We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021, skipping first 25

[ total of 273 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 251-273 ]
[ showing 25 entries per page: fewer | more | all ]
[26]  arXiv:2101.01856 [pdf]
Title: Designing Actively Secure, Highly Available Industrial Automation Applications
Comments: Conference, 7 pages, 9 figures
Journal-ref: Proceedings of the 17th International Conference on Industrial Informatics (INDIN2019). Helsinki-Espoo, Finland, IEEE Computer Society Press, pp.374-379
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[27]  arXiv:2101.01898 [pdf, other]
Title: Connecting The Dots To Combat Collective Fraud
Authors: Mingxi Wu, Xi Chen
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[28]  arXiv:2101.01917 [pdf, other]
Title: sGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
Comments: Published in IEEE S&P 2021
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[29]  arXiv:2101.01950 [pdf, other]
Title: HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2101.02069 [pdf, other]
Title: Model Extraction and Defenses on Generative Adversarial Networks
Authors: Hailong Hu, Jun Pang
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[31]  arXiv:2101.02102 [pdf, ps, other]
Title: A Qualitative Empirical Analysis of Human Post-Exploitation Behavior
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[32]  arXiv:2101.02147 [pdf, other]
Title: A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
Comments: Accepted in IEEE TrustCom 2020, 7 Pages, 4 Figures, 3 Tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[33]  arXiv:2101.02281 [pdf, other]
Title: FLAME: Taming Backdoors in Federated Learning
Comments: To appear in the 31st USENIX Security Symposium, August 2022, Boston, MA, USA
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2101.02325 [pdf, other]
Title: Understanding the Error in Evaluating Adversarial Robustness
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2101.02334 [pdf, other]
Title: Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2101.02341 [pdf, other]
Title: Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2101.02377 [pdf, other]
Title: Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[38]  arXiv:2101.02552 [pdf]
Title: Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)
Journal-ref: In: Huang DS., Premaratne P. (eds) Intelligent Computing Methodologies. ICIC 2020. Lecture Notes in Computer Science, vol 12465. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2101.02556 [pdf, ps, other]
Title: Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geospatial Technologies
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2101.02559 [pdf, other]
Title: Robust Machine Learning Systems: Challenges, Current Trends, Perspectives, and the Road Ahead
Comments: Final version appears in this https URL
Journal-ref: IEEE Design and Test (Volume: 37, Issue: 2, April 2020): 30-57
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[41]  arXiv:2101.02562 [pdf, other]
Title: DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[42]  arXiv:2101.02573 [pdf, other]
Title: RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43]  arXiv:2101.02577 [pdf, other]
Title: Robust and Attack Resilient Logic Locking with a High Application-Level Impact
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Formal Languages and Automata Theory (cs.FL)
[44]  arXiv:2101.02627 [pdf, other]
Title: Privacy-Preserving Data Publishing in Process Mining
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[45]  arXiv:2101.02631 [pdf, other]
Title: Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
Comments: Paper accepted at WorldCist'21 - 9th World Conference on Information Systems and Technologies, Portugal, 30-31 March to 1-2 April 2021, this http URL
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2101.02632 [pdf]
Title: Triple-entry Accounting, Blockchain and Next of Kin: Towards a Standardization of Ledger Terminology
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2101.02644 [pdf, other]
Title: Data Poisoning Attacks to Deep Learning Based Recommender Systems
Comments: To appear in NDSS 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48]  arXiv:2101.02780 [pdf, other]
Title: SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Comments: This article has been accepted in IEEE Transactions on Emerging Topics in Computing. 17 pages, 12 figures, IEEE copyright
Journal-ref: IEEE Transactions on Emerging Topics in Computing, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[49]  arXiv:2101.02826 [pdf, other]
Title: Privacy-Preserving Cloud-Aided Broad Learning System
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2101.02834 [pdf, other]
Title: Differential Privacy-Based Online Allocations towards Integrating Blockchain and Edge Computing
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[ total of 273 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 251-273 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2212, contact, help  (Access key information)