We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 150

[ total of 314 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[151]  arXiv:2004.11370 [pdf, other]
Title: Live Trojan Attacks on Deep Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[152]  arXiv:2004.11502 [pdf, ps, other]
Title: Having our omic cake and eating it too: Evaluating User Response to using Blockchain Technology for Private & Secure Health Data Management and Sharing
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[153]  arXiv:2004.11516 [pdf, other]
Title: Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[154]  arXiv:2004.11527 [pdf, other]
Title: A Trend-following Trading Indicator on Homomorphically Encrypted Data
Comments: Accepted as a short paper by the 17th International Conference on Security and Cryptography (SECRYPT 2020)
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2004.11552 [pdf, other]
Title: Optimal Threshold Padlock Systems
Authors: Jannik Dreier (PESTO), Jean-Guillaume Dumas (CASC), Pascal Lafourcade (LIMOS), Léo Robert (LIMOS)
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[156]  arXiv:2004.11556 [pdf, other]
Title: Benefits and Pitfalls of Using Capture the Flag Games in University Courses
Comments: ACM SIGCSE 2020 conference, 7 pages, 5 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[157]  arXiv:2004.11575 [pdf, other]
Title: KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems
Comments: ACM SIGCSE 2020 conference, 7 pages, 5 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2004.11665 [pdf, ps, other]
[159]  arXiv:2004.11898 [pdf, other]
Title: Adversarial Machine Learning in Network Intrusion Detection Systems
Comments: 25 pages, 6 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[160]  arXiv:2004.12179 [pdf, other]
Title: Best Practices for IoT Security: What Does That Even Mean?
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2004.12183 [pdf, ps, other]
Title: Aim Low, Shoot High: Evading Aimbot Detectors by Mimicking User Behavior
Comments: 6 pages
Journal-ref: European Workshop on Systems Security (EuroSec) 2020, co-located with the European Conference on Computer Systems (EuroSys)
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2004.12216 [pdf, other]
Title: Privacy Preserving Distributed Energy Trading
Subjects: Cryptography and Security (cs.CR)
[163]  arXiv:2004.12264 [pdf, other]
Title: A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Comments: 23 pages
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2004.12438 [pdf, ps, other]
Title: Towards Blockchain for Decentralized Self-Organizing Wireless Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[165]  arXiv:2004.12442 [pdf, other]
Title: Airmed: Efficient Self-Healing Network of Low-End Devices
Comments: 13 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2004.12571 [pdf, other]
Title: Exploiting Defenses against GAN-Based Feature Inference Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[167]  arXiv:2004.12581 [pdf, ps, other]
Title: Multi-IF : An Approach to Anomaly Detection in Self-Driving Systems
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2004.12768 [pdf, other]
Title: Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Performance (cs.PF)
[169]  arXiv:2004.12793 [pdf, other]
Title: EventWarden: A Decentralized Event-driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum-like Blockchains
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2004.12885 [pdf, other]
Title: LIO*: Low Level Information Flow Control in F*
Comments: Submitted to ICFP
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[171]  arXiv:2004.13002 [pdf, other]
Title: A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[172]  arXiv:2004.13004 [pdf, other]
Title: ML-driven Malware that Targets AV Safety
Comments: Accepted for DSN 2020
Journal-ref: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Robotics (cs.RO)
[173]  arXiv:2004.13006 [pdf, other]
Title: NetML: A Challenge for Network Traffic Analytics
Comments: 27 pages, 39 figures, 7 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)
[174]  arXiv:2004.13013 [pdf, other]
Title: Harnessing adversarial examples with a surprisingly simple defense
Authors: Ali Borji
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[175]  arXiv:2004.13107 [pdf, ps, other]
Title: Identity Management on Blockchain -- Privacy and Security Aspects
Comments: extended version of "Identity Management on Blockchain - Privacy and Security Aspects" available at this https URL
Subjects: Cryptography and Security (cs.CR)
[ total of 314 entries: 1-25 | ... | 76-100 | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | ... | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)