We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Apr 2020, skipping first 225

[ total of 314 entries: 1-25 | ... | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]
[226]  arXiv:2004.04798 (cross-list from cs.DC) [src]
Title: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach
Comments: Uncompleted work and contain errors
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[227]  arXiv:2004.04812 (cross-list from cs.LG) [pdf, other]
Title: Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis
Comments: 12 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Social and Information Networks (cs.SI); Signal Processing (eess.SP)
[228]  arXiv:2004.04834 (cross-list from cs.SI) [pdf, other]
Title: Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[229]  arXiv:2004.04898 (cross-list from cs.LG) [pdf, other]
Title: Secret Sharing based Secure Regressions with Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[230]  arXiv:2004.04985 (cross-list from cs.IT) [pdf, other]
Title: Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes
Comments: 41 Pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[231]  arXiv:2004.04986 (cross-list from cs.LG) [pdf, other]
Title: Towards Federated Learning With Byzantine-Robust Client Weighting
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[232]  arXiv:2004.05005 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Machine Learning Cybersecurity Defences in Industrial Control Systems
Comments: 9 pages. 7 figures. 7 tables. 46 references. Submitted to a special issue Journal of Information Security and Applications, Machine Learning Techniques for Cyber Security: Challenges and Future Trends, Elsevier
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[233]  arXiv:2004.05089 (cross-list from cs.LG) [pdf, other]
Title: Entropy-Based Modeling for Estimating Soft Errors Impact on Binarized Neural Network Inference
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[234]  arXiv:2004.05703 (cross-list from cs.LG) [pdf, other]
Title: DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Comments: 13 pages, 8 figures, accepted to ACM MobiSys 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[235]  arXiv:2004.06223 (cross-list from cs.IR) [pdf, other]
Title: A Robust Reputation-based Group Ranking System and its Resistance to Bribery
Comments: 28 pages, 14 figures
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[236]  arXiv:2004.06292 (cross-list from cs.SE) [pdf, other]
Title: Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications
Comments: 15 pages, 2 figures, 5 algorithms, 5 listings, 7 tables
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[237]  arXiv:2004.06496 (cross-list from cs.LG) [pdf, other]
Title: Certifiable Robustness to Adversarial State Uncertainty in Deep Reinforcement Learning
Comments: arXiv admin note: text overlap with arXiv:1910.12908
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[238]  arXiv:2004.06567 (cross-list from cs.CV) [pdf, other]
Title: Decentralized Differentially Private Segmentation with PATE
Comments: Under review for MICCAI 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[239]  arXiv:2004.06660 (cross-list from cs.LG) [pdf, other]
Title: Weight Poisoning Attacks on Pre-trained Models
Comments: Published as a long paper at ACL 2020
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[240]  arXiv:2004.06809 (cross-list from cs.NI) [pdf, other]
Title: Issues and challenges in Cloud Storage Architecture: A Survey
Comments: 12 pages, 5 figures, The article may appear in a future issue of Researchpedia.info Journal of Computing Surveys
Journal-ref: Researchpedia Journal of Computing, Researchpedia.info, 2020, 1(1): 50-64
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[241]  arXiv:2004.06830 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Assouad, Fano, and Le Cam
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (stat.ML)
[242]  arXiv:2004.07087 (cross-list from cs.DC) [pdf, other]
Title: The Binary Vector Clock
Authors: Lum Ramabaja
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[243]  arXiv:2004.07359 (cross-list from cs.CY) [pdf, other]
Title: Usable, Acceptable, Appropriable: Towards Practicable Privacy
Authors: Aakash Gautam
Comments: 6 pages, position paper submitted to the CHI 2020 workshop on Networked Privacy
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[244]  arXiv:2004.07401 (cross-list from cs.LG) [pdf, other]
Title: Poisoning Attacks on Algorithmic Fairness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (stat.ML)
[245]  arXiv:2004.07609 (cross-list from cs.IR) [pdf, other]
Title: Toward Efficient Web Publishing with Provenance of Information Using Trusty URIs: Applying the proposed model with the Quran
Comments: 13 pages, 8 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[246]  arXiv:2004.07778 (cross-list from eess.SY) [pdf, ps, other]
Title: Privacy-Preserving Policy Synthesis in Markov Decision Processes
Comments: Submitted to the Conference on Decision and Control (CDC) 2020
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[247]  arXiv:2004.07839 (cross-list from cs.LG) [pdf, ps, other]
Title: Private Learning of Halfspaces: Simplifying the Construction and Reducing the Sample Complexity
Comments: Accepted to NeurIPS 2020. In this version we added a new section about our new method for privately optimizing high-dimensional functions. arXiv admin note: text overlap with arXiv:1902.10731
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[248]  arXiv:2004.08029 (cross-list from cs.CV) [pdf, other]
Title: Conservative Plane Releasing for Spatial Privacy Protection in Mixed Reality
Comments: 15 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[249]  arXiv:2004.08035 (cross-list from cs.IT) [pdf, other]
Title: A Case for Maximal Leakage as a Side Channel Leakage Metric
Comments: 21 pages, 11 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[250]  arXiv:2004.09063 (cross-list from cs.NI) [pdf, other]
Title: Securing Internet Applications from Routing Attacks
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[ total of 314 entries: 1-25 | ... | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-314 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)