We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 225

[ total of 314 entries: 1-10 | ... | 196-205 | 206-215 | 216-225 | 226-235 | 236-245 | 246-255 | 256-265 | ... | 306-314 ]
[ showing 10 entries per page: fewer | more | all ]
[226]  arXiv:2004.04798 (cross-list from cs.DC) [src]
Title: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach
Comments: Uncompleted work and contain errors
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[227]  arXiv:2004.04812 (cross-list from cs.LG) [pdf, other]
Title: Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis
Comments: 12 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Social and Information Networks (cs.SI); Signal Processing (eess.SP)
[228]  arXiv:2004.04834 (cross-list from cs.SI) [pdf, other]
Title: Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[229]  arXiv:2004.04898 (cross-list from cs.LG) [pdf, other]
Title: Secret Sharing based Secure Regressions with Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[230]  arXiv:2004.04985 (cross-list from cs.IT) [pdf, other]
Title: Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes
Comments: 41 Pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[231]  arXiv:2004.04986 (cross-list from cs.LG) [pdf, other]
Title: Towards Federated Learning With Byzantine-Robust Client Weighting
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[232]  arXiv:2004.05005 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Comments: 9 pages. 7 figures. 7 tables. 46 references. Submitted to a special issue Journal of Information Security and Applications, Machine Learning Techniques for Cyber Security: Challenges and Future Trends, Elsevier
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[233]  arXiv:2004.05089 (cross-list from cs.LG) [pdf, other]
Title: Entropy-Based Modeling for Estimating Soft Errors Impact on Binarized Neural Network Inference
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[234]  arXiv:2004.05703 (cross-list from cs.LG) [pdf, other]
Title: DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Comments: 13 pages, 8 figures, accepted to ACM MobiSys 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[235]  arXiv:2004.06223 (cross-list from cs.IR) [pdf, other]
Title: A Robust Reputation-based Group Ranking System and its Resistance to Bribery
Comments: 28 pages, 14 figures
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 314 entries: 1-10 | ... | 196-205 | 206-215 | 216-225 | 226-235 | 236-245 | 246-255 | 256-265 | ... | 306-314 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)