLSP) part of IEEE Symposium on Security and Privacy Workshops (SPW) for 2024
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[478] arXiv:2403.15676 (cross-list from cs.SE) [pdf, html, other]
Title: AC4: Algebraic Computation Checker for Circuit Constraints in ZKPs
Hao Chen, Guoqiang Li, Minyu Chen, Ruibang Liu, Sinka Gao
Comments: 24 pages, 5 figures
Subjects: Software Engineering (cs.SE); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[479] arXiv:2403.15740 (cross-list from cs.CL) [pdf, html, other]
Title: Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training
Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang
Comments: A technical report, work mainly done in the early of 2024
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[480] arXiv:2403.15756 (cross-list from cs.SE) [pdf, other]
Title: Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case Study
Matteo Esposito, Francesco Palagiano
Subjects: Software Engineering (cs.SE); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[481] arXiv:2403.15757 (cross-list from cs.IR) [pdf, html, other]
Title: User-Side Realization
Ryoma Sato
Comments: Doctoral Thesis
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[482] arXiv:2403.15999 (cross-list from stat.ML) [pdf, html, other]
Title: Near-Optimal differentially private low-rank trace regression with guaranteed private initialization
Mengyue Zha
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[483] arXiv:2403.16176 (cross-list from cs.LG) [pdf, html, other]
Title: Subspace Defense: Discarding Adversarial Perturbations by Learning a Subspace for Clean Signals
Rui Zheng, Yuhao Zhou, Zhiheng Xi, Tao Gui, Qi Zhang, Xuanjing Huang
Comments: Accepted by COLING 2024
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[484] arXiv:2403.16365 (cross-list from cs.LG) [pdf, html, other]
Title: Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion
Hossein Souri, Arpit Bansal, Hamid Kazemi, Liam Fowl, Aniruddha Saha, Jonas Geiping, Andrew Gordon Wilson, Rama Chellappa, Tom Goldstein, Micah Goldblum
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[485] arXiv:2403.16405 (cross-list from cs.LG) [pdf, html, other]
Title: Ensemble Adversarial Defense via Integration of Multiple Dispersed Low Curvature Models
Kaikang Zhao, Xi Chen, Wei Huang, Liuxin Ding, Xianglong Kong, Fan Zhang
Comments: Accepted to The 2024 International Joint Conference on Neural Networks (IJCNN)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[486] arXiv:2403.16513 (cross-list from cs.CV) [pdf, html, other]
Title: Transfer Learning of Real Image Features with Soft Contrastive Loss for Fake Image Detection
Ziyou Liang, Weifeng Liu, Run Wang, Mengjie Wu, Boheng Li, Yuyang Zhang, Lina Wang, Xinyi Yang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[487] arXiv:2403.16542 (cross-list from cs.LG) [pdf, html, other]
Title: Differentially Private Online Federated Learning with Correlated Noise
Jiaojiao Zhang, Linglingzhi Zhu, Mikael Johansson
Comments: 11 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[488] arXiv:2403.16569 (cross-list from cs.LG) [pdf, html, other]
Title: Revealing Vulnerabilities of Neural Networks in Parameter Learning and Defense Against Explanation-Aware Backdoors
Md Abdul Kadir, GowthamKrishna Addluri, Daniel Sonntag
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[489] arXiv:2403.16591 (cross-list from cs.LG) [pdf, html, other]
Title: Bridging Privacy and Robustness for Trustworthy Machine Learning
Xiaojin Zhang, Wei Chen
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[490] arXiv:2403.16610 (cross-list from eess.AS) [pdf, html, other]
Title: Distributed collaborative anomalous sound detection by embedding sharing
Kota Dohi, Yohei Kawaguchi
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD)
[491] arXiv:2403.16638 (cross-list from cs.CV) [pdf, html, other]
Title: AI-Generated Video Detection via Spatio-Temporal Anomaly Learning
Jianfa Bai, Man Lin, Gang Cao
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[492] arXiv:2403.16704 (cross-list from quant-ph) [pdf, html, other]
Title: Real-Valued Somewhat-Pseudorandom Unitaries
Zvika Brakerski, Nir Magrafta
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[493] arXiv:2403.16898 (cross-list from cs.SE) [pdf, html, other]
Title: Concerned with Data Contamination? Assessing Countermeasures in Code Language Model
Jialun Cao, Wuqi Zhang, Shing-Chi Cheung
Comments: Adjust the format so that the layout looks better
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[494] arXiv:2403.16904 (cross-list from cs.AI) [pdf, html, other]
Title: Multi-Agent Optimization for Safety Analysis of Cyber-Physical Systems: Position Paper
Önder Gürcan, Nataliya Yakymets, Sara Tucci-Piergiovanni, Ansgar Radermacher
Comments: 13 pages, 2 figures, 1 table, "2nd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems, part of Cyber-Physical Systems Week, April 2015, Seattle, USA"
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[495] arXiv:2403.16956 (cross-list from cs.RO) [pdf, html, other]
Title: Bayesian Methods for Trust in Collaborative Multi-Agent Autonomy
R. Spencer Hallyburton, Miroslav Pajic
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[496] arXiv:2403.17105 (cross-list from cs.LG) [pdf, html, other]
Title: Certified Machine Unlearning via Noisy Stochastic Gradient Descent
Eli Chien, Haoyu Wang, Ziang Chen, Pan Li
Comments: NeurIPS 2024. Updated title and introduction while the main results are the same. Add a discussion on utility guarantee. arXiv admin note: text overlap with arXiv:2401.10371
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[497] arXiv:2403.17155 (cross-list from cs.CL) [pdf, html, other]
Title: Task-Agnostic Detector for Insertion-Based Backdoor Attacks
Weimin Lyu, Xiao Lin, Songzhu Zheng, Lu Pang, Haibin Ling, Susmit Jha, Chao Chen
Comments: Findings of NAACL 2024
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[498] arXiv:2403.17188 (cross-list from cs.CV) [pdf, html, other]
Title: LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang
Comments: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2024)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[499] arXiv:2403.17218 (cross-list from cs.SE) [pdf, other]
Title: To Err is Machine: Vulnerability Detection Challenges LLM Reasoning
Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Hengbo Tong, Swarna Das, Earl T. Barr, Wei Le
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[500] arXiv:2403.17225 (cross-list from cs.HC) [pdf, other]
Title: Measuring Compliance with the California Consumer Privacy Act Over Space and Time
Van Tran, Aarushi Mehrotra, Marshini Chetty, Nick Feamster, Jens Frankenreiter, Lior Strahilevitz
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
Total of 522 entries : 1-25 ... 401-425 426-450 451-475 476-500 501-522
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack