Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy risk in machine learning: Analyzing the connection to overfitting
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to
privacy. A growing body of prior work demonstrates that models produced by these …
privacy. A growing body of prior work demonstrates that models produced by these …
Security of symmetric encryption against mass surveillance
Motivated by revelations concerning population-wide surveillance of encrypted
communications, we formalize and investigate the resistance of symmetric encryption …
communications, we formalize and investigate the resistance of symmetric encryption …
Cliptography: Clip** the power of kleptographic attacks
Kleptography, introduced 20 years ago by Young and Yung [Crypto'96], considers the (in)
security of malicious implementations (or instantiations) of standard cryptographic primitives …
security of malicious implementations (or instantiations) of standard cryptographic primitives …
SR-PEKS: Subversion-resistant public key encryption with keyword search
C Jiang, C Xu, Z Zhang, K Chen - IEEE Transactions on Cloud …, 2023 - ieeexplore.ieee.org
Public key encryption with keyword search (PEKS) provides secure searchable data
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …
Subversion-resilient signature schemes
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …
(SAs). Our model of subversion generalizes previous work in several directions, and is …
Message transmission with reverse firewalls—secure communication on corrupted machines
Suppose Alice wishes to send a message to Bob privately over an untrusted channel.
Cryptographers have developed a whole suite of tools to accomplish this task, with a wide …
Cryptographers have developed a whole suite of tools to accomplish this task, with a wide …
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning
S Yeom, I Giacomelli, A Menaged… - Journal of …, 2020 - journals.sagepub.com
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to
privacy. A growing body of prior work demonstrates that models produced by these …
privacy. A growing body of prior work demonstrates that models produced by these …
Generic semantic security against a kleptographic adversary
Notable recent security incidents have generated intense interest in adversaries which
attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop …
attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop …
Sender-anamorphic encryption reformulated: Achieving robust and generic constructions
Motivated by the violation of two fundamental assumptions in secure communication-
receiver-privacy and sender-freedom-by a certain entity referred to as “the dictator” …
receiver-privacy and sender-freedom-by a certain entity referred to as “the dictator” …
Self-guarding cryptographic protocols against algorithm substitution attacks
M Fischlin, S Mazaheri - 2018 IEEE 31st Computer Security …, 2018 - ieeexplore.ieee.org
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to
algorithm substitution attacks. Such self-guarding protocols can prevent undesirable …
algorithm substitution attacks. Such self-guarding protocols can prevent undesirable …