We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 200

[ total of 314 entries: 1-25 | ... | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[201]  arXiv:2004.00225 (cross-list from cs.LG) [pdf, other]
Title: MetaPoison: Practical General-purpose Clean-label Data Poisoning
Comments: Conference paper at NeurIPS 2020. First two authors contributed equally
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[202]  arXiv:2004.00275 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Algorithms for Statistical Verification of Cyber-Physical Systems
Comments: Under review for IEEE Open Journal of Control Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[203]  arXiv:2004.00306 (cross-list from cs.CV) [pdf, other]
Title: Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes
Comments: CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[204]  arXiv:2004.00362 (cross-list from cs.IR) [pdf, ps, other]
Title: Multi-Class classification of vulnerabilities in Smart Contracts using AWD-LSTM, with pre-trained encoder inspired from natural language processing
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[205]  arXiv:2004.00410 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Multivariate Time Series
Comments: arXiv admin note: substantial text overlap with arXiv:1902.10755
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[206]  arXiv:2004.00502 (cross-list from cs.CL) [pdf, other]
Title: Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
Comments: 10 pages
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[207]  arXiv:2004.00503 (cross-list from cs.CL) [pdf, other]
Title: Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
Comments: 11 pages
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Social and Information Networks (cs.SI)
[208]  arXiv:2004.00543 (cross-list from cs.CV) [pdf, other]
Title: Physically Realizable Adversarial Examples for LiDAR Object Detection
Comments: Accepted to CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[209]  arXiv:2004.00566 (cross-list from cs.LG) [pdf, other]
Title: Assisted Learning: A Framework for Multi-Organization Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[210]  arXiv:2004.00577 (cross-list from cs.PL) [pdf, ps, other]
Title: An abstract semantics of speculative execution for reasoning about security vulnerabilities
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[211]  arXiv:2004.00622 (cross-list from cs.CV) [pdf, other]
Title: Evading Deepfake-Image Detectors with White- and Black-Box Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[212]  arXiv:2004.01256 (cross-list from cs.CY) [pdf, ps, other]
Title: Application of Intelligent Multi Agent Based Systems For E-Healthcare Security
Comments: 6 pages, 3 figures, 1 table, journal
Journal-ref: Inf. Sci. Lett. 8(2) 2019
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[213]  arXiv:2004.01531 (cross-list from cs.NI) [pdf, ps, other]
Title: On the Path to High Precise IP Geolocation: A Self-Optimizing Model
Comments: 12 pages, 15 figures
Journal-ref: International Journal of Intelligent Computing Research (IJICR), Volume 7, Issue 1, March 2016
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC)
[214]  arXiv:2004.01598 (cross-list from cs.GT) [pdf, ps, other]
Title: Credible, Truthful, and Two-Round (Optimal) Auctions via Cryptographic Commitments
Journal-ref: EC '20: Proceedings of the 21st ACM Conference on Economics and Computation, 2020, 683-712
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[215]  arXiv:2004.02109 (cross-list from cs.DC) [pdf, ps, other]
Title: S4oC: A Self-optimizing, Self-adapting Secure System-on-Chip Design Framework to Tackle Unknown Threats -- A Network Theoretic, Learning Approach
Comments: This is an invited paper to ISCAS 2020
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[216]  arXiv:2004.02876 (cross-list from cs.NI) [pdf, other]
Title: Methods and Techniques for Dynamic Deployability of Software-Defined Security Services
Comments: arXiv admin note: substantial text overlap with arXiv:2002.04902, arXiv:1901.01704
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[217]  arXiv:2004.02997 (cross-list from cs.AR) [pdf, other]
Title: Hardware Trojan Detection Using Controlled Circuit Aging
Comments: 21 pages, 34 figures
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[218]  arXiv:2004.03627 (cross-list from cs.CV) [pdf, other]
Title: TypeNet: Scaling up Keystroke Biometrics
Journal-ref: IAPR/IEEE International Joint Conference on Biometrics (IJCB), Houston, USA, 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[219]  arXiv:2004.03670 (cross-list from cs.LG) [pdf, other]
Title: pAElla: Edge-AI based Real-Time Malware Detection in Data Centers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[220]  arXiv:2004.03973 (cross-list from cs.SE) [pdf, ps, other]
Title: Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs
Comments: 2 pages
Journal-ref: In: 42nd International Conference on Software Engineering Companion (ICSE '20 Companion). ACM, 2020
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[221]  arXiv:2004.04272 (cross-list from cs.LG) [pdf, other]
Title: Deep Learning and Open Set Malware Classification: A Survey
Authors: Jingyun Jia
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[222]  arXiv:2004.04294 (cross-list from cs.DC) [pdf, other]
Title: Analysis of LFT2
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[223]  arXiv:2004.04320 (cross-list from cs.LG) [pdf, other]
Title: TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[224]  arXiv:2004.04623 (cross-list from cs.NI) [pdf, other]
Title: The Web is Still Small After More Than a Decade
Comments: ACM SIGCOMM Computer Communication Review, Volume 50, Issue 2, April 2020
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[225]  arXiv:2004.04656 (cross-list from cs.DB) [pdf, other]
Title: Computing Local Sensitivities of Counting Queries with Joins
Authors: Yuchao Tao (1), Xi He (2), Ashwin Machanavajjhala (1), Sudeepa Roy (1) ((1) Duke University, (2) University of Waterloo)
Comments: To be published in Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[ total of 314 entries: 1-25 | ... | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)