We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020

[ total of 314 entries: 1-314 ]
[ showing 314 entries per page: fewer | more ]
[1]  arXiv:2004.00108 [pdf, ps, other]
Title: How to transform the Apple's application 'Find My' into a toolbox for whistleblowers
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2004.00234 [pdf, other]
Title: Botnet Detection Using Recurrent Variational Autoencoder
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2004.00282 [pdf]
Title: An Efficient Anonymous Authentication Scheme Using Registration List in VANETs
Comments: 5 pages, 4 figures, Accepted for ICEE2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[4]  arXiv:2004.00318 [pdf]
Title: Research of Caller ID Spoofing Launch, Detection, and Defense
Journal-ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 7(3), 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[5]  arXiv:2004.00333 [pdf, other]
Title: Probing Channel Balances in the Lightning Network
Comments: 12 pages 5 figures
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2004.00509 [pdf, ps, other]
Title: On the privacy of a code-based single-server computational PIR scheme
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[7]  arXiv:2004.00939 [pdf, other]
Title: CORSICA: Cross-Origin Web Service Identification
Comments: Accepted to ASIACCS2020
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2004.00948 [pdf, other]
Title: Two high capacity text steganography schemes based on color coding
Comments: 19 pages , 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2004.01045 [pdf, other]
Title: Topological Properties of Multi-Party Blockchain Transactions
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[10]  arXiv:2004.01220 [pdf, ps, other]
Title: Automated Attacker Synthesis for Distributed Protocols
Comments: 24 pages, 15 figures
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)
[11]  arXiv:2004.01312 [pdf, other]
Title: Preserving Statistical Privacy in Distributed Optimization
Comments: The updated version has simpler proofs. The paper has been peer-reviewed, and accepted for the IEEE Control Systems Letters (L-CSS 2021)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[12]  arXiv:2004.01343 [pdf]
Title: Efficient UAV Physical Layer Security based on Deep Learning and Artificial Noise
Comments: 8 pages, 3 tables, 19 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Signal Processing (eess.SP)
[13]  arXiv:2004.01403 [pdf, ps, other]
Title: A "Final" Security Bug
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2004.01556 [pdf]
Title: Phishing Attacks: Detection And Prevention
Comments: 5 pages, 7 figures, 1 table, essential information
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2004.01712 [pdf, other]
Title: RAPPER: Ransomware Prevention via Performance Counters
Comments: Australian Workshop on Offensive Cryptography, Kangacrypt 2018. arXiv admin note: substantial text overlap with arXiv:1802.03909
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[16]  arXiv:2004.01749 [pdf, other]
Title: Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam
Comments: 30 pages, 33 figures. Extended journal version of arXiv:1906.10762
Journal-ref: J. Cyber Secur. Mobil. 9 (2), 2020, 265-300
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2004.01807 [pdf, other]
Title: TRRespass: Exploiting the Many Sides of Target Row Refresh
Authors: Pietro Frigo (1), Emanuele Vannacci (1), Hasan Hassan (2), Victor van der Veen (3), Onur Mutlu (2), Cristiano Giuffrida (1), Herbert Bos (1), Kaveh Razavi (1) ((1) Vrije Universiteit Amsterdam, (2) ETH Zurich, (3) Qualcomm Technologies Inc.)
Comments: 16 pages, 16 figures, in proceedings IEEE S&P 2020
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2004.01855 [pdf, other]
Title: Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies
Comments: This is the 2nd version (improved based on reviewers feedback) of the accepted paper at 13th International Conference on Computational Intelligence in Security for Information Systems
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2004.01891 [pdf, ps, other]
Title: Scalar Product Lattice Computation for Efficient Privacy-preserving Systems
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2004.01958 [pdf, other]
Title: BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
Comments: 32 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[21]  arXiv:2004.02020 [pdf, other]
Title: Building secure distributed applications the DECENT way
Comments: 17 pages, 21 figures. V3: Added a section to introduce a distributed revoker design; Added details on Decent Handshake protocol; Revised the description on data sealing mechanism; Added a discussion of future research directions related to automatic component verification; Added and replaced 11 figures; V2: Added formal verification result for the protocols; clarified verifiers and revokers
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[22]  arXiv:2004.02183 [pdf, other]
Title: Approximate Manifold Defense Against Multiple Adversarial Perturbations
Comments: Workshop on Machine Learning with Guarantees, NeurIPS 2019. IJCNN, 2020 (full paper)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[23]  arXiv:2004.02229 [pdf, other]
Title: FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning
Comments: Revised version, contains some more experiments and fixes minor typos in the paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2004.02245 [pdf, ps, other]
Title: Investigations on c-(almost) perfect nonlinear functions
Comments: arXiv admin note: text overlap with arXiv:1909.03628
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO); Number Theory (math.NT)
[25]  arXiv:2004.02264 [pdf, other]
Title: PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Comments: In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop (CCSW'19)
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2004.02354 [pdf, other]
Title: DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping
Comments: Preprint of the work accepted at the Design Automation Conference (DAC) 2020
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[27]  arXiv:2004.02516 [pdf, ps, other]
Title: Security Analysis and Design for TAGA: a Touch and Go Assistant in the Aerospace Domain
Comments: 19 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2004.02543 [pdf]
Title: SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[29]  arXiv:2004.02770 [pdf, other]
Title: Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Comments: 6 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Signal Processing (eess.SP)
[30]  arXiv:2004.02796 [pdf, other]
Title: Certifying Provenance of Scientific Datasets with Self-sovereign Identity and Verifiable Credentials
Comments: Submitted to 12th International Workshop on Science Gateways (IWSG 2020), 10-12 June 2020
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2004.03002 [pdf, ps, other]
Title: Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users
Comments: 45 pages, 4 figures. To appear on FORC 2020
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2004.03178 [pdf, other]
Title: Challenges and Opportunities in CPS Security: A Physics-based Perspective
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[33]  arXiv:2004.03216 [pdf]
Title: Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST)
Authors: Jinfeng Li
Comments: This paper has been published in Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-8, Vol. 4, No. 3, 1st July 2020. Available at: this https URL
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-8, Vol. 4, No. 3, 1st July 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[34]  arXiv:2004.03369 [pdf]
Title: Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
Comments: 14 pages,7 figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[35]  arXiv:2004.03407 [pdf, other]
Title: Scalable & Resilient Vehicle-Centric Certificate Revocation List Distribution in Vehicular Communication Systems
Comments: 17 pages, 14 figures, IEEE Transactions on Mobile Computing (TMC). arXiv admin note: substantial text overlap with arXiv:1807.02706
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2004.03544 [pdf, other]
Title: PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing
Comments: 22 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2004.03728 [pdf, other]
Title: Practical Data Poisoning Attack against Next-Item Recommendation
Journal-ref: Proceedings of The Web Conference 2020
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[38]  arXiv:2004.03756 [pdf, other]
Title: DashCam Pay: A System for In-vehicle Payments Using Face and Voice
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[39]  arXiv:2004.03841 [pdf, other]
Title: Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes
Comments: This version has been accepted in ACM Transactions on Cyber-Physical Systems (TCPS). A preliminary version of this paper was accepted in ACM Conference on Data and Application Security and Privacy (CODASPY) 2019. arXiv admin note: substantial text overlap with arXiv:1901.08618
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[40]  arXiv:2004.03960 [pdf]
Title: High Accuracy Phishing Detection Based on Convolutional Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41]  arXiv:2004.03976 [pdf]
Title: Improved Secure Efficient Delegated Private Set Intersection
Comments: 6 pages, presented in proceedings of the 28th Iranian Conference on Electrical Engineering (ICEE 2020). Final version of the paper has been added
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2004.04059 [pdf, other]
Title: TraceSecure: Towards Privacy Preserving Contact Tracing
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2004.04145 [pdf, ps, other]
[44]  arXiv:2004.04457 [pdf, other]
Title: The Blob: provable incompressibility and traceability in the whitebox model
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2004.04497 [pdf, other]
Title: Efficient and Secure Flash-based Gaming CAPTCH
Journal-ref: Journal of Parallel and Distributed Computing, 2020
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2004.04597 [pdf, other]
Title: Challenges in Forecasting Malicious Events from Incomplete Data
Comments: Accepted in The Fifth Workshop on Computational Methods in Online Misbehavior, Companion Proceedings of The 2020 World Wide Web Conference (WWW '20)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[47]  arXiv:2004.04605 [pdf, ps, other]
Title: The cost of Bitcoin mining has never really increased
Authors: Yo-Der Song, Tomaso Aste (University College London)
Comments: 16 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); General Finance (q-fin.GN)
[48]  arXiv:2004.04626 [pdf]
Title: Do you need a blockchain in construction? Use case categories and decision framework for DLT design options
Comments: to be published in Advanced Engineering Informatics
Journal-ref: Advanced Engineering Informatics, Volume 45, August 2020, 101094
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2004.04631 [pdf, other]
Title: Private Knowledge Transfer via Model Distillation with Generative Adversarial Networks
Authors: Di Gao, Cheng Zhuo
Comments: 9 pages, 4 figures, ECAI 2020, the 24th European Conference on Artificial Intelligence
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[50]  arXiv:2004.04647 [pdf, other]
Title: Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[51]  arXiv:2004.04676 [pdf, other]
Title: An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies
Comments: 10 pages, 2 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[52]  arXiv:2004.04692 [pdf, other]
Title: Rethinking the Trigger of Backdoor Attack
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[53]  arXiv:2004.04909 [pdf, other]
Title: A Framework for Behavior Privacy Preserving in Radio Frequency Signal
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[54]  arXiv:2004.05116 [pdf, other]
Title: A note on blind contact tracing at scale with applications to the COVID-19 pandemic
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2004.05248 [pdf, other]
Title: Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity
Comments: Invited paper for the 2020 National Cyber Summit, June 2-4, 2020, in Huntsville, AL
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[56]  arXiv:2004.05251 [pdf, other]
Title: CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2004.05258 [pdf, other]
Title: Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification
Comments: 11 pages with 10figures. This is the accepted version of the paper published in IEEE COMPSAC 2022. The published version is available at this http URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[58]  arXiv:2004.05265 [pdf, other]
Title: Visual Spoofing in content based spam detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[59]  arXiv:2004.05289 [pdf, other]
Title: Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[60]  arXiv:2004.05419 [pdf, other]
Title: A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context
Comments: 16 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2004.05500 [pdf, ps, other]
Title: Analysing Flow Security Properties in Virtualised Computing Systems
Authors: Chunyan Mu
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[62]  arXiv:2004.05523 [pdf, other]
Title: DeepEDN: A Deep Learning-based Image Encryption and Decryption Network for Internet of Medical Things
Journal-ref: IEEE Internet of Things Journal,2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[63]  arXiv:2004.05574 [pdf, other]
Title: PrivEdge: From Local to Distributed Private Training and Prediction
Comments: IEEE Transactions on Information Forensics and Security (TIFS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2004.05597 [pdf, ps, other]
Title: How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes
Authors: Chris J Mitchell
Comments: This version adds a brief analysis of a recently published group authentication scheme very closely related to one of the three analysed key pre-distribution schemes
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2004.05693 [pdf, other]
Title: SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space
Comments: 19 pages, 9 figures, submitted to Computers & Security, accepted
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2004.05817 [pdf, other]
Title: Blockchain in the Internet of Things: Architectures and Implementation
Journal-ref: in Proc. IEEE Computer Software and Applications Conference, COMPSAC, 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[67]  arXiv:2004.06080 [pdf, other]
Title: Which Blockchain to choose? A decision support tool to guide the choice of a Blockchain technology
Authors: Nicolas Six (CRI), Nicolas Herbaut (CRI), Camille Salinesi (CRI)
Comments: in French
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2004.06081 [pdf]
Title: COVID-19 Blockchain Framework: Innovative Approach
Authors: Mohamed Torky, Aboul Ella Hassanien (Scientific Research Group in Egypt)
Comments: 22 pages, 11 Figures
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2004.06195 [pdf, other]
Title: AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs
Authors: Mordechai Guri
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2004.06235 [pdf, other]
Title: ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things
Comments: arXiv admin note: text overlap with arXiv:1909.00493
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2004.06299 [pdf, other]
Title: Trusted Wireless Monitoring based on Blockchain over NB-IoT Connectivity
Comments: 7 pages, 6 figures, Accepted in IEEE Communication Magazine
Journal-ref: IEEE Communication Magazine 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72]  arXiv:2004.06348 [pdf, other]
Title: Distributed Privacy Preserving Iterative Summation Protocols
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[73]  arXiv:2004.06386 [pdf, other]
Title: Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Comments: To be published in the proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS'20)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[74]  arXiv:2004.06403 [pdf, other]
Title: PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions for Multiple Items
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2004.06417 [pdf, other]
Title: Resilient Self-Debugging Software Protection
Comments: 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2004.06432 [pdf, other]
Title: A Machine Learning-based Approach to Build Zero False-Positive IPSs for Industrial IoT and CPS with a Case Study on Power Grids Security
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2004.06563 [pdf, other]
Title: Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis
Comments: 20 pages, published in SecureComm 2019, see this https URL
Journal-ref: In International Conference on Security and Privacy in Communication Systems, pp. 278-298. Springer, Cham, 2019
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2004.06588 [pdf, ps, other]
Title: Towards Scalable Security in Interference Channels With Arbitrary Number of Users
Comments: Revision 2
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[79]  arXiv:2004.06672 [pdf, other]
Title: Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies
Authors: Thomas Groß
Comments: 40 pages. The short version of this paper is appearing in the Proceedings of the 9\textsuperscript{th} Workshop on Socio-Technical Aspects in Security (STAST 2019), pp. 1--24, LNCS, Springer Verlag (2020). Preregistered at the Open Science Framework: osf.io/549qn/
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2004.06700 [pdf, other]
Title: Secure Federated Learning in 5G Mobile Networks
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[81]  arXiv:2004.06795 [pdf]
Title: Blockchain in Healthcare and Medicine: A Contemporary Research of Applications, Challenges, and Future Perspectives
Comments: 16 Pages, 4 Figure, 1 Table, 64 References
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[82]  arXiv:2004.06818 [pdf, other]
Title: Privacy-Preserving Contact Tracing: current solutions and open questions
Authors: Qiang Tang
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2004.06911 [pdf, other]
Title: How to Securely Prune Bitcoin's Blockchain
Comments: To be published in the proceedings of the 2020 IFIP Networking Conference (NETWORKING'20)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[84]  arXiv:2004.06933 [pdf, other]
Title: An efficient deception architecture for cloud-based virtual networks
Journal-ref: Kuwait Journal of Science, 46(3) (2019)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[85]  arXiv:2004.06954 [pdf, other]
Title: Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86]  arXiv:2004.07061 [pdf, other]
Title: A Polynomial Interpolation based Quantum Key Reconciliation Protocol: Error Correction without Information Leakage
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2004.07063 [pdf, other]
Title: Hardening X.509 Certificate Issuance using Distributed Ledger Technology
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[88]  arXiv:2004.07140 [pdf, other]
Title: A Study of Blockchain Oracles
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[89]  arXiv:2004.07179 [pdf, other]
Title: Interpretable Probabilistic Password Strength Meters via Deep Learning
Comments: An abridged version of this paper appears in the proceedings of the 25th European Symposium on Research in Computer Security (ESORICS) 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[90]  arXiv:2004.07223 [pdf, other]
Title: Bounding, Concentrating, and Truncating: Unifying Privacy Loss Composition for Data Analytics
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2004.07297 [pdf, ps, other]
Title: Secure protocol to protect location privacy in distance calculation
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2004.07376 [pdf]
Title: COVID-19 Antibody Test / Vaccination Certification: There's an app for that
Comments: Final published version in IEEE OJEMB, June 2020: 17 pages (8 main paper, 7 supplementary materials, 2 graphical abstract), 11 figures (7 main, 3 supplementary, 1 graphical abstract), 53 references (28 main, 25 supplementary)
Journal-ref: IEEE Open Journal of Engineering in Medicine and Biology, vol. 1, pp. 148-155, June 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[93]  arXiv:2004.07425 [pdf, ps, other]
Title: Differentially Private Linear Regression over Fully Decentralized Datasets
Comments: FL-NeurIPS'19
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2004.07427 [pdf, other]
Title: Asymmetrical Vertical Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[95]  arXiv:2004.07442 [pdf, other]
Title: Voice-Indistinguishability: Protecting Voiceprint in Privacy-Preserving Speech Data Release
Comments: The paper has been accepted by the IEEE International Conference on Multimedia & Expo 2020(ICME 2020)
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[96]  arXiv:2004.07606 [pdf, ps, other]
Title: Short Paper: Design and Evaluation of Privacy-preserved Supply Chain System based on Public Blockchain
Comments: 4 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[97]  arXiv:2004.07618 [pdf, other]
Title: A Secure and Improved Multi Server Authentication Protocol Using Fuzzy Commitment
Comments: 19 Pages, 9 Figures, 3 Tables, 45 References
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2004.07635 [pdf, other]
Title: Local Search Trajectories over S-box Space
Comments: 12 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2004.07678 [pdf, other]
Title: Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey
Comments: 35 pages, 8 figures, submitted to ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[100]  arXiv:2004.07723 [pdf, other]
Title: Covid Notions: Towards Formal Definitions -- and Documented Understanding -- of Privacy Goals and Claimed Protection in Proximity-Tracing Services
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2004.07877 [pdf, other]
Title: AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2004.07919 [pdf, other]
Title: A Framework for Enhancing Deep Neural Networks Against Adversarial Malware
Comments: A fully-fledge version for the preliminary paper arXiv:1812.08108 | D. Li, Q. Li, Y. Ye, and S. Xu, "A Framework for Enhancing Deep Neural Networks Against Adversarial Malware", in IEEE Transactions on Network Science and Engineering
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[103]  arXiv:2004.07943 [pdf]
Title: Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2004.07955 [pdf, other]
Title: Targeted Attack for Deep Hashing based Retrieval
Comments: Accepted by ECCV 2020 as Oral
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[105]  arXiv:2004.08559 [pdf, other]
Title: On the (Un)Reliability of Privacy Policies in Android Apps
Journal-ref: Proc.of the IEEE International Joint Conference on Neural Networks (IJCNN 2020)
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2004.08602 [pdf, other]
Title: CryptoCam: Privacy Conscious Open Circuit Television
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[107]  arXiv:2004.08715 [pdf]
Title: Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem, TSP-NP Technique
Comments: 2019 IEEE Conference on Application, Information and Network Security (AINS)
Journal-ref: 2020 INSPEC Accession Number: 19300268 Electronic ISBN: 978-1-7281-3306-5 Print on Demand(PoD) ISBN: 978-1-7281-3307-2
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[108]  arXiv:2004.08762 [pdf, other]
Title: RelSen: An Optimization-based Framework for Simultaneously Sensor Reliability Monitoring and Data Cleaning
Comments: accepted in CIKM 2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[109]  arXiv:2004.08812 [pdf, other]
Title: WeTrace -- A Privacy-preserving Mobile COVID-19 Tracing Approach and Application
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2004.08836 [pdf, other]
Title: Trollthrottle -- Raising the Cost of Astroturfing
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2004.08856 [pdf, ps, other]
Title: Local Differential Privacy based Federated Learning for Internet of Things
Comments: This paper appears in IEEE Internet of Things Journal (IoT-J)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2004.08887 [pdf, other]
Title: DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2004.08967 [pdf]
Title: An overview of Intrusion Detection and Prevention Systems
Comments: 4 pages
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2004.08992 [pdf, other]
Title: ferify: A Virtual Machine File Protection System against Zero-Day Attacks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[115]  arXiv:2004.09005 [pdf, other]
Title: A Secure Location-based Alert System with Tunable Privacy-Performance Trade-off
Comments: 32 pages, GeoInformatica 2020
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[116]  arXiv:2004.09062 [pdf, other]
Title: S3Library: Automatically Eliminating C/C++ Buffer Overflow using Compatible Safer Libraries
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2004.09212 [pdf, other]
Title: A System Dynamics Model of Bitcoin: Mining as an Efficient Market and the Possibility of "Peak Hash"
Comments: 17 pages, 11 figures. For associated model, see: this https URL
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[118]  arXiv:2004.09252 [pdf, other]
Title: MemShield: GPU-assisted software memory encryption
Comments: 14 pages, 2 figures. In proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, October 19-22 2020, Rome, Italy
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[119]  arXiv:2004.09274 [pdf, other]
Title: A New Intrusion Detection System using the Improved Dendritic Cell Algorithm
Comments: 24 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[120]  arXiv:2004.09453 [pdf, other]
Title: Secure Boot from Non-Volatile Memory for Programmable SoC Architectures
Comments: 9 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[121]  arXiv:2004.09481 [pdf, ps, other]
Title: Connecting Robust Shuffle Privacy and Pan-Privacy
Comments: This version removes a uniformity tester which we found does not satisfy pure d.p
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[122]  arXiv:2004.09494 [pdf, other]
Title: Survey of Crosschain Communications Protocols
Authors: Peter Robinson
Comments: 17 pages, 3 tables, 16 figures. arXiv admin note: text overlap with arXiv:2003.00903
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2004.09583 [pdf, other]
Title: FlashFlow: A Secure Speed Test for Tor
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2004.09674 [pdf, ps, other]
Title: New Approaches for Quantum Copy-Protection
Comments: major revisions in definitions and security proofs
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[125]  arXiv:2004.09679 [pdf, other]
Title: MGX: Near-Zero Overhead Memory Protection for Data-Intensive Accelerators
Comments: Accepted to the 49th International Symposium on Computer Architecture (ISCA'22)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[126]  arXiv:2004.09713 [pdf, other]
Title: Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version
Subjects: Cryptography and Security (cs.CR)
[127]  arXiv:2004.09789 [pdf, other]
Title: PhishOut: Effective Phishing Detection Using Selected Features
Comments: 2020 27th International Conference on Telecommunications (ICT), p. 5, Kuta, Bali
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2004.09966 [pdf, other]
Title: Group Key Agreement in Information Centric Networks with Tree Group Diffie-Hellman
Comments: 4 pages, in French, 3 figures, submitted to CoRes 2019
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[129]  arXiv:2004.09982 [pdf, other]
Title: A review on mathematical strength and analysis of Enigma
Comments: Enigma Machine, Mathematical Strength
Subjects: Cryptography and Security (cs.CR); History and Overview (math.HO)
[130]  arXiv:2004.10010 [pdf, other]
Title: Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture
Comments: 17 Pages, SKM-2019
Journal-ref: Springer, CCIS, Vol. 1186, pp. 82-97, 2020
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2004.10020 [pdf, other]
Title: Data Poisoning Attacks on Federated Machine Learning
Authors: Gan Sun, Yang Cong (Senior Member, IEEE), Jiahua Dong, Qiang Wang, Ji Liu
Comments: 8pages,16 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[132]  arXiv:2004.10278 [pdf, ps, other]
Title: On the ideal shortest vector problem over random rational primes
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[133]  arXiv:2004.10312 [pdf, ps, other]
Title: Bit Commitment for Lottery and Auction on Quantum Blockchain
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2004.10394 [pdf, other]
Title: Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges
Comments: This is a personal copy of the authors. Not for redistribution. The final version of the paper is available through the IEEExplore Digital Library, at the link: this https URL, with the DOI: 10.1109/COMST.2020.3017665
Journal-ref: IEEE Communications Surveys & Tutorials, 2020
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[135]  arXiv:2004.10411 [pdf, other]
Title: A NIS Directive compliant Cybersecurity Maturity Assessment Framework
Comments: 6 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2004.10435 [pdf, other]
Title: On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions
Comments: 18 pages, 7 tables, 7 figures
Journal-ref: IEEE Internet of Things Journal, Vol. 8, No. 1, 2021
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2004.10488 [pdf, ps, other]
Title: Decentralized Cross-Blockchain Asset Transfers
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[138]  arXiv:2004.10617 [pdf, other]
Title: Twins: BFT Systems Made Robust
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2004.10670 [pdf, other]
Title: A General Difficulty Control Algorithm for Proof-of-Work Based Blockchains
Comments: 5 pages, to be published in ICASSP 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Signal Processing (eess.SP)
[140]  arXiv:2004.10672 [pdf, other]
Title: Embedded Policing and Policy Enforcement based Security in the era of Digital-Physical Convergence for Next-Generation Vehicular Electronics
Comments: 14 pages, 9 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[141]  arXiv:2004.10674 [pdf, other]
Title: Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems
Comments: 2020 SPIE Defense + Commercial Sensing
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[142]  arXiv:2004.10690 [pdf]
Title: Advanced Persistent Threat: Detection and Defence
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2004.10781 [pdf, other]
Title: Cyberattacks and Countermeasures For In-Vehicle Networks
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2004.10849 [pdf, other]
Title: MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot
Comments: Future Generation Computer Systems (2020)
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:2004.10926 [pdf, other]
Title: Performance Evaluation of Secure Multi-party Computation on Heterogeneous Nodes
Authors: Zhou Ni, Rujia Wang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[146]  arXiv:2004.10952 [pdf, other]
Title: Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2004.11015 [pdf, other]
Title: Encoding Power Traces as Images for Efficient Side-Channel Analysis
Authors: Benjamin Hettwer (1 and 2), Tobias Horn (3), Stefan Gehrer (4), Tim Güneysu (2) ((1) Robert Bosch GmbH, Corporate Sector Research, Renningen, Germany, (2) Horst Görtz Institute for IT-Security, Ruhr University Bochum, Germany,(3) Esslingen University of Applied Sciences, Esslingen, Germany, (4) Robert Bosch LLC, Corporate Sector Research, Pittsburgh, USA)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[148]  arXiv:2004.11071 [pdf, other]
Title: SEVurity: No Security Without Integrity -- Breaking Integrity-Free Memory Encryption with Minimal Assumptions
Authors: Luca Wilke (1), Jan Wichelmann (1), Mathias Morbitzer (2), Thomas Eisenbarth (1) ((1) University of Lübeck, (2) Fraunhofer AISEC)
Comments: 14 pages, 6 figures, accepted at IEEE S&P 2020
Journal-ref: Proceedings of IEEE S&P, Year 2020, Volume 1, Pages 1746-1759
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:2004.11361 [pdf, other]
Title: Enhancing Privacy via Hierarchical Federated Learning
Comments: 4 pages, 1 figure, workshop
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2004.11368 [pdf, other]
Title: Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks
Comments: 15 pages, 12 figures, 8 tables, formatted for ASIACCS 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[151]  arXiv:2004.11370 [pdf, other]
Title: Live Trojan Attacks on Deep Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[152]  arXiv:2004.11502 [pdf]
Title: Having our omic cake and eating it too: Evaluating User Response to using Blockchain Technology for Private & Secure Health Data Management and Sharing
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[153]  arXiv:2004.11516 [pdf, other]
Title: Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[154]  arXiv:2004.11527 [pdf, other]
Title: A Trend-following Trading Indicator on Homomorphically Encrypted Data
Comments: Accepted as a short paper by the 17th International Conference on Security and Cryptography (SECRYPT 2020)
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2004.11552 [pdf, other]
Title: Optimal Threshold Padlock Systems
Authors: Jannik Dreier (PESTO), Jean-Guillaume Dumas (CASC), Pascal Lafourcade (LIMOS), Léo Robert (LIMOS)
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[156]  arXiv:2004.11556 [pdf, other]
Title: Benefits and Pitfalls of Using Capture the Flag Games in University Courses
Comments: ACM SIGCSE 2020 conference, 7 pages, 5 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[157]  arXiv:2004.11575 [pdf, other]
Title: KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems
Comments: ACM SIGCSE 2020 conference, 7 pages, 5 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2004.11665 [pdf]
[159]  arXiv:2004.11898 [pdf, other]
Title: Adversarial Machine Learning in Network Intrusion Detection Systems
Comments: 25 pages, 6 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[160]  arXiv:2004.12179 [pdf, other]
Title: Best Practices for IoT Security: What Does That Even Mean?
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2004.12183 [pdf]
Title: Aim Low, Shoot High: Evading Aimbot Detectors by Mimicking User Behavior
Comments: 6 pages
Journal-ref: European Workshop on Systems Security (EuroSec) 2020, co-located with the European Conference on Computer Systems (EuroSys)
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2004.12216 [pdf, other]
Title: Privacy Preserving Distributed Energy Trading
Subjects: Cryptography and Security (cs.CR)
[163]  arXiv:2004.12264 [pdf, other]
Title: A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Comments: 23 pages
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2004.12438 [pdf]
Title: Towards Blockchain for Decentralized Self-Organizing Wireless Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[165]  arXiv:2004.12442 [pdf, other]
Title: Airmed: Efficient Self-Healing Network of Low-End Devices
Comments: 13 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2004.12571 [pdf, other]
Title: Exploiting Defenses against GAN-Based Feature Inference Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[167]  arXiv:2004.12581 [pdf, ps, other]
Title: Multi-IF : An Approach to Anomaly Detection in Self-Driving Systems
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2004.12768 [pdf, other]
Title: Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Performance (cs.PF)
[169]  arXiv:2004.12793 [pdf, other]
Title: EventWarden: A Decentralized Event-driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum-like Blockchains
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2004.12885 [pdf, other]
Title: LIO*: Low Level Information Flow Control in F*
Comments: Submitted to ICFP
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[171]  arXiv:2004.13002 [pdf, other]
Title: A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[172]  arXiv:2004.13004 [pdf, other]
Title: ML-driven Malware that Targets AV Safety
Comments: Accepted for DSN 2020
Journal-ref: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Robotics (cs.RO)
[173]  arXiv:2004.13006 [pdf, other]
Title: NetML: A Challenge for Network Traffic Analytics
Comments: 27 pages, 39 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)
[174]  arXiv:2004.13013 [pdf, other]
Title: Harnessing adversarial examples with a surprisingly simple defense
Authors: Ali Borji
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[175]  arXiv:2004.13107 [pdf]
Title: Identity Management on Blockchain -- Privacy and Security Aspects
Comments: extended version of "Identity Management on Blockchain - Privacy and Security Aspects" available at this https URL
Subjects: Cryptography and Security (cs.CR)
[176]  arXiv:2004.13219 [pdf, other]
Title: User Concerns & Tradeoffs in Technology-Facilitated Contact Tracing
Journal-ref: Digital Government: Research and Practice, 2020. Volume 2, Issue 1
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[177]  arXiv:2004.13239 [pdf, other]
Title: A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[178]  arXiv:2004.13262 [pdf]
Title: Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks?
Comments: 12
Journal-ref: Australasian Conference on Information Systems, Perth, 2019
Subjects: Cryptography and Security (cs.CR)
[179]  arXiv:2004.13263 [pdf, other]
Title: Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks
Comments: For associated code, see this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[180]  arXiv:2004.13293 [pdf, other]
Title: Epione: Lightweight Contact Tracing with Strong Privacy
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2004.13354 [pdf, other]
Title: SGX-SSD: A Policy-based Versioning SSD with Intel SGX
Comments: 7 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[182]  arXiv:2004.13438 [pdf]
Title: BlockSim: An Extensible Simulation Tool for Blockchain Systems
Comments: Frontiers in Blockchain: this https URL
Journal-ref: Frontiers in Blockchain 3(2020)
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[183]  arXiv:2004.13709 [pdf, other]
Title: A Low-Power Dual-Factor Authentication Unit for Secure Implantable Devices
Comments: Published in 2020 IEEE Custom Integrated Circuits Conference (CICC)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Systems and Control (eess.SY)
[184]  arXiv:2004.13825 [pdf, other]
Title: Scalable Attack on Graph Data by Injecting Vicious Nodes
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[185]  arXiv:2004.13890 [pdf]
Title: Customer Data Sharing Platform: A Blockchain-Based Shopping Cart
Comments: To appear in IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC)
Subjects: Cryptography and Security (cs.CR)
[186]  arXiv:2004.14033 [pdf, other]
Title: AuthSC: Mind the Gap between Web and Smart Contracts
Comments: 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[187]  arXiv:2004.14212 [pdf, other]
Title: Specifying a Cryptographical Protocol in Lustre and SCADE
Authors: Lina Marsso
Comments: In Proceedings MARS 2020, arXiv:2004.12403. arXiv admin note: text overlap with arXiv:1703.06573
Journal-ref: EPTCS 316, 2020, pp. 149-199
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[188]  arXiv:2004.14322 [pdf, other]
Title: Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[189]  arXiv:2004.14334 [pdf, ps, other]
Title: Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[190]  arXiv:2004.14360 [pdf, ps, other]
Title: Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2004.14691 [pdf, other]
Title: A Cost-efficient IoT Forensics Framework with Blockchain
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Networking and Internet Architecture (cs.NI)
[192]  arXiv:2004.14759 [pdf, ps, other]
Title: Privacy Preservation in Epidemic Data Collection
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2004.14777 [pdf, other]
Title: Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices
Comments: 7 pages, 5 figures, 10 tables, in Proc Hawaii International Conference on System Science (HICSS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[194]  arXiv:2004.14798 [pdf, other]
Title: RAIN: A Simple Approach for Robust and Accurate Image Classification Networks
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[195]  arXiv:2004.14804 [pdf, other]
Title: Real-Time Energy Monitoring in IoT-enabled Mobile Devices
Comments: 4 pages, 6 figures, accepted DATE 2020 conference
Subjects: Cryptography and Security (cs.CR)
[196]  arXiv:2004.14826 [pdf, other]
Title: Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph
Comments: 9 pages, 7 figures, To appear in the 13th ACM Web Science Conference 2021 (WebSci '21), June 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Machine Learning (stat.ML)
[197]  arXiv:2004.14861 [pdf, other]
Title: Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[198]  arXiv:2004.14924 [pdf]
Title: Non-Volatile Kernel Root kit Detection and Prevention in Cloud Computing
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2004.00010 (cross-list from cs.DS) [pdf, other]
Title: The Discrete Gaussian for Differential Privacy
Comments: Improved time analysis, and generalisation to the multivariate case
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[200]  arXiv:2004.00053 (cross-list from cs.LG) [pdf, other]
Title: Information Leakage in Embedding Models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[201]  arXiv:2004.00225 (cross-list from cs.LG) [pdf, other]
Title: MetaPoison: Practical General-purpose Clean-label Data Poisoning
Comments: Conference paper at NeurIPS 2020. First two authors contributed equally
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[202]  arXiv:2004.00275 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Algorithms for Statistical Verification of Cyber-Physical Systems
Comments: Under review for IEEE Open Journal of Control Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[203]  arXiv:2004.00306 (cross-list from cs.CV) [pdf, other]
Title: Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes
Comments: CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[204]  arXiv:2004.00362 (cross-list from cs.IR) [pdf]
Title: Multi-Class classification of vulnerabilities in Smart Contracts using AWD-LSTM, with pre-trained encoder inspired from natural language processing
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[205]  arXiv:2004.00410 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Multivariate Time Series
Comments: arXiv admin note: substantial text overlap with arXiv:1902.10755
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[206]  arXiv:2004.00502 (cross-list from cs.CL) [pdf, other]
Title: Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
Comments: 10 pages
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[207]  arXiv:2004.00503 (cross-list from cs.CL) [pdf, other]
Title: Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
Comments: 11 pages
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Social and Information Networks (cs.SI)
[208]  arXiv:2004.00543 (cross-list from cs.CV) [pdf, other]
Title: Physically Realizable Adversarial Examples for LiDAR Object Detection
Comments: Accepted to CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[209]  arXiv:2004.00566 (cross-list from cs.LG) [pdf, other]
Title: Assisted Learning: A Framework for Multi-Organization Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[210]  arXiv:2004.00577 (cross-list from cs.PL) [pdf, ps, other]
Title: An abstract semantics of speculative execution for reasoning about security vulnerabilities
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[211]  arXiv:2004.00622 (cross-list from cs.CV) [pdf, other]
Title: Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[212]  arXiv:2004.01256 (cross-list from cs.CY) [pdf, ps, other]
Title: Application of Intelligent Multi Agent Based Systems For E-Healthcare Security
Comments: 6 pages, 3 figures, 1 table, journal
Journal-ref: Inf. Sci. Lett. 8(2) 2019
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[213]  arXiv:2004.01531 (cross-list from cs.NI) [pdf]
Title: On the Path to High Precise IP Geolocation: A Self-Optimizing Model
Comments: 12 pages, 15 figures
Journal-ref: International Journal of Intelligent Computing Research (IJICR), Volume 7, Issue 1, March 2016
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC)
[214]  arXiv:2004.01598 (cross-list from cs.GT) [pdf, ps, other]
Title: Credible, Truthful, and Two-Round (Optimal) Auctions via Cryptographic Commitments
Journal-ref: ACM Conference on Economics and Computation, 2020, 683-712
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[215]  arXiv:2004.02109 (cross-list from cs.DC) [pdf]
Title: S4oC: A Self-optimizing, Self-adapting Secure System-on-Chip Design Framework to Tackle Unknown Threats -- A Network Theoretic, Learning Approach
Comments: This is an invited paper to ISCAS 2020
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[216]  arXiv:2004.02876 (cross-list from cs.NI) [pdf, other]
Title: Methods and Techniques for Dynamic Deployability of Software-Defined Security Services
Comments: arXiv admin note: substantial text overlap with arXiv:2002.04902, arXiv:1901.01704
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[217]  arXiv:2004.02997 (cross-list from cs.AR) [pdf, other]
Title: Hardware Trojan Detection Using Controlled Circuit Aging
Comments: 21 pages, 34 figures
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[218]  arXiv:2004.03627 (cross-list from cs.CV) [pdf, other]
Title: TypeNet: Scaling up Keystroke Biometrics
Journal-ref: IAPR/IEEE International Joint Conference on Biometrics (IJCB), Houston, USA, 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[219]  arXiv:2004.03670 (cross-list from cs.LG) [pdf, other]
Title: pAElla: Edge-AI based Real-Time Malware Detection in Data Centers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[220]  arXiv:2004.03973 (cross-list from cs.SE) [pdf, ps, other]
Title: Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs
Comments: 2 pages
Journal-ref: In: 42nd International Conference on Software Engineering Companion (ICSE '20 Companion). ACM, 2020
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[221]  arXiv:2004.04272 (cross-list from cs.LG) [pdf, other]
Title: Deep Learning and Open Set Malware Classification: A Survey
Authors: Jingyun Jia
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[222]  arXiv:2004.04294 (cross-list from cs.DC) [pdf, other]
Title: Analysis of LFT2
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[223]  arXiv:2004.04320 (cross-list from cs.LG) [pdf, other]
Title: TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[224]  arXiv:2004.04623 (cross-list from cs.NI) [pdf, other]
Title: The Web is Still Small After More Than a Decade
Comments: ACM SIGCOMM Computer Communication Review, Volume 50, Issue 2, April 2020
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[225]  arXiv:2004.04656 (cross-list from cs.DB) [pdf, other]
Title: Computing Local Sensitivities of Counting Queries with Joins
Authors: Yuchao Tao (1), Xi He (2), Ashwin Machanavajjhala (1), Sudeepa Roy (1) ((1) Duke University, (2) University of Waterloo)
Comments: To be published in Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[226]  arXiv:2004.04798 (cross-list from cs.DC) [pdf, other]
Title: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[227]  arXiv:2004.04812 (cross-list from cs.LG) [pdf, other]
Title: Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis
Comments: 12 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Social and Information Networks (cs.SI); Signal Processing (eess.SP)
[228]  arXiv:2004.04834 (cross-list from cs.SI) [pdf, other]
Title: Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[229]  arXiv:2004.04898 (cross-list from cs.LG) [pdf, other]
Title: Secret Sharing based Secure Regressions with Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[230]  arXiv:2004.04985 (cross-list from cs.IT) [pdf, other]
Title: Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes
Comments: 41 Pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[231]  arXiv:2004.04986 (cross-list from cs.LG) [pdf, other]
Title: Towards Federated Learning With Byzantine-Robust Client Weighting
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[232]  arXiv:2004.05005 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Comments: 9 pages. 7 figures. 7 tables. 46 references. Submitted to a special issue Journal of Information Security and Applications, Machine Learning Techniques for Cyber Security: Challenges and Future Trends, Elsevier
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[233]  arXiv:2004.05089 (cross-list from cs.LG) [pdf, other]
Title: Entropy-Based Modeling for Estimating Soft Errors Impact on Binarized Neural Network Inference
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[234]  arXiv:2004.05703 (cross-list from cs.LG) [pdf, other]
Title: DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Comments: 13 pages, 8 figures, accepted to ACM MobiSys 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[235]  arXiv:2004.06223 (cross-list from cs.IR) [pdf, other]
Title: A Robust Reputation-based Group Ranking System and its Resistance to Bribery
Comments: 28 pages, 14 figures
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[236]  arXiv:2004.06292 (cross-list from cs.SE) [pdf, other]
Title: Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications
Comments: 15 pages, 2 figures, 5 algorithms, 5 listings, 7 tables
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[237]  arXiv:2004.06496 (cross-list from cs.LG) [pdf, other]
Title: Certifiable Robustness to Adversarial State Uncertainty in Deep Reinforcement Learning
Comments: arXiv admin note: text overlap with arXiv:1910.12908
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[238]  arXiv:2004.06567 (cross-list from cs.CV) [pdf, other]
Title: Decentralized Differentially Private Segmentation with PATE
Comments: Under review for MICCAI 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[239]  arXiv:2004.06660 (cross-list from cs.LG) [pdf, other]
Title: Weight Poisoning Attacks on Pre-trained Models
Comments: Published as a long paper at ACL 2020
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[240]  arXiv:2004.06809 (cross-list from cs.NI) [pdf, other]
Title: Issues and challenges in Cloud Storage Architecture: A Survey
Comments: 12 pages, 5 figures, The article may appear in a future issue of Researchpedia.info Journal of Computing Surveys
Journal-ref: Researchpedia Journal of Computing, Researchpedia.info, 2020, 1(1): 50-64
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[241]  arXiv:2004.06830 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Assouad, Fano, and Le Cam
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (stat.ML)
[242]  arXiv:2004.07087 (cross-list from cs.DC) [pdf, other]
Title: The Binary Vector Clock
Authors: Lum Ramabaja
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[243]  arXiv:2004.07359 (cross-list from cs.CY) [pdf, other]
Title: Usable, Acceptable, Appropriable: Towards Practicable Privacy
Authors: Aakash Gautam
Comments: 6 pages, position paper submitted to the CHI 2020 workshop on Networked Privacy
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[244]  arXiv:2004.07401 (cross-list from cs.LG) [pdf, other]
Title: Poisoning Attacks on Algorithmic Fairness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (stat.ML)
[245]  arXiv:2004.07609 (cross-list from cs.IR) [pdf, other]
Title: Toward Efficient Web Publishing with Provenance of Information Using Trusty URIs: Applying the proposed model with the Quran
Comments: 13 pages, 8 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[246]  arXiv:2004.07778 (cross-list from eess.SY) [pdf, ps, other]
Title: Privacy-Preserving Policy Synthesis in Markov Decision Processes
Comments: Submitted to the Conference on Decision and Control (CDC) 2020
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[247]  arXiv:2004.07839 (cross-list from cs.LG) [pdf, ps, other]
Title: Private Learning of Halfspaces: Simplifying the Construction and Reducing the Sample Complexity
Comments: Accepted to NeurIPS 2020. In this version we added a new section about our new method for privately optimizing high-dimensional functions. arXiv admin note: text overlap with arXiv:1902.10731
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[248]  arXiv:2004.08029 (cross-list from cs.CV) [pdf, other]
Title: Conservative Plane Releasing for Spatial Privacy Protection in Mixed Reality
Comments: 15 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[249]  arXiv:2004.08035 (cross-list from cs.IT) [pdf, other]
Title: A Case for Maximal Leakage as a Side Channel Leakage Metric
Comments: 21 pages, 11 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[250]  arXiv:2004.09063 (cross-list from cs.NI) [pdf, other]
Title: Securing Internet Applications from Routing Attacks
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[251]  arXiv:2004.09072 (cross-list from cs.CY) [pdf, other]
Title: On the Data Fight Between Cities and Mobility Providers
Comments: Accepted to Workshop on Technology and Consumer Protection 2020 (ConPro '20)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[252]  arXiv:2004.09179 (cross-list from cs.LG) [pdf, ps, other]
Title: GraN: An Efficient Gradient-Norm Based Detector for Adversarial and Misclassified Examples
Comments: Accepted at ESANN 2020 (European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[253]  arXiv:2004.09327 (cross-list from cs.NI) [pdf, other]
Title: Tracemax: A Novel Single Packet IP Traceback Strategy for Data-Flow Analysis
Comments: Keywords: Computer network management, IP networks, IP packet, Traceback, Packet trace, Denial of Service
Journal-ref: Local Computer Networks 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR)
[254]  arXiv:2004.09662 (cross-list from cs.CL) [pdf, other]
Title: The Panacea Threat Intelligence and Active Defense Platform
Comments: Accepted at STOC
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[255]  arXiv:2004.09935 (cross-list from cs.IT) [pdf, ps, other]
Title: An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[256]  arXiv:2004.10250 (cross-list from cs.LG) [pdf, other]
Title: Certifying Joint Adversarial Robustness for Model Ensembles
Comments: Open source code for our implementation and for reproducing our experiments is available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[257]  arXiv:2004.10276 (cross-list from cs.NI) [pdf]
Title: CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[258]  arXiv:2004.10397 (cross-list from cs.LG) [pdf, other]
Title: A Framework for Evaluating Gradient Leakage Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[259]  arXiv:2004.10469 (cross-list from cs.CV) [pdf, other]
Title: Warwick Image Forensics Dataset for Device Fingerprinting In Multimedia Forensics
Comments: Paper accepted to IEEE International Conference on Multimedia and Expo 2020 (ICME 2020)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Multimedia (cs.MM); Image and Video Processing (eess.IV)
[260]  arXiv:2004.10700 (cross-list from cs.LG) [pdf, ps, other]
Title: CodNN -- Robust Neural Networks From Coded Classification
Comments: To appear in ISIT '20
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[261]  arXiv:2004.10858 (cross-list from cs.DC) [pdf]
Title: Experiential probabilistic assessment of cloud services
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[262]  arXiv:2004.10911 (cross-list from cs.IT) [pdf, ps, other]
Title: Measuring Information Leakage in Non-stochastic Brute-Force Guessing
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[263]  arXiv:2004.10968 (cross-list from cs.LG) [pdf, other]
Title: ArchNet: Data Hiding Model in Distributed Machine Learning System
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[264]  arXiv:2004.11131 (cross-list from cs.IR) [pdf, other]
Title: Privacy at Scale: Introducing the PrivaSeer Corpus of Web Privacy Policies
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[265]  arXiv:2004.11146 (cross-list from cs.DS) [pdf, ps, other]
Title: On the computation of the M{ö}bius transform
Journal-ref: Theoretical Computer Science, Elsevier, 2019, Theoretical Computer Science, 809, pp.171-188
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[266]  arXiv:2004.11168 (cross-list from cs.CV) [pdf, other]
Title: Cloud-Based Face and Speech Recognition for Access Control Applications
Comments: Published at Proc. 6th International Workshop on Security and Privacy in the Cloud, SPC, in conjunction with IEEE Conference on Communications and Network Security, CNS, Avignon, France, 29 June - 1 July 2020
Journal-ref: Proc. 6th International Workshop on Security and Privacy in the Cloud, SPC, in conjunction with IEEE Conference on Communications and Network Security, CNS, Avignon, France, 29 June - 1 July 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[267]  arXiv:2004.11435 (cross-list from cs.CV) [pdf, other]
Title: Style Your Face Morph and Improve Your Face Morphing Attack Detector
Comments: Published at BIOSIG 2019
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[268]  arXiv:2004.11514 (cross-list from cs.CV) [pdf, other]
Title: Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[269]  arXiv:2004.11794 (cross-list from cs.LG) [pdf, other]
Title: A Review of Privacy-preserving Federated Learning for the Internet-of-Things
Comments: Abstract accepted for publication in a book titled: "Federated Learning Systems: Towards Next Generation AI" in Springer's Series on Studides in Computational Intelligence
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[270]  arXiv:2004.12091 (cross-list from cs.IT) [pdf, ps, other]
Title: Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage
Comments: Shorter version to appear in 2020 IEEE International Symposium on Information Theory and Applications. Decoding complexity results are added
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Multimedia (cs.MM); Signal Processing (eess.SP)
[271]  arXiv:2004.12227 (cross-list from cs.LG) [pdf, other]
Title: Improved Adversarial Training via Learned Optimizer
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[272]  arXiv:2004.12254 (cross-list from cs.LG) [pdf, other]
Title: Privacy in Deep Learning: A Survey
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[273]  arXiv:2004.12478 (cross-list from cs.LG) [pdf, other]
Title: Improved Image Wasserstein Attacks and Defenses
Comments: Best paper award at ICLR Trustworthy ML Workshop 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[274]  arXiv:2004.12492 (cross-list from cs.LG) [pdf, other]
Title: Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[275]  arXiv:2004.12734 (cross-list from cs.LO) [pdf, other]
Title: An Epistemic Approach to the Formal Specification of Statistical Machine Learning
Authors: Yusuke Kawamoto
Comments: Accepted in Software and Systems Modeling this https URL This paper is the journal version of the SEFM'19 conference paper arxiv:1907.10327
Subjects: Logic in Computer Science (cs.LO); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[276]  arXiv:2004.13095 (cross-list from cs.IT) [pdf, other]
Title: Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage
Comments: To appear in ACM Workshop on Information Hiding and Multimedia Security 2020
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[277]  arXiv:2004.13115 (cross-list from cs.DB) [pdf, other]
Title: Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data -- Full Version
Comments: A preliminary version of this work was accepted in VLDB 2019. This version has been accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE). The final published version of this paper may differ from this accepted version
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Information Theory (cs.IT)
[278]  arXiv:2004.13289 (cross-list from cs.LO) [pdf, ps, other]
Title: Modeling an Asynchronous Circuit Dedicated to the Protection Against Physical Attacks
Comments: In Proceedings MARS 2020, arXiv:2004.12403
Journal-ref: EPTCS 316, 2020, pp. 200-239
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[279]  arXiv:2004.13328 (cross-list from cs.LG) [pdf, other]
Title: Privacy Guidelines for Contact Tracing Applications
Comments: 10 pages, 0 images
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC)
[280]  arXiv:2004.13598 (cross-list from cs.LG) [pdf, other]
Title: Private Dataset Generation Using Privacy Preserving Collaborative Learning
Authors: Amit Chaulwar
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[281]  arXiv:2004.13799 (cross-list from cs.LG) [pdf, other]
Title: Minority Reports Defense: Defending Against Adversarial Patches
Comments: 9 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[282]  arXiv:2004.13938 (cross-list from cs.IT) [pdf, ps, other]
Title: Families of sequences with good family complexity and cross-correlation measure
Authors: Oğuz Yayla
Comments: 13 pages. Comments are welcome!
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Number Theory (math.NT)
[283]  arXiv:2004.14174 (cross-list from cs.CL) [pdf, other]
Title: Reevaluating Adversarial Examples in Natural Language
Comments: 15 pages; 9 Tables; 5 Figures
Journal-ref: Findings of the Association for Computational Linguistics: EMNLP 2020
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[284]  arXiv:2004.14477 (cross-list from cs.LG) [pdf, other]
Title: Packet2Vec: Utilizing Word2Vec for Feature Extraction in Packet Data
Comments: MLDM 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2004.14495 (cross-list from cs.CY) [pdf]
Title: Balancing Personal Privacy and Public Safety during COVID-19: The Case of South Korea
Comments: 11pages
Journal-ref: 2020, Vol.8
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[286]  arXiv:2004.14527 (cross-list from cs.DC) [pdf, other]
Title: From Byzantine Replication to Blockchain: Consensus is only the Beginning
Comments: This is a preprint of a paper to appear on the 50th IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN'20)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[287]  arXiv:2004.14746 (cross-list from cs.DC) [pdf]
Title: Cloud+: A safe and restrained data access control program for cloud
Authors: Sarath Pathari
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[288]  arXiv:2004.14756 (cross-list from cs.LG) [pdf, other]
Title: Robustness Certification of Generative Models
Comments: Prior version submitted to ICLR 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Programming Languages (cs.PL); Machine Learning (stat.ML)
[289]  arXiv:2004.14986 (cross-list from cs.IT) [pdf, other]
Title: Compound Secure Groupcast: Key Assignment for Selected Broadcasting
Authors: Hua Sun
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[290]  arXiv:2004.15015 (cross-list from cs.CL) [pdf, other]
Title: Imitation Attacks and Defenses for Black-box Machine Translation Systems
Comments: EMNLP 2020
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[291]  arXiv:2004.00092 (cross-list from eess.SP) [pdf, other]
Title: VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)
Comments: Tools Demo: Accepted at Information Processing in Sensor Networks 2020
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[292]  arXiv:2004.01330 (cross-list from quant-ph) [pdf, other]
Title: Detecting Temporal Correlation via Quantum Random Number Generation
Authors: Yutaka Shikano (Quantum Computing Center, Keio University & Institute for Quantum Stuides, Chapman University), Kentaro Tamura (Department of Applied Physics and Physico-Informatics, Keio University), Rudy Raymond (IBM Research -- Tokyo & Quantum Computing Center, Keio University)
Comments: In Proceedings QSQW 2020, arXiv:2004.01061
Journal-ref: EPTCS 315, 2020, pp. 18-25
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Data Analysis, Statistics and Probability (physics.data-an)
[293]  arXiv:2004.01872 (cross-list from eess.SP) [pdf, ps, other]
Title: Low-complexity and Reliable Transforms for Physical Unclonable Functions
Comments: To appear in IEEE International Conference on Acoustics, Speech, and Signal Processing 2020
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Multimedia (cs.MM)
[294]  arXiv:2004.01976 (cross-list from quant-ph) [pdf, ps, other]
Title: Scalable Pseudorandom Quantum States
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[295]  arXiv:2004.02257 (cross-list from math.OC) [pdf]
Title: Security Analysis and Fault Detection Against Stealthy Replay Attacks
Comments: 12 pages, 5 figures, grammatical errors and typos corrected
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[296]  arXiv:2004.02744 (cross-list from math.OC) [pdf, ps, other]
Title: Differentially Private Formation Control
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[297]  arXiv:2004.03428 (cross-list from eess.AS) [pdf, other]
Title: Universal Adversarial Perturbations Generative Network for Speaker Recognition
Comments: Accepted by ICME2020
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[298]  arXiv:2004.03434 (cross-list from eess.AS) [pdf, other]
Title: Learning to fool the speaker recognition
Comments: Accepted by ICASSP2020
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[299]  arXiv:2004.03921 (cross-list from math.OC) [pdf, other]
Title: Differentially Private Optimal Power Flow for Distribution Grids
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[300]  arXiv:2004.04680 (cross-list from math.OC) [pdf, other]
Title: A Private and Finite-Time Algorithm for Solving a Distributed System of Linear Equations
Comments: 8 pages, 2 figures
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Systems and Control (eess.SY)
[301]  arXiv:2004.08705 (cross-list from stat.ML) [pdf, other]
Title: Protecting Classifiers From Attacks. A Bayesian Approach
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Computation (stat.CO)
[302]  arXiv:2004.08742 (cross-list from eess.SP) [pdf, other]
Title: Device Authentication Codes based on RF Fingerprinting using Deep Learning
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[303]  arXiv:2004.08800 (cross-list from math.CV) [pdf, ps, other]
Title: Verteilung der Primzahlen und Asymptotik bezüglich der Kongruenzen der rationalen Punkte auf elliptischen Kurven über einem endlichen Körper
Authors: Thi Altenschmidt
Comments: in German, 33 pages
Subjects: Complex Variables (math.CV); Cryptography and Security (cs.CR); Algebraic Geometry (math.AG); Number Theory (math.NT)
[304]  arXiv:2004.08849 (cross-list from eess.AS) [pdf, other]
Title: The Attacker's Perspective on Automatic Speaker Verification: An Overview
Comments: 5 pages, 1 figure, Submitted to Interspeech 2020
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[305]  arXiv:2004.09245 (cross-list from math.NT) [src]
Title: A power APN function CCZ-equivalent to Kasami function in even dimension
Comments: My colleagues have identified some technical errors which require redress
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[306]  arXiv:2004.09909 (cross-list from eess.SP) [pdf, other]
Title: Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[307]  arXiv:2004.10228 (cross-list from eess.SP) [pdf, ps, other]
Title: Non-Orthogonal Waveforms in Secure Communications
Authors: Tongyang Xu
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[308]  arXiv:2004.11596 (cross-list from quant-ph) [pdf]
Title: Quantum Key Recycling with Optimal Key Recycling Rate based on Error Rate
Comments: 8 pages, 3 figures. There is a related study here (arXiv:2005.14488 [quant-ph])
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[309]  arXiv:2004.11738 (cross-list from quant-ph) [pdf]
Title: Multiparty Quantum Key Agreement That is Secure Against Collusive Attacks
Comments: The paper contains 8 pages and one figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[310]  arXiv:2004.12621 (cross-list from quant-ph) [pdf, ps, other]
Title: Succinct Blind Quantum Computation Using a Random Oracle
Authors: Jiayu Zhang
Comments: 231 pages, 8 figures, 1 table. Add a separate section for extended technical overview; several readability improvements
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[311]  arXiv:2004.13874 (cross-list from eess.IV) [pdf, other]
Title: Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[312]  arXiv:2004.13921 (cross-list from quant-ph) [pdf, other]
Title: Provably-secure symmetric private information retrieval with quantum cryptography
Comments: 19 pages
Journal-ref: Entropy 23, 54 (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[313]  arXiv:2004.13927 (cross-list from math.OC) [pdf, other]
Title: Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach
Comments: 19 pages
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR)
[314]  arXiv:2004.01304 (cross-list from q-fin.TR) [pdf, other]
Title: While Stability Lasts: A Stochastic Model of Non-Custodial Stablecoins
Subjects: Trading and Market Microstructure (q-fin.TR); Cryptography and Security (cs.CR)
[ total of 314 entries: 1-314 ]
[ showing 314 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2302, contact, help  (Access key information)