We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021, skipping first 175

[ total of 273 entries: 1-25 | ... | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-273 ]
[ showing 25 entries per page: fewer | more | all ]
[176]  arXiv:2101.11728 [pdf, other]
Title: SimBle: Generating privacy preserving real-world BLE traces with ground truth
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[177]  arXiv:2101.11866 [pdf, other]
Title: An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2101.11871 [pdf, other]
Title: Website fingerprinting on early QUIC traffic
Comments: This work has been accepted by Elsevier Computer Networks for publication
Journal-ref: Computer Networks 200 (2021) 108538
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[179]  arXiv:2101.11915 [pdf, other]
Title: Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[180]  arXiv:2101.12016 [pdf, other]
Title: Baseline Pruning-Based Approach to Trojan Detection in Neural Networks
Comments: The funding for all authors was provided by IARPA: IARPA-20001-D2020-2007180011
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[181]  arXiv:2101.12031 [pdf, other]
Title: Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Comments: Inf Syst Front (2020)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[182]  arXiv:2101.12078 [pdf, other]
Title: S++: A Fast and Deployable Secure-Computation Framework for Privacy-Preserving Neural Network Training
Comments: Appeared at the Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21). (7 pages, technical paper.)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[183]  arXiv:2101.12143 [pdf, other]
Title: Security, Fault Tolerance, and Communication Complexity in Distributed Systems
Comments: PhD thesis, Harvard University, Cambridge, Massachusetts, USA, May 1990. Some chapters report joint work
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[184]  arXiv:2101.12270 [pdf, other]
Title: An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Journal-ref: Sensors. 2021; 21(2):446
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[185]  arXiv:2101.12279 [pdf, other]
Title: GF-Flush: A GF(2) Algebraic Attack on Secure Scan Chains
Comments: Submitted to IEEE Transactions on Computer-Aided Design of Integrated Circuits And Systems
Subjects: Cryptography and Security (cs.CR)
[186]  arXiv:2101.12332 [pdf, ps, other]
Title: Atomic Swaps between Bitcoin and Monero
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2101.12412 [pdf, ps, other]
Title: Open problems in cross-chain protocols
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[188]  arXiv:2101.12434 [pdf, ps, other]
Title: Peeler: Profiling Kernel-Level Events to Detect Ransomware
Comments: 15 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[189]  arXiv:2101.12602 [pdf, other]
Title: On the differential privacy of dynamic location obfuscation with personalized error bounds
Comments: 9 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[190]  arXiv:2101.12604 [pdf, ps, other]
Title: Detection and Prevention of New Attacks for ID-based Authentication Protocols
Journal-ref: 9th ACM International Conference on Networks, Communication and Computing (ICNCC 2020)
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2101.12620 [pdf, ps, other]
Title: EphemeriShield -- defence against cyber-antisatellite weapons
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[192]  arXiv:2101.12723 [pdf, ps, other]
Title: State of the Art: Content-based and Hybrid Phishing Detection
Comments: 6 pages, 1 table
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2101.12736 [pdf, other]
Title: N-grams Bayesian Differential Privacy
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[194]  arXiv:2101.00157 (cross-list from cs.LG) [pdf, ps, other]
Title: Active Learning Under Malicious Mislabeling and Poisoning Attacks
Comments: 2021 IEEE Global Communications Conference (GLOBECOM)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[195]  arXiv:2101.00378 (cross-list from cs.NI) [pdf, other]
Title: Speeding up Block Propagation in Blockchain Network: Uncoded and Coded Designs
Comments: 10 pages, 8 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[196]  arXiv:2101.00522 (cross-list from cs.CV) [pdf, other]
Title: Domain Adaptation for the Segmentation of Confidential Medical Images
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[197]  arXiv:2101.00606 (cross-list from cs.CV) [pdf, other]
Title: News Image Steganography: A Novel Architecture Facilitates the Fake News Identification
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[198]  arXiv:2101.00612 (cross-list from cs.SE) [pdf, other]
Title: Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[199]  arXiv:2101.00676 (cross-list from cs.CV) [pdf, other]
Title: Fake Visual Content Detection Using Two-Stream Convolutional Neural Networks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[200]  arXiv:2101.01032 (cross-list from cs.CV) [pdf, other]
Title: Local Black-box Adversarial Attacks: A Query Efficient Approach
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 273 entries: 1-25 | ... | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-273 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)