We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2019, skipping first 100

[ total of 237 entries: 1-100 | 101-200 | 201-237 ]
[ showing 100 entries per page: fewer | more | all ]
[101]  arXiv:1912.08454 [pdf, ps, other]
Title: Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
[102]  arXiv:1912.08573 [pdf, other]
Title: Harzer Roller: Linker-Based Instrumentation for Enhanced Embedded Security Testing
Comments: 9 Pages, 7 Figures, ROOTS'19
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:1912.08788 [pdf, other]
Title: Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level
Comments: 18 pages, 7 figures, accepted at IEEE Symposium on Security and Privacy 2020
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:1912.09034 [pdf, ps, other]
Title: A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:1912.09064 [pdf, other]
Title: Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Comments: Code for transformations at this https URL Presentation at this https URL An author of a related work [32] contacted us regarding our characterization of their defense (Sec 2.2). They point out that our attack is not within the stated scope of their defense, but agree their defense would be ineffective against our attack
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[106]  arXiv:1912.09150 [pdf, other]
Title: An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning
Comments: This full paper appears in the Proceedings of IEEE International Conference on Computer Communications (INFOCOM), held in April 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107]  arXiv:1912.09280 [pdf, other]
Title: A Review of Quantum and Hybrid Quantum / Classical Blockchain Protocols
Authors: Marcus Edwards (1), Atefeh Mashatan (2), Shohini Ghose (3, 1) ((1) Institute for Quantum Computing, University of Waterloo, Canada, (2) School of Information Technology Management, Ryerson University, Toronto, Canada, (3) Department of Physics and Computer Science, Wilfrid Laurier University, Waterloo, Canada)
Comments: 27 pages, 1 figure
Journal-ref: Quantum Inf Process 19, 184 (2020)
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[108]  arXiv:1912.09303 [pdf, other]
Title: SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks
Comments: 11 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[109]  arXiv:1912.09556 [pdf, ps, other]
Title: Blockchain-based Application Security Risks: A Systematic Literature Review
Comments: 12 pages, 7 tables, 0 figures
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:1912.09734 [pdf, other]
Title: Reverse Fingerprinting
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:1912.09773 [pdf, other]
Title: Performance and Cost Evaluation of Smart Contracts in Collaborative Health Care Environments
Comments: Presented at ICITST 2019
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[112]  arXiv:1912.09779 [pdf, other]
Title: Pentest on an Internet Mobile App: A Case Study using Tramonto
Comments: ICITST 2019
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:1912.09882 [pdf, ps, other]
Title: Design and Implementation of a Blockchain-based Consent Management System
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:1912.10190 [pdf, other]
Title: Cached and Confused: Web Cache Deception in the Wild
Comments: USENIX Security Symposium, Boston, MA, USA, August 2020
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:1912.10247 [pdf, other]
Title: Trust Management in Decentralized IoT Access Control System
Comments: Accepted to IEEE ICBC 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[116]  arXiv:1912.10312 [pdf, other]
Title: Socio-network Analysis of RTL Designs for Hardware Trojan Localization
Comments: Accepted to be Published in: Proceedings of the 2019 22nd International Conference on Computer and Information Technology (ICCIT), 18-20 December 2019, Dhaka, Bangladesh
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:1912.10367 [pdf, other]
Title: Dispel: Byzantine SMR with Distributed Pipelining
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Operating Systems (cs.OS)
[118]  arXiv:1912.10617 [pdf, other]
Title: LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:1912.10666 [pdf, other]
Title: ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[120]  arXiv:1912.10757 [pdf, ps, other]
Title: Encryption based on Conference Matrix
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[121]  arXiv:1912.10833 [pdf, other]
Title: A New Ensemble Method for Concessively Targeted Multi-model Attack
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[122]  arXiv:1912.10836 [pdf, other]
Title: Random CapsNet Forest Model for Imbalanced Malware Type Classification Task
Comments: 30 pages, 10 figures, typos are corrected, references are added
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Machine Learning (stat.ML)
[123]  arXiv:1912.11043 [pdf, other]
Title: Impact of consensus on appendable-block blockchain for IoT
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:1912.11044 [pdf, other]
Title: Leveraging lightweight blockchain to establish data integrity for surveillance cameras
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:1912.11118 [pdf, other]
Title: Detecting stuffing of a user's credentials at her own accounts
Journal-ref: Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020)
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:1912.11153 [pdf, other]
Title: PAGURUS: Low-Overhead Dynamic Information Flow Tracking on Loosely Coupled Accelerators
Comments: Published in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[127]  arXiv:1912.11249 [pdf, ps, other]
Title: Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[128]  arXiv:1912.11283 [pdf, ps, other]
Title: An Analisys of Application Logs with Splunk : developing an App for the synthetic analysis of data and security incidents
Authors: Roberto Bruzzese
Comments: 32 pages, 32 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[129]  arXiv:1912.11299 [pdf, other]
Title: Introducing the Robot Vulnerability Database (RVD)
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[130]  arXiv:1912.11328 [pdf, other]
Title: Assessing differentially private deep learning with Membership Inference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:1912.11401 [pdf, ps, other]
Title: On the Decentralized Generation of theRSA Moduli in Multi-Party Settings
Comments: The submission contains 14 pages and 12 figures. The conference to submit is not determined yet
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[132]  arXiv:1912.11523 [pdf, other]
Title: JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Comments: Accepted to IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2020, Issue 3
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[133]  arXiv:1912.11531 [pdf, other]
Title: Pseudo Random Number Generation: a Reinforcement Learning approach
Comments: 13 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[134]  arXiv:1912.11541 [pdf, other]
Title: Characterizing Orphan Transactions in the Bitcoin Network
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:1912.11546 [pdf, ps, other]
Title: Fast Generation of RSA Keys using Smooth Integers
Comments: This paper contains 11 pages and 8 tables, in IEEE Transactions on Computers
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:1912.11588 [pdf, other]
Title: Next-Generation Big Data Federation Access Control: A Reference Model
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:1912.11598 [pdf, other]
Title: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures
Journal-ref: IEEE Open Journal of the Computer Society, 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[138]  arXiv:1912.11617 [pdf, ps, other]
Title: Efficient Algorithm for the Linear Complexity of Sequences and Some Related Consequences
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC)
[139]  arXiv:1912.11721 [pdf, other]
Title: A Closer Look at Mobile App Usage as a Persistent Biometric: A Small Case Study
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[140]  arXiv:1912.11745 [pdf, other]
Title: Proof of Federated Learning: A Novel Energy-recycling Consensus Algorithm
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:1912.11831 [pdf, other]
Title: Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders
Authors: Mustafizur Rahman Shahid (SAMOVAR), Gregory Blanc (SAMOVAR), Zonghua Zhang (SAMOVAR), Hervé Debar (SAMOVAR)
Journal-ref: 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), Sep 2019, Cambridge, United States. pp.1-5
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Signal Processing (eess.SP)
[142]  arXiv:1912.11951 [pdf, other]
Title: EVA: An Encrypted Vector Arithmetic Language and Compiler for Efficient Homomorphic Computation
Journal-ref: Programming Language Design and Implementation (PLDI 2020) 546-561
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL)
[143]  arXiv:1912.12043 [pdf, ps, other]
Title: Implementation of XTEA Encryption Protocol based on IEEE 802.15.4 Wireless Systems
Comments: in Ukrainian
Journal-ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 6(2), 2019
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[144]  arXiv:1912.12122 [pdf, other]
Title: Deep Learning Based Android Malware Detection Framework
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:1912.12141 [pdf, other]
Title: encointer -- Local Community Cryptocurrencies with Universal Basic Income
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[146]  arXiv:1912.12143 [pdf, ps, other]
Title: A Secure Authentication Technique in Internet of Medical Things through Machine Learning
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:1912.12172 [pdf, ps, other]
Title: Defense against Lion Attack in Cognitive Radio Systems using the Markov Decision Process Approach
Journal-ref: Frequenz, 2014
Subjects: Cryptography and Security (cs.CR)
[148]  arXiv:1912.12173 [pdf, ps, other]
Title: Game-theory-based analysis on interactions among secondary and malicious users in coordinated jamming attack in cognitive radio systems
Journal-ref: Journal of Circuits, Systems and Computers, 2016
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[149]  arXiv:1912.12174 [pdf, ps, other]
Title: An Analysis on Interactions among Secondary User and Unknown Jammer in Cognitive Radio Systems by Fictitious Play
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:1912.12221 [pdf, other]
Title: Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow
Comments: Accepted to International Conference on Advances in the Emerging Computing Technologies (AECT) 2020
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:1912.12225 [pdf, ps, other]
Title: Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR)
[152]  arXiv:1912.12257 [pdf, other]
Title: Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device
Journal-ref: 8th International Conference on Information Systems Security and Privacy (ICISSP) 2022
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[153]  arXiv:1912.12363 [pdf, other]
Title: TASE: Reducing latency of symbolic execution with transactional memory
Authors: Adam Humphries (University of North Carolina at Chapel Hill), Kartik Cating-Subramanian (University of Colorado -- Boulder), Michael K. Reiter (University of North Carolina at Chapel Hill)
Comments: 13 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:1912.12370 [pdf, other]
Title: Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Comments: IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Machine Learning (stat.ML)
[155]  arXiv:1912.12373 [pdf, other]
Title: How Secure Is Your IoT Network?
Comments: IEEE International Congress on Internet of Things
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[156]  arXiv:1912.12576 [pdf, ps, other]
Title: Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification
Authors: Farhad Farokhi
Journal-ref: IEEE Transactions on Big Data, 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[157]  arXiv:1912.12673 [pdf, ps, other]
Title: Cyber Situation Awareness with Active Learning for Intrusion Detection
Comments: McElwee, S. & Cannady, J. (2019). Cyber situation awareness with active learning for intrusion detection. SoutheastCon 2019. IEEE. Pre-print
Journal-ref: IEEE SoutheastCon (2019) 1-7
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:1912.12828 [pdf, other]
Title: ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System
Authors: Feng Xiao, Qiang Xu
Comments: 14 pages, 19 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Robotics (cs.RO)
[159]  arXiv:1912.12884 [pdf, other]
Title: Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud
Comments: 10 Pages, 1 figure, Conference
Journal-ref: ACM Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, pp. 372-376
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:1912.12915 [pdf, other]
Title: Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:1912.13046 [pdf, other]
Title: A New Burrows Wheeler Transform Markov Distance
Comments: To appear in: The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI-20), AICS-2020 Workshop
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[162]  arXiv:1912.13120 [pdf, other]
Title: Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack
Journal-ref: IEEE Transactions on Information Forensics and Security, Volume: 15, Issue: 1, 2295 - 2305 (2020)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[163]  arXiv:1912.13156 [pdf, ps, other]
Title: Hiding Information in Big Data based on Deep Learning
Authors: Dingju Zhu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[164]  arXiv:1912.13410 [pdf, other]
Title: Logic Bugs in IoT Platforms and Systems: A Review
Subjects: Cryptography and Security (cs.CR)
[165]  arXiv:1912.00049 (cross-list from cs.LG) [pdf, other]
Title: Square Attack: a query-efficient black-box adversarial attack via random search
Comments: Accepted at ECCV 2020; added imperceptible perturbations, analysis of examples that require more queries, results on dilated CNNs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[166]  arXiv:1912.00131 (cross-list from cs.DC) [pdf, other]
Title: Federated Learning with Autotuned Communication-Efficient Secure Aggregation
Comments: 5 pages, 3 figures. To appear at the IEEE Asilomar Conference on Signals, Systems, and Computers 2019
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[167]  arXiv:1912.00314 (cross-list from cs.LG) [pdf, other]
Title: ACE -- An Anomaly Contribution Explainer for Cyber-Security Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[168]  arXiv:1912.00354 (cross-list from cs.LG) [pdf, ps, other]
Title: Preserving Patient Privacy while Training a Predictive Model of In-hospital Mortality
Comments: AI for Social Good Workshop, Neurips 2019, Vancouver, Canada
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[169]  arXiv:1912.00461 (cross-list from cs.CV) [pdf, other]
Title: AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds
Comments: Presented at European conference on computer vision (ECCV), 2020. The code is available at this https URL
Journal-ref: ECCV 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[170]  arXiv:1912.00466 (cross-list from cs.LG) [pdf, other]
Title: A Method for Computing Class-wise Universal Adversarial Perturbations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[171]  arXiv:1912.00574 (cross-list from cs.LG) [pdf, other]
Title: Fastened CROWN: Tightened Neural Network Robustness Certificates
Comments: Zhaoyang Lyu and Ching-Yun Ko contributed equally, accepted to AAAI 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[172]  arXiv:1912.00888 (cross-list from cs.LG) [pdf, other]
Title: Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[173]  arXiv:1912.00981 (cross-list from cs.PL) [pdf, other]
Title: Proving Data-Poisoning Robustness in Decision Trees
Comments: Changes: revisions to main text for clarity of presentation, and corrections to proofs in the appendices
Subjects: Programming Languages (cs.PL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[174]  arXiv:1912.01560 (cross-list from cs.DC) [pdf, other]
Title: Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[175]  arXiv:1912.01667 (cross-list from cs.LG) [pdf, other]
Title: A Survey of Black-Box Adversarial Attacks on Computer Vision Models
Comments: 33 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[176]  arXiv:1912.01781 (cross-list from cs.DS) [pdf, other]
Title: Faster Lattice Enumeration
Authors: Mithilesh Kumar
Comments: 12 pages, 1 figure
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[177]  arXiv:1912.02015 (cross-list from cs.SE) [pdf, ps, other]
Title: Using Sequence-to-Sequence Learning for Repairing C Vulnerabilities
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[178]  arXiv:1912.02153 (cross-list from cs.CV) [pdf, other]
Title: Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Comments: 13 pages, 9 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[179]  arXiv:1912.02611 (cross-list from cs.DL) [pdf, ps, other]
Title: Blockchain Applications in Power Systems: A Bibliometric Analysis
Subjects: Digital Libraries (cs.DL); Cryptography and Security (cs.CR)
[180]  arXiv:1912.02629 (cross-list from cs.LG) [pdf, ps, other]
Title: A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[181]  arXiv:1912.02631 (cross-list from cs.LG) [pdf, ps, other]
Title: Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Comments: This work appeared at the 26th Annual Network and Distributed System Security Symposium (NDSS) 2020. Update: An improved version of this framework is available at arXiv:2106.02850
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[182]  arXiv:1912.02919 (cross-list from cs.LG) [pdf, other]
Title: An Empirical Study on the Intrinsic Privacy of SGD
Comments: 21 pages, 11 figures, 8 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[183]  arXiv:1912.03250 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Synthetic Mixed-Type Data Generation For Unsupervised Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[184]  arXiv:1912.03356 (cross-list from cs.NI) [pdf, other]
Title: Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Comments: 6 pages
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[185]  arXiv:1912.03485 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments
Comments: 13 pages, Under submission
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[186]  arXiv:1912.03829 (cross-list from cs.CV) [pdf, other]
Title: Amora: Black-box Adversarial Morphing Attack
Comments: Accepted by ACM MM'20
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[187]  arXiv:1912.03959 (cross-list from cs.LG) [pdf, other]
Title: Stealing Knowledge from Protected Deep Neural Networks Using Composite Unlabeled Data
Journal-ref: International Joint Conference on Neural Networks (IJCNN), pages 1-8, Budapest, Hungary, July 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[188]  arXiv:1912.04042 (cross-list from cs.LG) [pdf, other]
Title: Element Level Differential Privacy: The Right Granularity of Privacy
Comments: 34 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[189]  arXiv:1912.04109 (cross-list from cs.IR) [pdf, other]
Title: Data Poisoning Attacks on Neighborhood-based Recommender Systems
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[190]  arXiv:1912.04466 (cross-list from cs.SE) [pdf, other]
Title: Vulpedia: Detecting Vulnerable Ethereum Smart Contracts via Abstracted Vulnerability Signatures
Journal-ref: Journal of Systems and Software (2022): 111410
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[191]  arXiv:1912.04497 (cross-list from cs.CV) [pdf, other]
Title: Feature Losses for Adversarial Robustness
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[192]  arXiv:1912.04836 (cross-list from cs.HC) [pdf, other]
Title: Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning
Comments: 27 pages. Originally published at ACM UbiComp 2018. This version corrects some errors in the original version and add the pointer to released code & dataset
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:1912.04977 (cross-list from cs.LG) [pdf, other]
[194]  arXiv:1912.05021 (cross-list from cs.CV) [pdf, other]
Title: Design and Interpretation of Universal Adversarial Patches in Face Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[195]  arXiv:1912.05823 (cross-list from cs.SE) [pdf, other]
Title: Smart Contract Repair
Comments: 32 pages. ACM Transactions on Software Engineering and Methodology (TOSEM), 2020
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[196]  arXiv:1912.06542 (cross-list from cs.IT) [pdf, other]
Title: On asymptotically optimal tests for random number generators
Authors: Boris Ryabko
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[197]  arXiv:1912.06733 (cross-list from cs.LG) [pdf, other]
Title: Private Federated Learning with Domain Adaptation
Comments: Presented at the Workshop on Federated Learning for Data Privacy and Confidentiality (in Conjunction with NeurIPS 2019)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[198]  arXiv:1912.06895 (cross-list from cs.CV) [pdf, ps, other]
Title: Deep Poisoning: Towards Robust Image Data Sharing against Visual Disclosure
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[199]  arXiv:1912.07742 (cross-list from cs.CV) [pdf, other]
Title: CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[200]  arXiv:1912.07860 (cross-list from cs.DC) [pdf, other]
Title: PIRATE: A Blockchain-based Secure Framework of Distributed Machine Learning in 5G Networks
Comments: 8 pages, 4 figures, 1 table
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[ total of 237 entries: 1-100 | 101-200 | 201-237 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)