We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021, skipping first 200

[ total of 273 entries: 1-25 | ... | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-273 ]
[ showing 25 entries per page: fewer | more | all ]
[201]  arXiv:2101.01269 (cross-list from cs.CY) [pdf, ps, other]
Title: Post Quantum Cryptography: Readiness Challenges and the Approaching Storm
Comments: A Computing Community Consortium (CCC) white paper, 5 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[202]  arXiv:2101.01401 (cross-list from cs.HC) [pdf, ps, other]
Title: Perceptions of Smartphone Users Acceptance and Adoption of Mobile Commerce (MC) The Case of Jordan
Comments: 11 pages
Journal-ref: Journal of Computer Science, 2020
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[203]  arXiv:2101.01872 (cross-list from cs.CV) [pdf, other]
Title: Multi-Stage Residual Hiding for Image-into-Audio Steganography
Comments: ICASSP 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[204]  arXiv:2101.02159 (cross-list from cs.DC) [pdf, ps, other]
Title: Highway: Efficient Consensus with Flexible Finality
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[205]  arXiv:2101.02392 (cross-list from cs.LG) [pdf, other]
Title: Detecting Log Anomalies with Multi-Head Attention (LAMA)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[206]  arXiv:2101.02899 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks
Comments: Accepted to RSEML Workshop at AAAI 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[207]  arXiv:2101.03042 (cross-list from cs.LG) [pdf, other]
Title: Towards a Robust and Trustworthy Machine Learning System Development: An Engineering Perspective
Comments: 20 pages (58 pages pre-print), 6 figures
Journal-ref: Journal of Information Security and Applications 65 (2022) 103121
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[208]  arXiv:2101.03141 (cross-list from cs.LG) [pdf, other]
Title: An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[209]  arXiv:2101.03300 (cross-list from cs.LG) [pdf, other]
Title: Robust Blockchained Federated Learning with Model Validation and Proof-of-Stake Inspired Consensus
Comments: 8 pages, 7 figures, AAAI 2021 Workshop - Towards Robust, Secure and Efficient Machine Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[210]  arXiv:2101.03715 (cross-list from cs.DC) [pdf, ps, other]
Title: Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[211]  arXiv:2101.03840 (cross-list from eess.SY) [pdf, other]
Title: Privacy-Preserving Transactive Energy Management for IoT-aided Smart Homes via Blockchain
Authors: Qing Yang, Hao Wang
Journal-ref: IEEE Internet of Things Journal, 2021
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC)
[212]  arXiv:2101.04401 (cross-list from cs.LG) [pdf, other]
Title: Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps
Comments: Accepted to the 43rd International Conference on Software Engineering, Software Engineering in Practice Track. This is a preprint version, the copyright belongs to The Institute of Electrical and Electronics Engineers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[213]  arXiv:2101.04535 (cross-list from cs.LG) [pdf, other]
Title: Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[214]  arXiv:2101.04645 (cross-list from cs.LG) [pdf, other]
Title: Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators
Comments: Accepted at IJCNN 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[215]  arXiv:2101.04718 (cross-list from cs.PL) [pdf, other]
Title: Declarative Demand-Driven Reverse Engineering
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[216]  arXiv:2101.04773 (cross-list from cs.SD) [pdf, other]
Title: Practical Speech Re-use Prevention in Voice-driven Services
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[217]  arXiv:2101.04889 (cross-list from cs.LG) [pdf, ps, other]
Title: Towards Interpretable Ensemble Learning for Image-based Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[218]  arXiv:2101.04898 (cross-list from cs.LG) [pdf, other]
Title: Unlearnable Examples: Making Personal Data Unexploitable
Comments: ICLR2021, In International Conference on Learning Representations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[219]  arXiv:2101.05037 (cross-list from cs.DB) [pdf, other]
Title: Immutable and Democratic Data in permissionless Peer-to-Peer Systems
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[220]  arXiv:2101.05140 (cross-list from cs.LO) [pdf, other]
Title: Secure Process Algebra
Authors: Yong Wang
Comments: 172 pages, 36 figures, 28 tables
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[221]  arXiv:2101.05259 (cross-list from cs.CY) [pdf, other]
Title: A Digital Currency Architecture for Privacy and Owner-Custodianship
Comments: 24 pages, 6 figures, 1 table. arXiv admin note: substantial text overlap with arXiv:2006.03023
Journal-ref: Future Internet 2021, 13(5), 130, 2021-05-14
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[222]  arXiv:2101.05371 (cross-list from cs.LG) [pdf, ps, other]
Title: Anomaly Detection Support Using Process Classification
Comments: 14 pages, 6 figures
Journal-ref: Proceedings of the 5th International Conference on Software Security and Assurance (ICSSA 2019), 2019, 27-40
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[223]  arXiv:2101.05543 (cross-list from cs.DC) [pdf, other]
Title: On the Synchronization Power of Token Smart Contracts
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[224]  arXiv:2101.05641 (cross-list from cs.IR) [pdf, other]
Title: $C^3DRec$: Cloud-Client Cooperative Deep Learning for Temporal Recommendation in the Post-GDPR Era
Authors: Jialiang Han, Yun Ma
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[225]  arXiv:2101.06485 (cross-list from cs.DC) [pdf, other]
Title: T-Lease: A Trusted Lease Primitive for Distributed Systems
Authors: Bohdan Trach (1), Rasha Faqeh (1), Oleksii Oleksenko (1), Wojciech Ozga (1), Pramod Bhatotia (2), Christof Fetzer (1) ((1) TU Dresden, (2) TU Münich)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[ total of 273 entries: 1-25 | ... | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-273 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)