We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2019, skipping first 150

[ total of 237 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-237 ]
[ showing 50 entries per page: fewer | more | all ]
[151]  arXiv:1912.12225 [pdf, ps, other]
Title: Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR)
[152]  arXiv:1912.12257 [pdf, other]
Title: Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device
Journal-ref: 8th International Conference on Information Systems Security and Privacy (ICISSP) 2022
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[153]  arXiv:1912.12363 [pdf, other]
Title: TASE: Reducing latency of symbolic execution with transactional memory
Authors: Adam Humphries (University of North Carolina at Chapel Hill), Kartik Cating-Subramanian (University of Colorado -- Boulder), Michael K. Reiter (University of North Carolina at Chapel Hill)
Comments: 13 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:1912.12370 [pdf, other]
Title: Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Comments: IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Machine Learning (stat.ML)
[155]  arXiv:1912.12373 [pdf, other]
Title: How Secure Is Your IoT Network?
Comments: IEEE International Congress on Internet of Things
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[156]  arXiv:1912.12576 [pdf, ps, other]
Title: Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification
Authors: Farhad Farokhi
Journal-ref: IEEE Transactions on Big Data, 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[157]  arXiv:1912.12673 [pdf, ps, other]
Title: Cyber Situation Awareness with Active Learning for Intrusion Detection
Comments: McElwee, S. & Cannady, J. (2019). Cyber situation awareness with active learning for intrusion detection. SoutheastCon 2019. IEEE. Pre-print
Journal-ref: IEEE SoutheastCon (2019) 1-7
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:1912.12828 [pdf, other]
Title: ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System
Authors: Feng Xiao, Qiang Xu
Comments: 14 pages, 19 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Robotics (cs.RO)
[159]  arXiv:1912.12884 [pdf, other]
Title: Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud
Comments: 10 Pages, 1 figure, Conference
Journal-ref: ACM Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, pp. 372-376
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:1912.12915 [pdf, other]
Title: Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:1912.13046 [pdf, other]
Title: A New Burrows Wheeler Transform Markov Distance
Comments: To appear in: The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI-20), AICS-2020 Workshop
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[162]  arXiv:1912.13120 [pdf, other]
Title: Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack
Journal-ref: IEEE Transactions on Information Forensics and Security, Volume: 15, Issue: 1, 2295 - 2305 (2020)
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[163]  arXiv:1912.13156 [pdf, ps, other]
Title: Hiding Information in Big Data based on Deep Learning
Authors: Dingju Zhu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[164]  arXiv:1912.13410 [pdf, other]
Title: Logic Bugs in IoT Platforms and Systems: A Review
Subjects: Cryptography and Security (cs.CR)
[165]  arXiv:1912.00049 (cross-list from cs.LG) [pdf, other]
Title: Square Attack: a query-efficient black-box adversarial attack via random search
Comments: Accepted at ECCV 2020; added imperceptible perturbations, analysis of examples that require more queries, results on dilated CNNs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[166]  arXiv:1912.00131 (cross-list from cs.DC) [pdf, other]
Title: Federated Learning with Autotuned Communication-Efficient Secure Aggregation
Comments: 5 pages, 3 figures. To appear at the IEEE Asilomar Conference on Signals, Systems, and Computers 2019
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[167]  arXiv:1912.00314 (cross-list from cs.LG) [pdf, other]
Title: ACE -- An Anomaly Contribution Explainer for Cyber-Security Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[168]  arXiv:1912.00354 (cross-list from cs.LG) [pdf, ps, other]
Title: Preserving Patient Privacy while Training a Predictive Model of In-hospital Mortality
Comments: AI for Social Good Workshop, Neurips 2019, Vancouver, Canada
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[169]  arXiv:1912.00461 (cross-list from cs.CV) [pdf, other]
Title: AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds
Comments: Presented at European conference on computer vision (ECCV), 2020. The code is available at this https URL
Journal-ref: ECCV 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[170]  arXiv:1912.00466 (cross-list from cs.LG) [pdf, other]
Title: A Method for Computing Class-wise Universal Adversarial Perturbations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[171]  arXiv:1912.00574 (cross-list from cs.LG) [pdf, other]
Title: Fastened CROWN: Tightened Neural Network Robustness Certificates
Comments: Zhaoyang Lyu and Ching-Yun Ko contributed equally, accepted to AAAI 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[172]  arXiv:1912.00888 (cross-list from cs.LG) [pdf, other]
Title: Deep Neural Network Fingerprinting by Conferrable Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[173]  arXiv:1912.00981 (cross-list from cs.PL) [pdf, other]
Title: Proving Data-Poisoning Robustness in Decision Trees
Comments: Changes: revisions to main text for clarity of presentation, and corrections to proofs in the appendices
Subjects: Programming Languages (cs.PL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[174]  arXiv:1912.01560 (cross-list from cs.DC) [pdf, other]
Title: Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[175]  arXiv:1912.01667 (cross-list from cs.LG) [pdf, other]
Title: A Survey of Black-Box Adversarial Attacks on Computer Vision Models
Comments: 33 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[176]  arXiv:1912.01781 (cross-list from cs.DS) [pdf, other]
Title: Faster Lattice Enumeration
Authors: Mithilesh Kumar
Comments: 12 pages, 1 figure
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[177]  arXiv:1912.02015 (cross-list from cs.SE) [pdf, ps, other]
Title: Using Sequence-to-Sequence Learning for Repairing C Vulnerabilities
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[178]  arXiv:1912.02153 (cross-list from cs.CV) [pdf, other]
Title: Walking on the Edge: Fast, Low-Distortion Adversarial Examples
Comments: 13 pages, 9 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[179]  arXiv:1912.02611 (cross-list from cs.DL) [pdf, ps, other]
Title: Blockchain Applications in Power Systems: A Bibliometric Analysis
Subjects: Digital Libraries (cs.DL); Cryptography and Security (cs.CR)
[180]  arXiv:1912.02629 (cross-list from cs.LG) [pdf, ps, other]
Title: A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[181]  arXiv:1912.02631 (cross-list from cs.LG) [pdf, ps, other]
Title: Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Comments: This work appeared at the 26th Annual Network and Distributed System Security Symposium (NDSS) 2020. Update: An improved version of this framework is available at arXiv:2106.02850
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[182]  arXiv:1912.02919 (cross-list from cs.LG) [pdf, other]
Title: An Empirical Study on the Intrinsic Privacy of SGD
Comments: 21 pages, 11 figures, 8 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[183]  arXiv:1912.03250 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Synthetic Mixed-Type Data Generation For Unsupervised Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[184]  arXiv:1912.03356 (cross-list from cs.NI) [pdf, other]
Title: Cognitive Internet of Vehicles: Motivation, Layered Architecture and Security Issues
Comments: 6 pages
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[185]  arXiv:1912.03485 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments
Comments: 13 pages, Under submission
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[186]  arXiv:1912.03829 (cross-list from cs.CV) [pdf, other]
Title: Amora: Black-box Adversarial Morphing Attack
Comments: Accepted by ACM MM'20
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[187]  arXiv:1912.03959 (cross-list from cs.LG) [pdf, other]
Title: Stealing Knowledge from Protected Deep Neural Networks Using Composite Unlabeled Data
Journal-ref: International Joint Conference on Neural Networks (IJCNN), pages 1-8, Budapest, Hungary, July 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[188]  arXiv:1912.04042 (cross-list from cs.LG) [pdf, other]
Title: Element Level Differential Privacy: The Right Granularity of Privacy
Comments: 34 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[189]  arXiv:1912.04109 (cross-list from cs.IR) [pdf, other]
Title: Data Poisoning Attacks on Neighborhood-based Recommender Systems
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[190]  arXiv:1912.04466 (cross-list from cs.SE) [pdf, other]
Title: Vulpedia: Detecting Vulnerable Ethereum Smart Contracts via Abstracted Vulnerability Signatures
Journal-ref: Journal of Systems and Software (2022): 111410
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[191]  arXiv:1912.04497 (cross-list from cs.CV) [pdf, other]
Title: Feature Losses for Adversarial Robustness
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[192]  arXiv:1912.04836 (cross-list from cs.HC) [pdf, other]
Title: Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning
Comments: 27 pages. Originally published at ACM UbiComp 2018. This version corrects some errors in the original version and add the pointer to released code & dataset
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:1912.04977 (cross-list from cs.LG) [pdf, other]
[194]  arXiv:1912.05021 (cross-list from cs.CV) [pdf, other]
Title: Design and Interpretation of Universal Adversarial Patches in Face Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[195]  arXiv:1912.05823 (cross-list from cs.SE) [pdf, other]
Title: Smart Contract Repair
Comments: 32 pages. ACM Transactions on Software Engineering and Methodology (TOSEM), 2020
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[196]  arXiv:1912.06542 (cross-list from cs.IT) [pdf, other]
Title: On asymptotically optimal tests for random number generators
Authors: Boris Ryabko
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[197]  arXiv:1912.06733 (cross-list from cs.LG) [pdf, other]
Title: Private Federated Learning with Domain Adaptation
Comments: Presented at the Workshop on Federated Learning for Data Privacy and Confidentiality (in Conjunction with NeurIPS 2019)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[198]  arXiv:1912.06895 (cross-list from cs.CV) [pdf, ps, other]
Title: Deep Poisoning: Towards Robust Image Data Sharing against Visual Disclosure
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[199]  arXiv:1912.07742 (cross-list from cs.CV) [pdf, other]
Title: CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[200]  arXiv:1912.07860 (cross-list from cs.DC) [pdf, other]
Title: PIRATE: A Blockchain-based Secure Framework of Distributed Machine Learning in 5G Networks
Comments: 8 pages, 4 figures, 1 table
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[ total of 237 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-237 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)