We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Mar 2020

[ total of 286 entries: 1-285 | 286 ]
[ showing 285 entries per page: fewer | more | all ]
[1]  arXiv:2003.00003 [pdf, other]
Title: Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2003.00118 [pdf, other]
Title: Assuring the Integrity of Videos from Wireless-based IoT Devices using Blockchain
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[3]  arXiv:2003.00175 [pdf, other]
Title: DangKiller: Eliminating Dangling Pointers Efficiently via Implicit Identifier
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[4]  arXiv:2003.00294 [pdf, other]
Title: Improving Sustainability of Cryptocurrency Payment Networks for IoT Applications
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[5]  arXiv:2003.00296 [pdf, ps, other]
Title: Renegotiation and recursion in Bitcoin contracts
Comments: Full version of the paper presented at COORDINATION 2020
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[6]  arXiv:2003.00395 [pdf, other]
Title: Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review
Comments: 34 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[7]  arXiv:2003.00405 [pdf, ps, other]
Title: Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection
Comments: 6 pages
Journal-ref: International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), 28-29th January 2018, Tamil Nadu, India
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2003.00476 [src]
Title: 1D CNN Based Network Intrusion Detection with Normalization on Imbalanced Data
Comments: Need more polishing
Journal-ref: IEEE ICAIIC 2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[9]  arXiv:2003.00542 [pdf, other]
Title: User profiling using smartphone network traffic analysis
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2003.00572 [pdf, other]
Title: Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)
Comments: Accepted at Usenix Security 2020
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2003.00578 [pdf, ps, other]
Title: Quantum Indistinguishability for Public Key Encryption
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2003.00610 [pdf, other]
Title: Gimme That Model!: A Trusted ML Model Trading Protocol
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13]  arXiv:2003.00801 [pdf, other]
Title: BitcoinF: Achieving Fairness for Bitcoin in Transaction-Fee-Only Model
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[14]  arXiv:2003.00862 [pdf, other]
Title: TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[15]  arXiv:2003.00903 [pdf, other]
Title: Atomic Crosschain Transactions White Paper
Comments: 8 pages, 8 figures, 3 code listings. arXiv admin note: substantial text overlap with arXiv:1911.08083
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2003.00916 [pdf, other]
Title: Code Renewability for Native Software Protection
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2003.00971 [pdf, ps, other]
Title: Graphing Website Relationships for Risk Prediction: Identifying Derived Threats to Users Based on Known Indicators
Comments: 10 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Networking and Internet Architecture (cs.NI)
[18]  arXiv:2003.00973 [pdf, other]
Title: Differential Privacy at Risk: Bridging Randomness and Privacy Budget
Comments: Presented in Workshop on Privacy Preserving AI (PPAI) at AAAI, 2020
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Statistics Theory (math.ST); Machine Learning (stat.ML)
[19]  arXiv:2003.01031 [pdf, other]
Title: Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
Comments: 18 pages, 5 figures. To appear in USENIX Security 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2003.01218 [pdf, other]
Title: A First Step Towards Understanding Real-world Attacks on IoT Devices
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2003.01261 [pdf, other]
Title: Adversarial Network Traffic: Towards Evaluating the Robustness of Deep Learning-Based Network Traffic Classification
Comments: 14 pages, 3 figures, and 7 tables. Accepted in IEEE Transactions on Network and Service Management (TNSM). Supplementary Material: this https URL
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2003.01518 [pdf, other]
Title: SoK: A Survey of Open-Source Threat Emulators
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2003.01782 [pdf, other]
Title: Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack
Comments: Project page: this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[24]  arXiv:2003.01801 [pdf, other]
Title: $\text{A}^3$: Activation Anomaly Analysis
Comments: The first two authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2003.01985 [pdf, other]
Title: Revisiting Security Vulnerabilities in Commercial Password Managers
Comments: This is an accepted manuscript to appear in the proceedings of the 35th Int'l Conf. on ICT Systems Security & Privacy Protection (IFIP SEC 2020), Maribor, Slovenia
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2003.01991 [pdf, other]
Title: Vessels Cybersecurity: Issues, Challenges, and the Road Ahead
Journal-ref: IEEE Communications Magazine ( Volume: 58 , Issue: 6 , June 2020 )
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2003.02133 [pdf, other]
Title: Threats to Federated Learning: A Survey
Comments: 7 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[28]  arXiv:2003.02164 [pdf, other]
Title: Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
Authors: Tidiane Sylla (USTTB, LaBRI), Mohamed Aymen Chalouf (OCIF), Francine Krief (LaBRI), Karim Samaké (USTTB)
Journal-ref: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11--12, 2019, Proceedings, pp.240-252, 2020
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2003.02388 [pdf, ps, other]
Title: Finding linearly generated subsequences
Comments: 19 pages International Workshop on the Arithmetic of Finite Fields, WAIFI 2020 this https URL
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[30]  arXiv:2003.02575 [pdf, other]
Title: DANTE: A framework for mining and monitoring darknet traffic
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2003.02693 [pdf, other]
Title: Revisiting Transactional Statistics of High-scalability Blockchains
Journal-ref: Proceedings of the ACM Internet Measurement Conference (2020)
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2003.02732 [pdf, other]
Title: Confusing and Detecting ML Adversarial Attacks with Injected Attractors
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33]  arXiv:2003.02833 [pdf, other]
Title: InfDetect: a Large Scale Graph-based Fraud Detection System for E-Commerce Insurance
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[34]  arXiv:2003.02834 [pdf, other]
Title: Practical Privacy Preserving POI Recommendation
Comments: Accepted by ACM TIST
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[35]  arXiv:2003.02892 [pdf, other]
Title: SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2003.03052 [pdf, other]
Title: Combining GHOST and Casper
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2003.03100 [pdf, other]
Title: MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2003.03394 [pdf, other]
Title: Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads
Comments: Accepted and published version (Entropy 2020, 22, 454)
Journal-ref: Entropy 2020, 22, 454
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Atmospheric and Oceanic Physics (physics.ao-ph)
[39]  arXiv:2003.03409 [pdf, other]
Title: Balance Transfers and Bailouts in Credit Networks using Blockchains
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2003.03474 [pdf, other]
Title: Machine Learning based Anomaly Detection for 5G Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[41]  arXiv:2003.03540 [pdf, other]
Title: SkillCheck: An Incentive-based Certification System using Blockchains
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[42]  arXiv:2003.03658 [pdf, other]
Title: Securing LSB embedding against structural steganalysis
Authors: Brian A. Powell
Comments: 23 pages, 6 figures. Section 3 added; revisions made to Section 6.3. Version accepted by Journal of Computer Security
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2003.03663 [pdf, other]
Title: ATHAFI: Agile Threat Hunting And Forensic Investigation
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2003.03675 [pdf, other]
Title: Dynamic Backdoor Attacks Against Machine Learning Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45]  arXiv:2003.03810 [pdf, other]
Title: Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[46]  arXiv:2003.03850 [pdf, other]
Title: A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based Side Channel Attacks
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2003.04024 [pdf, ps, other]
Title: A Verifiable Quantum Secret Sharing Scheme Based on a Single Qubit
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2003.04038 [pdf, other]
Title: TEDL: A Text Encryption Method Based on Deep Learning
Authors: Xiang Li, Peng Wang
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[49]  arXiv:2003.04079 [pdf, other]
Title: DeepMAL -- Deep Learning Models for Malware Traffic Detection and Classification
Comments: 3rd International Data Science Conference (IDSC 2020)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[50]  arXiv:2003.04163 [pdf, other]
Title: Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[51]  arXiv:2003.04185 [pdf, ps, other]
Title: Change Point Models for Real-time Cyber Attack Detection in Connected Vehicle Environment
Comments: 11 pages, 4 figures, submitted to IEEE Transactions on Intelligent Transportation Systems. arXiv admin note: substantial text overlap with arXiv:1811.12620
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP); Applications (stat.AP)
[52]  arXiv:2003.04244 [pdf, other]
Title: Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[53]  arXiv:2003.04247 [pdf, other]
Title: Towards Probabilistic Verification of Machine Unlearning
Comments: code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[54]  arXiv:2003.04309 [pdf, ps, other]
Title: A quantum secret sharing scheme with verifiable function
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2003.04426 [pdf, other]
Title: Ransomware as a Service using Smart Contracts and IPFS
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2003.04463 [pdf, other]
Title: Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2003.04498 [pdf, other]
Title: Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
Comments: A version of this paper will appear in the IEEE S&P 2020 proceedings
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[58]  arXiv:2003.04693 [pdf, other]
Title: Streamlining Integrity Tree Updates for Secure Persistent Non-Volatile Memory
Comments: 13 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2003.04735 [pdf, other]
Title: Security of Distributed Machine Learning: A Game-Theoretic Approach to Design Secure DSVM
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[60]  arXiv:2003.04868 [pdf, other]
Title: This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs
Comments: 15+3 pages, 9 figures, 8+5 tables
Journal-ref: IEEE Symposium on Security and Privacy 2020 (SP' 20)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[61]  arXiv:2003.04969 [pdf, other]
Title: IoT Expunge: Implementing Verifiable Retention of IoT Data
Comments: This paper has been accepted in 10th ACM Conference on Data and Application Security and Privacy (CODASPY), 2020
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
[62]  arXiv:2003.04984 [pdf, ps, other]
Title: Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system
Authors: Reza Fotohi
Comments: 29 pages, 12 figures, 10 tables, 8 equations, Journal
Journal-ref: Reliability Engineering & System Safety, 193, 106675 (2020)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Performance (cs.PF)
[63]  arXiv:2003.05039 [pdf, other]
Title: Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries
Comments: Accepted at CCS20. This is a technical report version
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2003.05067 [src]
Title: The Framework of Consensus Equilibria for Mining-Pool Games in Blockchain Ecosystems
Authors: George Yuan
Comments: arXiv admin note: submission has been withdrawn by arXiv administrators due to inappropriate overlap with external sources
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2003.05071 [pdf, ps, other]
Title: Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation
Comments: 13 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[66]  arXiv:2003.05088 [pdf, other]
Title: Designing constraint-based false data injection attacks against the unbalanced distribution smart grids
Comments: 14 pages, 10 figures. This paper was accepted accepted for publication in the IEEE Internet of Things Journal on January, 31st 2021
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[67]  arXiv:2003.05106 [pdf, other]
Title: Self-Sovereign Identity for IoT environments: A Perspective
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2003.05188 [pdf, ps, other]
Title: Scan Correlation -- Revealing distributed scan campaigns
Comments: Accepted for publication at DISSECT '20
Journal-ref: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 2020, pp. 1-6
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2003.05207 [pdf, ps, other]
Title: The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Comments: 22 pages
Journal-ref: In: Micciancio D., Ristenpart T. (eds) Advances in Cryptology -- CRYPTO 2020. CRYPTO 2020. Lecture Notes in Computer Science, vol 12172. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[70]  arXiv:2003.05273 [pdf, other]
Title: Opportunistic multi-party shuffling for data reporting privacy
Comments: 14 pages, 18 figures, parts of this paper were used in the PhD thesis of the same author available at this https URL
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2003.05328 [pdf, ps, other]
Title: ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition
Comments: 10 pages, 3 figures, in Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR 2020)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[72]  arXiv:2003.05503 [pdf, other]
Title: Bypassing memory safety mechanisms through speculative control flow hijacks
Comments: To appear at IEEE EuroS&P 2021 (this https URL)
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2003.05564 [pdf, other]
Title: Securing Autonomous Service Robots through Fuzzing, Detection, and Mitigation
Comments: 14 pages
Journal-ref: Journal of Systems Architecture, 2020
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[74]  arXiv:2003.05631 [pdf, other]
Title: ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Comments: This paper has been accepted by the 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[75]  arXiv:2003.05703 [pdf, other]
Title: Inline Detection of DGA Domains Using Side Information
Subjects: Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[76]  arXiv:2003.05813 [pdf, other]
Title: SMap: Internet-wide Scanning for Spoofing
Journal-ref: Annual Computer Security Applications Conference (ACSAC '21), December 6-10, 2021, Virtual Event, USA. ACM, New York, NY, USA, 12 pages
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2003.05846 [pdf, other]
Title: Lost in Disclosure: On The Inference of Password Composition Policies
Comments: 6 pages, 8 figures, 7 tables
Journal-ref: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, pp. 264-269
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2003.05915 [pdf, ps, other]
Title: Protection of genomic information: a classical and a quantum approach
Authors: Guy Dodin
Comments: 9 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2003.05987 [pdf, other]
Title: ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2003.06103 [pdf, other]
Title: ShieldDB: An Encrypted Document Database with Padding Countermeasures
Comments: Accepted version of our work published in IEEE Transactions on Knowledge and Data Engineering (TKDE, 2021)
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2003.06127 [pdf, other]
Title: Fail-safe Watchtowers and Short-lived Assertions for Payment Channels
Authors: Bowen Liu (1), Pawel Szalachowski (1), Siwei Sun (2 and 3) ((1) Singapore University of Technology and Design, Singapore, (2) State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing China, (3) School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)
Comments: ACM AsiaCCS'20
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2003.06159 [pdf, other]
Title: A report on personally identifiable sensor data from smartphone devices
Comments: 17 pages, 5 tables, parts of this paper were used in the PhD thesis by the same author available at this https URL
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2003.06185 [pdf, other]
Title: Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
Comments: 6 pages, 4 figures, to be published in Proceedings of the 2020 6th IEEE International Energy Conference (ENERGYCon)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[84]  arXiv:2003.06197 [pdf, other]
Title: PayPlace: Secure and Flexible Operator-Mediated Payments in Blockchain Marketplaces at Scale
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[85]  arXiv:2003.06344 [pdf, other]
Title: Automating Botnet Detection with Graph Neural Networks
Comments: Data and code available this https URL . Accepted as a workshop paper in MLSys 2020 Conference
Journal-ref: AutoML for Networking and Systems Workshop of MLSys 2020 Conference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[86]  arXiv:2003.06428 [pdf, other]
Title: Towards a Resilient Machine Learning Classifier -- a Case Study of Ransomware Detection
Comments: Conference on Applied Machine Learning for Information Security 2019, Washington DC (CAMLIS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[87]  arXiv:2003.06568 [pdf, other]
Title: Security Analysis of EOSIO Smart Contracts
Comments: 17 pages, 4 figures; typos corrected, section II and III revised
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2003.06612 [pdf, other]
Title: Policy-Based Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[89]  arXiv:2003.06616 [pdf, ps, other]
Title: Image Encryption Decryption Using Chaotic Logistic Mapping and DNA Encoding
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2003.06693 [pdf, other]
Title: Certified Defenses for Adversarial Patches
Comments: International Conference on Learning Representations, ICLR 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[91]  arXiv:2003.06826 [pdf, other]
Title: CoinMagic: A Differential Privacy Framework for Ring Signature Schemes
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[92]  arXiv:2003.07208 [pdf, other]
Title: Passlab: A Password Security Tool for the Blue Team
Authors: Saul Johnson
Comments: 4 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2003.07242 [pdf, other]
Title: STITCHER: Correlating Digital Forensic Evidence on Internet-of-Things Devices
Comments: 15 pages
Journal-ref: Forensic Science International: Digital Investigation, 2020
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2003.07262 [pdf, other]
Title: Securing Microservices and Microservice Architectures: A Systematic Mapping Study
Journal-ref: Computer Science Review 41C (2021) 100415
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[95]  arXiv:2003.07270 [pdf, other]
Title: An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[96]  arXiv:2003.07314 [pdf, other]
Title: Characterizing Cryptocurrency Exchange Scams
Comments: 15 pages,18 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[97]  arXiv:2003.07421 [pdf, other]
Title: Formal Methods Analysis of the Secure Remote Password Protocol
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2003.07435 [pdf, other]
Title: Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2003.07440 [pdf, other]
Title: Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[100]  arXiv:2003.07495 [pdf, other]
Title: SMACS: Smart Contract Access Control Service
Comments: IEEE/IFIP DSN'20
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2003.07622 [pdf, ps, other]
Title: Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild
Comments: 14 pages, 7 tables
Journal-ref: 34th IFIP TC-11 International Conference on Information Security and Privacy Protection (IFIP SEC 2019). IFIP Advances in Information and Communication Technology, vol. 562, pp. 134-148. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[102]  arXiv:2003.07630 [pdf, ps, other]
Title: Privacy-preserving Weighted Federated Learning within Oracle-Aided MPC Framework
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2003.07859 [pdf, other]
Title: Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems
Journal-ref: IEEE Transactions on Information Forensics and Security, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY); Physics and Society (physics.soc-ph); Machine Learning (stat.ML)
[104]  arXiv:2003.07907 [pdf, other]
Title: On the Use of Quantum Entanglement in Secure Communications: A Survey
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[105]  arXiv:2003.08054 [pdf, ps, other]
Title: Blockchain-Based Distributed Patient-Centric Image Management System
Comments: 18 Pages, 12 Figures, 2 Tables. Included detailed analysis of the proposed framework. Submitted to MDPI-Applied Science
Journal-ref: https://www.mdpi.com/2076-3417/11/1/196
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2003.08343 [pdf, ps, other]
Title: Survey of Privacy-Preserving Collaborative Filtering
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG)
[107]  arXiv:2003.08433 [pdf, other]
Title: Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication
Comments: 8 pages, 5 figures
Journal-ref: Proceedings on Privacy Enhancing Technologies, 2022, volume 4, pages 86-104
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[108]  arXiv:2003.08567 [pdf, other]
[109]  arXiv:2003.08585 [pdf, ps, other]
Title: Hybrid Model For Intrusion Detection Systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2003.08633 [pdf, other]
Title: Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
Comments: IEEE Deep Learning and Security Workshop (DLS) 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[111]  arXiv:2003.08634 [pdf, ps, other]
Title: A public key cryptography using multinacci block matrices
Comments: 11 Pages, No figures
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[112]  arXiv:2003.08837 [pdf, other]
Title: Vulnerabilities of Connectionist AI Applications: Evaluation and Defence
Comments: 20 pages, 8 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE); Machine Learning (stat.ML)
[113]  arXiv:2003.08861 [pdf, other]
Title: Face-Off: Adversarial Face Obfuscation
Comments: Published in PoPETs 2021
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2003.08915 [pdf, ps, other]
Title: Automatically Proving Microkernels Free from Privilege Escalation from their Executable
Comments: 19 pages, 11 figures, submitted to IEEE Symposium on Security and Privacy 2021
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2003.09120 [pdf, other]
Title: Multi-party Quantum Byzantine Agreement Without Entanglement
Comments: 6 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[116]  arXiv:2003.09316 [pdf, other]
Title: Detection of Information Hiding at Anti-Copying 2D Barcodes
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[117]  arXiv:2003.09381 [pdf, other]
Title: The application of $σ$-LFSR in Key-Dependent Feedback Configuration for Word-Oriented Stream Ciphers
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2003.09561 [pdf, other]
Title: An Empirical Study on Benchmarks of Artificial Software Vulnerabilities
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2003.10074 [pdf, other]
Title: Dragoon: Private Decentralized HITs Made Practical
Comments: small differences from a version accepted to appear in ICDCS 2020 (to fix a minor bug)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[120]  arXiv:2003.10118 [pdf, ps, other]
Title: Faster computation of isogenies of large prime degree
Authors: Daniel Bernstein (UIC CS), Luca de Feo, Antonin Leroux (DGA, GRACE), Benjamin Smith (GRACE, X-DEP-INFO)
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[121]  arXiv:2003.10128 [pdf, other]
Title: Soteria: A Provably Compliant User Right Manager Using a Novel Two-Layer Blockchain Technology
Comments: 12 pages, 6 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[122]  arXiv:2003.10325 [pdf, other]
Title: DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks
Authors: Claude Rosin Ngueveu (UQAM), Antoine Boutet (PRIVATICS), Carole Frindel (CREATIS), Sébastien Gambs (UQAM), Théo Jourdan (CREATIS, PRIVATICS), Claude Rosin
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Signal Processing (eess.SP)
[123]  arXiv:2003.10360 [pdf, other]
Title: Bayesian Models Applied to Cyber Security Anomaly Detection Problems
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[124]  arXiv:2003.10440 [pdf, ps, other]
Title: Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS based on Temporal-Topological Correlation
Comments: Accepted by IEEE Access
Journal-ref: IEEE Access 8 (2020) 57260-57272
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY); Optimization and Control (math.OC)
[125]  arXiv:2003.10478 [pdf, other]
Title: Backflash Light as a Security Vulnerability in Quantum Key Distribution Systems
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[126]  arXiv:2003.10513 [pdf, other]
Title: Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation
Comments: 17 pages, 6 figures, 4 tables, preprint
Journal-ref: J Hardw Syst Secur 2, 111-130 (2018)
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2003.10560 [pdf, other]
Title: Attract More Miners to Join in Blochchain Construction for Internet of Things
Journal-ref: IEEE Transactions on Network Science and Engineering 2020
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2003.10595 [pdf, other]
Title: Systematic Evaluation of Privacy Risks of Machine Learning Models
Comments: Accepted by USENIX Security 2021, code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[129]  arXiv:2003.10639 [pdf, other]
Title: Attention-Based Self-Supervised Feature Learning for Security Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[130]  arXiv:2003.10830 [pdf, other]
Title: Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
Comments: arXiv admin note: text overlap with arXiv:1711.05284
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2003.10877 [pdf, other]
Title: Improving Transaction Success Rate via Smart Gateway Selection in Cryptocurrency Payment Channel Networks
Comments: arXiv admin note: text overlap with arXiv:2003.00294
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[132]  arXiv:2003.11061 [pdf, other]
Title: The DAO Induction Attack Against the RPL-based Internet of Things
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[133]  arXiv:2003.11110 [pdf, other]
Title: PoisHygiene: Detecting and Mitigating Poisoning Attacks in Neural Networks
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[134]  arXiv:2003.11231 [pdf, other]
Title: Unsupervised Learning for security of Enterprise networks by micro-segmentation
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2003.11424 [pdf, other]
Title: BlockMarkchain: A Secure Decentralized Data Market with a Constant Load on the Blockchain
Comments: 16 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2003.11446 [pdf, other]
Title: Probabilistic Counters for Privacy Preserving Data Aggregation
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2003.11506 [pdf, other]
Title: FastPay: High-Performance Byzantine Fault Tolerant Settlement
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2003.11511 [pdf, other]
Title: Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs
Comments: 12 pages, 1 table, 1 figure
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2003.11663 [pdf, other]
Title: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography
Comments: PhD thesis, 152 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Information Theory (cs.IT); Quantum Physics (quant-ph)
[140]  arXiv:2003.11855 [pdf, other]
Title: Challenging the adversarial robustness of DNNs based on error-correcting output codes
Comments: This paper is accepted by Security and Communication Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[141]  arXiv:2003.11936 [pdf, ps, other]
Title: Cryptography using generalized Fibonacci matrices with Affine-Hill cipher
Comments: Construction, development and efficiency
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO); Number Theory (math.NT)
[142]  arXiv:2003.12027 [pdf, ps, other]
Title: Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[143]  arXiv:2003.12034 [pdf, ps, other]
Title: Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[144]  arXiv:2003.12093 [pdf, other]
Title: To Tweet or Not to Tweet: Covertly Manipulating a Twitter Debate on Vaccines Using Malware-Induced Misperceptions
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[145]  arXiv:2003.12208 [pdf, other]
Title: SpectreRewind: Leaking Secrets to Past Instructions
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2003.12341 [pdf, other]
Title: Assessing the Security of OPC UA Deployments
Comments: 2 pages, 1 figure, to be published in Proceedings of the 1st ITG Workshop on IT Security (ITSec)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[147]  arXiv:2003.12359 [pdf, ps, other]
Title: Guardauto: A Decentralized Runtime Protection System for Autonomous Driving
Journal-ref: IEEE Transactions on Computers, Volume: 70, Issue: 10, 01 October 2021
Subjects: Cryptography and Security (cs.CR)
[148]  arXiv:2003.12363 [pdf, other]
Title: Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties
Journal-ref: IEEE Symposium on Security and Privacy 2020, Workshop on Cyber Resilient Supply Chain Technologies
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[149]  arXiv:2003.12365 [pdf, other]
Title: Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Comments: 13 pages, Accepted at ACM ASIACCS 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[150]  arXiv:2003.12401 [pdf, ps, other]
Title: Resilient Cyber-Physical Systems: Using NFV Orchestration
Comments: 13 pages, 6 figures, 2 tables, 49 references; this article supersedes arXiv:1908.05077(v1), e.g. sections 3 and 4 of the current article supersede section 5 of arXiv:1908.05077(v1)
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2003.12456 [pdf, other]
Title: Hardware Fingerprinting for the ARINC 429 Avionic Bus
Subjects: Cryptography and Security (cs.CR)
[152]  arXiv:2003.12470 [pdf, other]
Title: An Empirical Analysis of Privacy in the Lightning Network
Comments: 26 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2003.12598 [pdf, other]
Title: A Security and Performance Driven Architecture for Cloud Data Centers
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2003.12632 [pdf, other]
Title: An Automated Framework for Board-level Trojan Benchmarking
Comments: 7 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[155]  arXiv:2003.12703 [pdf, other]
Title: DaST: Data-free Substitute Training for Adversarial Attacks
Comments: Accepted by CVPR2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[156]  arXiv:2003.12760 [pdf, other]
Title: Adversarial Imitation Attack
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[157]  arXiv:2003.12776 [pdf, other]
Title: Security Analysis of the Open Banking Account and Transaction API Protocol
Comments: 18 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2003.12805 [pdf, other]
Title: Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning
Comments: 12 pages, 6 figures, PrePrint, code on Github (this https URL)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2003.12901 [pdf, other]
Title: liOS: Lifting iOS apps for fun and profit
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2003.12905 [pdf, other]
Title: Cybersecurity in the AWS Cloud
Authors: Michael Soltys
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2003.13073 [pdf, other]
Title: Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a Virus
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2003.13155 [pdf, other]
Title: Byzantine Agreement, Broadcast and State Machine Replication with Near-optimal Good-case Latency
Comments: A brief announcement appeared in DISC 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[163]  arXiv:2003.13164 [pdf, other]
Title: Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs
Comments: Accepted to be Published in: Proceedings of the 21st International Symposium on Quality Electronic Design (ISQED 2020), Mar. 25-26, 2020, Santa Clara, CA
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2003.13213 [pdf, other]
Title: Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[165]  arXiv:2003.13251 [pdf, other]
Title: Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft
Comments: Published in NDSS 2020 proceeding
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[166]  arXiv:2003.13259 [pdf, other]
Title: SmartCert: Redesigning Digital Certificates with Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2003.13376 [pdf, other]
Title: End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Comments: 10 pages, 12 figures
Journal-ref: The 39th International Symposium on Reliable Distributed Systems (SRDS) 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[168]  arXiv:2003.13399 [pdf, ps, other]
Title: Cryptocurrency Address Clustering and Labeling
Comments: 7 pages, 5 figures, technical report
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2003.13526 [pdf, other]
Title: Functionality-preserving Black-box Optimization of Adversarial Windows Malware
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2003.13617 [pdf, other]
Title: A Systematic Mapping Study on Blockchain Technology for Digital Protection of Communication with Industrial Control
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Robotics (cs.RO)
[171]  arXiv:2003.13746 [pdf, ps, other]
Title: DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[172]  arXiv:2003.13904 [pdf, other]
Title: Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[173]  arXiv:2003.13922 [pdf, other]
Title: Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Human-Computer Interaction (cs.HC)
[174]  arXiv:2003.13955 [pdf, other]
Title: Differentially Private Naive Bayes Classifier using Smooth Sensitivity
Comments: 14 Pages, PETS'21
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[175]  arXiv:2003.14094 [pdf, ps, other]
Title: A Lightweight Adaptable DNS Channel for Covert Data Transmission
Subjects: Cryptography and Security (cs.CR)
[176]  arXiv:2003.14099 [pdf, other]
Title: Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders
Comments: European Commission Project: LEGaTO - Low Energy Toolset for Heterogeneous Computing (EC-H2020-780681)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[177]  arXiv:2003.14123 [pdf, other]
Title: When the Guard failed the Droid: A case study of Android malware
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2003.14215 [pdf, ps, other]
Title: Stream/block ciphers, difference equations and algebraic attacks
Comments: 26 pages, to appear in Journal of Symbolic Computation
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC); Commutative Algebra (math.AC); Rings and Algebras (math.RA)
[179]  arXiv:2003.14356 [pdf, ps, other]
Title: Yet another insecure group key distribution scheme using secret sharing
Authors: Chris J Mitchell
Comments: Minor modifications to provide extra background
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2003.14412 [pdf, other]
Title: Assessing Disease Exposure Risk with Location Data: A Proposal for Cryptographic Preservation of Privacy
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[181]  arXiv:2003.00010 (cross-list from cs.LG) [pdf, other]
Title: Distributed Momentum for Byzantine-resilient Learning
Comments: Source code (for academic use only): this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[182]  arXiv:2003.00040 (cross-list from cs.LG) [pdf, other]
Title: Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[183]  arXiv:2003.00120 (cross-list from cs.LG) [pdf, other]
Title: Improving Certified Robustness via Statistical Learning with Logical Reasoning
Comments: Accepted by 36th Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[184]  arXiv:2003.00229 (cross-list from cs.LG) [pdf, other]
Title: User-Level Privacy-Preserving Federated Learning: Analysis and Performance Optimization
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[185]  arXiv:2003.00293 (cross-list from cs.LG) [pdf, other]
Title: Unsupervised Dictionary Learning for Anomaly Detection
Comments: in Proceedings of iTWIST'20, Paper-ID: 09, Nantes, France, December, 2-4, 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Numerical Analysis (math.NA)
[186]  arXiv:2003.00378 (cross-list from cs.LG) [pdf, other]
Title: Understanding the Intrinsic Robustness of Image Distributions using Conditional Generative Models
Comments: 14 pages, 2 figures, 5 tables, AISTATS final paper reformatted for readability
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[187]  arXiv:2003.00505 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Deep Learning with Smooth Sensitivity
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[188]  arXiv:2003.00563 (cross-list from cs.LG) [pdf, other]
Title: An Equivalence Between Private Classification and Online Prediction
Comments: An earlier version of this manuscript claimed an upper bound over the sample complexity that is exponential in the Littlestone dimension. The argument was erranous, and the current version contains a correction, which leads to double-exponential dependence in the Littlestone-dimension
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[189]  arXiv:2003.00602 (cross-list from cs.IR) [pdf, other]
Title: Federating Recommendations Using Differentially Private Prototypes
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[190]  arXiv:2003.00653 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks and Defenses on Graphs: A Review, A Tool and Empirical Studies
Comments: Accepted by SIGKDD Explorations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[191]  arXiv:2003.00870 (cross-list from cs.NI) [pdf, ps, other]
Title: An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks
Comments: 19 pages, 12 figures, Journal
Journal-ref: JCP, 13(6), 705-720 (2018)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Performance (cs.PF)
[192]  arXiv:2003.01090 (cross-list from cs.CV) [pdf, ps, other]
Title: Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
Comments: 13 pages, 6 figures To be published in proceedings of IEEE conference on Computer Vision and Pattern Recognition (CVPR 2020)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2003.01171 (cross-list from cs.SI) [pdf, other]
Title: A Semi-supervised Graph Attentive Network for Financial Fraud Detection
Comments: icdm
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[194]  arXiv:2003.01279 (cross-list from cs.CV) [pdf, other]
Title: Disrupting Deepfakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems
Comments: Accepted at CVPR 2020 Workshop on Adversarial Machine Learning in Computer Vision
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[195]  arXiv:2003.01718 (cross-list from cs.ET) [pdf, ps, other]
Title: Laser Induced Speckle as a Foundation for Physical Security and Optical Computing
Authors: Charis Mesaritakis (1), Marialena Akriotou (2), Dimitris Syvridis (2) ((1) Dept. Information & Communication Systems Engineering University of the Aegean Karlovassi-Samos, Greece, (2) Dept. Informatics & Telecommunications National & Kapodistrian University of Athens, Athens, Greece)
Journal-ref: In 2018 Photonics in Switching and Computing (PSC) (pp. 1-3). IEEE (Sep 2018)
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR)
[196]  arXiv:2003.01876 (cross-list from cs.LG) [pdf, other]
Title: Privacy-preserving Learning via Deep Net Pruning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[197]  arXiv:2003.01908 (cross-list from cs.LG) [pdf, other]
Title: Denoised Smoothing: A Provable Defense for Pretrained Classifiers
Comments: 10 pages main text; 29 pages total
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[198]  arXiv:2003.02229 (cross-list from eess.SY) [pdf, other]
Title: Detection of False Data Injection Attacks Using the Autoencoder Approach
Comments: 6 pages, 5 figures, 1 table, conference
Journal-ref: 2020 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS), IEEE, Liege, Belgium, 2020, pp. 1-6
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[199]  arXiv:2003.02460 (cross-list from cs.LG) [pdf, other]
Title: A Closer Look at Accuracy vs. Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[200]  arXiv:2003.02488 (cross-list from cs.CY) [pdf, other]
Title: Demographic Bias in Biometrics: A Survey on an Emerging Challenge
Comments: 15 pages, 3 figures, 3 tables. Submitted to IEEE Transactions on Technology and Society. Update after first round of peer review
Journal-ref: IEEE Transactions on Technology and Society 1, no. 2 (2020): 89-103
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[201]  arXiv:2003.02685 (cross-list from cs.IT) [pdf, other]
Title: Privacy-Aware Time-Series Data Sharing with Deep Reinforcement Learning
Comments: 13 pages, 10 figures. arXiv admin note: text overlap with arXiv:1907.07606
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[202]  arXiv:2003.03021 (cross-list from cs.LG) [pdf, other]
Title: Exploiting Verified Neural Networks via Floating Point Numerical Error
Comments: SAS 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[203]  arXiv:2003.03172 (cross-list from cs.SE) [pdf, other]
Title: Detecting and Characterizing Bots that Commit Code
Comments: Preprint of the paper accepted in MSR, 2020 conference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
[204]  arXiv:2003.03221 (cross-list from cs.NI) [pdf, ps, other]
Title: Me Love (SYN-)Cookies: SYN Flood Mitigation in Programmable Data Planes
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Performance (cs.PF)
[205]  arXiv:2003.03296 (cross-list from cs.PL) [pdf, other]
Title: Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[206]  arXiv:2003.03471 (cross-list from cs.SE) [pdf, other]
Title: SpellBound: Defending Against Package Typosquatting
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[207]  arXiv:2003.03699 (cross-list from cs.LG) [pdf, other]
Title: Removing Disparate Impact of Differentially Private Stochastic Gradient Descent on Model Accuracy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (stat.ML)
[208]  arXiv:2003.03722 (cross-list from cs.LG) [pdf, other]
Title: On the Robustness of Cooperative Multi-Agent Reinforcement Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[209]  arXiv:2003.04367 (cross-list from cs.CV) [pdf, other]
Title: Category-wise Attack: Transferable Adversarial Examples for Anchor Free Object Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[210]  arXiv:2003.04884 (cross-list from cs.LG) [pdf, other]
Title: Cryptanalytic Extraction of Neural Network Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[211]  arXiv:2003.04997 (cross-list from cs.HC) [pdf, ps, other]
Title: Voter Verification of BMD Ballots Is a Two-Part Question: Can They? Mostly, They Can. Do They? Mostly, They Don't
Comments: 21 pages, 9 figures
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[212]  arXiv:2003.05005 (cross-list from cs.CV) [pdf, other]
Title: Using an ensemble color space model to tackle adversarial examples
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[213]  arXiv:2003.05198 (cross-list from cs.LG) [pdf, other]
Title: Industrial Scale Privacy Preserving Deep Neural Network
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[214]  arXiv:2003.05687 (cross-list from cs.DC) [pdf, ps, other]
Title: Trends in Development of Databases and Blockchain
Comments: Accepted in The Second International Workshop on Blockchain Applications and Theory (BAT 2020)
Journal-ref: 2020 Seventh International Conference on Software Defined Systems (SDS)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Databases (cs.DB)
[215]  arXiv:2003.05748 (cross-list from cs.LG) [pdf, other]
Title: Explaining Away Attacks Against Neural Networks
Authors: Sean Saito, Jin Wang
Comments: 2 pages, 2 figures; Accepted at MLSys 2020 First Workshop on Secure and Resilient Autonomy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[216]  arXiv:2003.05836 (cross-list from cs.PL) [pdf, ps, other]
Title: Control-flow Flattening Preserves the Constant-Time Policy (Extended Version)
Comments: Extended version of ITASEC20 camera ready paper
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[217]  arXiv:2003.06068 (cross-list from cs.SI) [pdf, other]
Title: Snapshot Samplings of the Bitcoin Transaction Network and Analysis of Cryptocurrency Growth
Authors: Lambert T. Leong
Comments: 8 pages, 8 figures, 2 tables
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[218]  arXiv:2003.06468 (cross-list from cs.CV) [pdf, other]
Title: GeoDA: a geometric framework for black-box adversarial attacks
Comments: In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[219]  arXiv:2003.06552 (cross-list from cs.GT) [pdf, other]
Title: Generic Superlight Client for Permissionless Blockchains
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[220]  arXiv:2003.06559 (cross-list from cs.LG) [pdf, ps, other]
Title: Minimum-Norm Adversarial Examples on KNN and KNN-Based Models
Comments: 3rd Deep Learning and Security Workshop (co-located with the 41st IEEE Symposium on Security and Privacy)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[221]  arXiv:2003.06646 (cross-list from cs.LG) [pdf, other]
Title: Investigating Generalization in Neural Networks under Optimally Evolved Training Perturbations
Comments: Accepted at IEEE ICASSP 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV); Machine Learning (stat.ML)
[222]  arXiv:2003.06814 (cross-list from cs.LG) [pdf, other]
Title: Towards Face Encryption by Generating Adversarial Identity Masks
Comments: Accepted by ICCV2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[223]  arXiv:2003.06974 (cross-list from cs.LG) [pdf, other]
Title: Toward Adversarial Robustness via Semi-supervised Robust Training
Comments: 19 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[224]  arXiv:2003.06979 (cross-list from cs.LG) [pdf, other]
Title: Anomalous Example Detection in Deep Learning: A Survey
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[225]  arXiv:2003.06990 (cross-list from cs.DC) [pdf, ps, other]
Title: A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol
Comments: Accepted by Concurrency and Computation Practice and Experience
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[226]  arXiv:2003.07133 (cross-list from cs.NI) [pdf, other]
Title: Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations
Authors: Anna Maria Mandalari (1), Roman Kolcun (1), Hamed Haddadi (1), Daniel J. Dubois (2), David Choffnes (2) ((1) Imperial College London, (2) Northeastern University)
Comments: 5 pages, 1 figure, 3 tables
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[227]  arXiv:2003.07191 (cross-list from cs.NI) [pdf, other]
Title: Securing Vehicle-to-Everything (V2X) Communication Platforms
Comments: Accepted for publication, IEEE Transactions on Intelligent Vehicles, March 2020. arXiv admin note: text overlap with arXiv:1610.06810 by other authors
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[228]  arXiv:2003.07233 (cross-list from cs.LG) [pdf, other]
Title: The TrojAI Software Framework: An OpenSource tool for Embedding Trojans into Deep Learning Models
Comments: 8 pages, 16 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[229]  arXiv:2003.07505 (cross-list from cs.MM) [pdf, other]
Title: Hide Secret Information in Blocks: Minimum Distortion Embedding
Comments: This paper is accepted for publication in IEEE SPIN 2020 conference
Journal-ref: 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN)
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[230]  arXiv:2003.07949 (cross-list from eess.SY) [pdf, other]
Title: Data-Driven Attack Detection for Linear Systems
Comments: 6 pages, 2 figures
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[231]  arXiv:2003.07982 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Transferability in Wearable Sensor Systems
Comments: 31 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[232]  arXiv:2003.08225 (cross-list from cs.SD) [pdf, other]
Title: Detecting Replay Attacks Using Multi-Channel Audio: A Neural Network-Based Method
Comments: Code of this work is available here: this https URL
Journal-ref: in IEEE Signal Processing Letters, vol. 27, pp. 920-924, 2020
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[233]  arXiv:2003.08365 (cross-list from cs.LG) [pdf, other]
Title: Deep Quaternion Features for Privacy Protection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[234]  arXiv:2003.08500 (cross-list from cs.LG) [pdf, ps, other]
Title: The Cost of Privacy in Asynchronous Differentially-Private Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Optimization and Control (math.OC); Machine Learning (stat.ML)
[235]  arXiv:2003.08580 (cross-list from cs.CY) [pdf, other]
Title: Surveying Vulnerable Populations: A Case Study of Civil Society Organizations
Comments: [v2] Appears in the Workshop on Inclusive Privacy and Security (WIPS) co-located with Symposium on Usable Privacy and Security (SOUPS) 2020; [v1] Appears in the Networked Privacy Workshop co-located with ACM Conference on Human Factors in Computing Systems (CHI) 2020
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[236]  arXiv:2003.08725 (cross-list from cs.LG) [pdf, other]
Title: Privacy-preserving Traffic Flow Prediction: A Federated Learning Approach
Comments: This paper is in the second round of under review of the IEEE Internet of Things Journal
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[237]  arXiv:2003.09262 (cross-list from cs.CV) [pdf, other]
Title: Blockchain meets Biometrics: Concepts, Application to Template Protection, and Trends
Comments: arXiv admin note: text overlap with arXiv:1904.13128
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[238]  arXiv:2003.09347 (cross-list from cs.LG) [pdf, other]
Title: SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing
Comments: Published at AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM DL link: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[239]  arXiv:2003.09481 (cross-list from cs.DB) [pdf, other]
Title: Efficient Oblivious Database Joins
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), 13(11): 2132-2145, 2020
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[240]  arXiv:2003.09744 (cross-list from cs.DC) [pdf, other]
Title: Towards an Enterprise-Ready Implementation of Artificial Intelligence-Enabled, Blockchain-Based Smart Contracts
Authors: Philipp Brune (Neu-Ulm University of Applied Sciences, Neu-Ulm, Germany)
Comments: 4 pages, 2 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[241]  arXiv:2003.10082 (cross-list from cs.MM) [pdf, other]
Title: JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[242]  arXiv:2003.10402 (cross-list from cs.RO) [pdf, other]
Title: DevSecOps in Robotics
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR)
[243]  arXiv:2003.10486 (cross-list from cs.GT) [pdf, other]
Title: AfricaOS: Using a distributed, proposal-based, replicated state machine towards liberation from the Berlin Conference of 1885
Authors: Jovonni L. Pharr
Comments: v0.0.1
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA)
[244]  arXiv:2003.10546 (cross-list from cs.MM) [pdf, ps, other]
Title: Forensic Analysis of Residual Information in Adobe PDF Files
Comments: 11 figures, 1 table
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[245]  arXiv:2003.10577 (cross-list from cs.LG) [pdf, other]
Title: Learning End-to-End Codes for the BPSK-constrained Gaussian Wiretap Channel
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[246]  arXiv:2003.10637 (cross-list from cs.LG) [pdf, other]
Title: FedSel: Federated SGD under Local Differential Privacy with Top-k Dimension Selection
Comments: 18 pages, to be published in DASFAA 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[247]  arXiv:2003.10745 (cross-list from cs.NI) [pdf, other]
Title: Towards Fine-Grained Billing For Cloud Networking
Comments: 7 pages, 3 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[248]  arXiv:2003.10933 (cross-list from cs.LG) [pdf, other]
Title: Learn to Forget: Machine Unlearning via Neuron Masking
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[249]  arXiv:2003.11170 (cross-list from cs.MA) [pdf, other]
Title: Norms and Sanctions as a Basis for Promoting Cybersecurity Practices
Authors: Nirav Ajmeri (1), Shubham Goyal (2), Munindar P. Singh (1) ((1) North Carolina State University, (2) Amazon)
Comments: 10 pages, 4 figures
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR)
[250]  arXiv:2003.11323 (cross-list from cs.LG) [pdf, other]
Title: Plausible Counterfactuals: Auditing Deep Learning Classifiers with Realistic Adversarial Examples
Comments: 7 pages, 5 figures. Accepted for its presentation at WCCI 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[251]  arXiv:2003.11340 (cross-list from cs.CY) [pdf, other]
Title: Towards an Insightful Computer Security Seminar
Comments: 6 pages, 3 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[252]  arXiv:2003.11915 (cross-list from cs.LG) [pdf, other]
Title: robROSE: A robust approach for dealing with imbalanced data in fraud detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Applications (stat.AP); Machine Learning (stat.ML)
[253]  arXiv:2003.11967 (cross-list from cs.CE) [pdf, other]
Title: XBlock-EOS: Extracting and Exploring Blockchain Data From EOSIO
Comments: 15 pages, 12 figures, 7 tables
Subjects: Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR)
[254]  arXiv:2003.11995 (cross-list from cs.IT) [pdf, other]
Title: Secure Groupcast with Shared Keys
Authors: Hua Sun
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[255]  arXiv:2003.12020 (cross-list from cs.LG) [pdf, ps, other]
Title: A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[256]  arXiv:2003.12154 (cross-list from cs.LG) [pdf, other]
Title: Not All Features Are Equal: Discovering Essential Features for Preserving Prediction Privacy
Comments: This paper is presented at the 2021 Web conference (WWW 2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[257]  arXiv:2003.12197 (cross-list from cs.CV) [pdf, other]
Title: HERS: Homomorphically Encrypted Representation Search
Comments: Published in the Trustworthy Biometrics Special Issue of IEEE Transactions on Biometrics, Behavior, and Identity Science 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[258]  arXiv:2003.12375 (cross-list from cs.CY) [pdf, ps, other]
Title: Democratic Value and Money for Decentralized Digital Society
Authors: Bryan Ford
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[259]  arXiv:2003.12613 (cross-list from cs.LG) [pdf, other]
Title: Adaptive Reward-Poisoning Attacks against Reinforcement Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[260]  arXiv:2003.12705 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private Federated Learning for Resource-Constrained Internet of Things
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[261]  arXiv:2003.12909 (cross-list from cs.LG) [pdf, other]
Title: Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning
Comments: ICML 2020
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[262]  arXiv:2003.12920 (cross-list from cs.NI) [pdf, other]
Title: IoT Blockchain Solution for Air Quality Monitoring in SmartCities
Comments: IEEE ANTS2019 Accepted Paper
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[263]  arXiv:2003.13192 (cross-list from cs.DS) [pdf, other]
Title: How to Find a Point in the Convex Hull Privately
Subjects: Data Structures and Algorithms (cs.DS); Computational Geometry (cs.CG); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[264]  arXiv:2003.13296 (cross-list from cs.CV) [pdf, other]
Title: Unsupervised Model Personalization while Preserving Privacy and Scalability: An Open Problem
Comments: CVPR 2020
Journal-ref: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[265]  arXiv:2003.13604 (cross-list from cs.CY) [pdf, ps, other]
Title: 5G Security and Privacy: A Research Roadmap
Comments: A Computing Community Consortium (CCC) white paper, 8 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[266]  arXiv:2003.13667 (cross-list from cs.IT) [pdf, ps, other]
Title: Semantic Private Information Retrieval
Comments: submitted for publication
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[267]  arXiv:2003.13670 (cross-list from cs.CY) [pdf, ps, other]
Title: Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[268]  arXiv:2003.13761 (cross-list from cs.LG) [pdf, ps, other]
Title: Concentrated Differentially Private and Utility Preserving Federated Learning
Comments: Under submission
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[269]  arXiv:2003.14053 (cross-list from cs.CV) [pdf, other]
Title: Inverting Gradients -- How easy is it to break privacy in federated learning?
Comments: 23 pages, 20 figures. The first three authors contributed equally
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[270]  arXiv:2003.14243 (cross-list from cs.SI) [pdf, ps, other]
Title: A Fully Distributed, Privacy Respecting Approach for Back-tracking of Potentially Infectious Contacts
Authors: Adam Wolisz
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[271]  arXiv:2003.14265 (cross-list from cs.DS) [pdf, ps, other]
Title: A Framework for Adversarially Robust Streaming Algorithms
Comments: Conference version in PODS 2020. Version 3 addressing journal referees' comments; improved exposition of sketch switching
Journal-ref: J. ACM 69, 2, Article 17 (April 2022)
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[272]  arXiv:2003.14271 (cross-list from cs.LO) [pdf, ps, other]
Title: UTxO- vs account-based smart contract blockchain programming paradigms
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[273]  arXiv:2003.00001 (cross-list from math.HO) [pdf, other]
Title: The mathematics of Bitcoin
Comments: 7 pages, 4 figures
Journal-ref: EMS Newsletter [115 (2020)], [31-37]. \c{opyright} European Mathematical Society
Subjects: History and Overview (math.HO); Cryptography and Security (cs.CR)
[274]  arXiv:2003.00177 (cross-list from eess.SP) [pdf, ps, other]
Title: Optimal Feature Manipulation Attacks Against Linear Regression
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[275]  arXiv:2003.00633 (cross-list from math.AG) [pdf, ps, other]
Title: Counting Richelot isogenies between superspecial abelian surfaces
Comments: 16 pages, the replacement of the paper "Counting superspecial Richelot isogenies and its cryptographic application."
Subjects: Algebraic Geometry (math.AG); Cryptography and Security (cs.CR)
[276]  arXiv:2003.00997 (cross-list from stat.ML) [pdf, other]
Title: Generating Higher-Fidelity Synthetic Datasets with Privacy Guarantees
Comments: 7 pages, 4 figures, 1 table
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[277]  arXiv:2003.03713 (cross-list from quant-ph) [pdf, other]
Title: Shannon-Limit Approached Information Reconciliation for Quantum Key Distribution
Comments: 15 pages, 4 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[278]  arXiv:2003.04493 (cross-list from stat.ML) [pdf, other]
Title: Sharp Composition Bounds for Gaussian Differential Privacy via Edgeworth Expansion
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[279]  arXiv:2003.07610 (cross-list from quant-ph) [pdf, ps, other]
Title: Comment on "Quantum key agreement protocol"
Comments: 5 pages, single column (Publication detail updated; updated the text)
Journal-ref: International Journal of Quantum Information (2020)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[280]  arXiv:2003.07775 (cross-list from stat.ML) [pdf, ps, other]
Title: Deep generative models in DataSHIELD
Comments: 13 pages, 4 figures
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[281]  arXiv:2003.09019 (cross-list from quant-ph) [pdf, other]
Title: Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography
Comments: Update: Multivariate signature scheme Rainbow is broken by Ward Beullens. Supersingular Isogeny Diffie-Hellman protocol (SIDH) is broken by Wouter Castryck and Thomas Decru
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[282]  arXiv:2003.10712 (cross-list from quant-ph) [pdf, ps, other]
Title: Information-theoretically-sound non-interactive classical verification of quantum computing with trusted center
Authors: Tomoyuki Morimae
Comments: 14 pages, no figure
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[283]  arXiv:2003.11286 (cross-list from math.AG) [pdf, ps, other]
Title: Parallel Computation of Optimal Ate Cryptographic Pairings at the $128$, $192$ and $256$-bit security levels using elliptic net algorithm
Subjects: Algebraic Geometry (math.AG); Cryptography and Security (cs.CR); Number Theory (math.NT)
[284]  arXiv:2003.12052 (cross-list from stat.ML) [pdf, other]
Title: Corella: A Private Multi Server Learning Approach based on Correlated Queries
Comments: 13 pages, 9 figures, 4 tables
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[285]  arXiv:2003.12095 (cross-list from quant-ph) [pdf, ps, other]
Title: Concerning Quantum Identification Without Entanglement
Comments: 8 pages, 0 figures, 1 protocol review
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 286 entries: 1-285 | 286 ]
[ showing 285 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)