We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2022

[ total of 333 entries: 1-333 ]
[ showing 333 entries per page: fewer | more ]
[1]  arXiv:2201.00031 [pdf, ps, other]
Title: Privacy-Protecting COVID-19 Exposure Notification Based on Cluster Events
Authors: Paul Syverson
Comments: 11 pages. This paper was presented at the NIST Workshop on Challenges for Digital Proximity Detection in Pandemics: Privacy, Accuracy, and Impact, January 28 02021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[2]  arXiv:2201.00099 [pdf, other]
Title: Differential Privacy Made Easy
Authors: Muhammad Aitsam
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2201.00231 [pdf]
Title: An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts
Comments: extended version of a paper published in The 14th International Symposium on Foundations and Practice of Security, FPS 2021, 8-10 December 2021
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[4]  arXiv:2201.00419 [pdf, other]
Title: VISAS -- Detecting GPS spoofing attacks against drones by analyzing camera's video stream
Comments: 8 pages, 16 figures
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2201.00484 [pdf]
Title: Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2201.00568 [pdf]
Title: Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[7]  arXiv:2201.00584 [pdf]
Title: Feature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based Classification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Neural and Evolutionary Computing (cs.NE)
[8]  arXiv:2201.00757 [pdf, other]
Title: Rank-1 Similarity Matrix Decomposition For Modeling Changes in Antivirus Consensus Through Time
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9]  arXiv:2201.00759 [pdf, other]
Title: MetaChain: A Novel Blockchain-based Framework for Metaverse Applications
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2201.00763 [pdf, other]
Title: DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Comments: 18 pages, 8 figures; to appear in the Network and Distributed System Security Symposium (NDSS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[11]  arXiv:2201.00815 [pdf, other]
Title: 00
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2201.00858 [pdf, other]
Title: Blockchain Nash Dynamics and the Pursuit of Compliance
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[13]  arXiv:2201.00864 [pdf, other]
Title: Secret Sharing Sharing For Highly Scalable Secure Aggregation
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2201.00900 [pdf, other]
Title: A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques
Comments: to be Published in ACM Computing Surveys (2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[15]  arXiv:2201.01051 [pdf]
Title: Open Access Dataset for Electromyography based Multi-code Biometric Authentication
Comments: manuscript for open access dataset (paper and appendix)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[16]  arXiv:2201.01130 [pdf, other]
Title: Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[17]  arXiv:2201.01147 [pdf]
Title: Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA Attacks
Comments: Author's version accepted for DTIS-2018; the final publication is available at this https URL
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2201.01153 [pdf]
Title: On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack
Comments: Author's version accepted for ReConFig-2019; the final publication is available at this https URL
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2201.01158 [pdf]
Title: Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves
Comments: Author's version accepted for DSD-2020; the final publication is available at this https URL
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2201.01262 [pdf, other]
Title: An algebraic attack to the Bluetooth stream cipher E0
Comments: 24 pages, 1 figure. To appear in Finite Fields and Their Applications
Subjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC); Commutative Algebra (math.AC); Rings and Algebras (math.RA)
[21]  arXiv:2201.01326 [pdf]
Title: OConsent -- Open Consent Protocol for Privacy and Consent Management with Blockchain
Authors: Subhadip Mitra
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2201.01350 [pdf, other]
Title: Prospects for Improving Password Selection
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[23]  arXiv:2201.01574 [pdf, other]
Title: Reinforcing Cybersecurity Hands-on Training With Adaptive Learning
Comments: IEEE FIE 2021 conference, 9 pages, 6 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[24]  arXiv:2201.01621 [pdf, other]
Title: ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2201.01649 [pdf, other]
Title: WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms
Comments: Submitted to IEEE S&P '22 on 3 Dec 2021
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2201.01711 [pdf]
Title: Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2201.01717 [pdf]
Title: Clustering versus Statistical Analysis for SCA: when Machine Learning is Better
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2201.01834 [pdf, other]
Title: Secure Remote Attestation with Strong Key Insulation Guarantees
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[29]  arXiv:2201.01927 [pdf]
Title: Network Generations and the Security Challenge in IoT Applications
Authors: Mahmoud S. Fayed
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2201.01989 [pdf, other]
Title: SPDL: Blockchain-secured and Privacy-preserving Decentralized Learning
Comments: 11 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[31]  arXiv:2201.02007 [pdf]
Title: Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA
Comments: Author's version accepted for ReConFig-2018; the final publication is available at this https URL
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2201.02236 [pdf, other]
Title: Detecting Anomalies using Overlapping Electrical Measurements in Smart Power Grids
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[33]  arXiv:2201.02351 [pdf, other]
Title: Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Systems and Control (eess.SY)
[34]  arXiv:2201.02358 [pdf, other]
Title: Towards Trustworthy DeFi Oracles: Past,Present and Future
Comments: Under review
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2201.02391 [pdf]
Title: Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks
Comments: Author's version accepted for ICICS-2017; the final publication is available at Springer via this https URL
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2201.02506 [pdf]
Title: Evaluation of Cyber Attacks Targeting Internet Facing IoT : An Experimental Evaluation
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2201.02563 [pdf, ps, other]
Title: Security Considerations for Virtual Reality Systems
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[38]  arXiv:2201.02601 [pdf, other]
Title: Apples and Cars: a Comparison of Security
Authors: Zhendong Ma
Comments: Extended Abstract, 5th ACM COMPUTER SCIENCE IN CARS SYMPOSIUM (CSCS 2021)
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2201.02665 [pdf, other]
Title: Detecting CAN Masquerade Attacks with Signal Clustering Similarity
Comments: 8 pages, 5 figures, 3 tables
Journal-ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
[40]  arXiv:2201.02677 [pdf, other]
Title: Predicting sensitive information leakage in IoT applications using flows-aware machine learning approach
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[41]  arXiv:2201.02730 [pdf]
Title: AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?
Authors: C. Benzaid, T. Taleb
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[42]  arXiv:2201.02775 [pdf, other]
Title: Dominating Vertical Collaborative Learning Systems
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[43]  arXiv:2201.02866 [pdf]
Title: Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula
Comments: Author's version accepted for DTIS-2019; the final publication is available at this https URL arXiv admin note: text overlap with arXiv:2201.02868
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2201.02868 [pdf]
Title: Horizontal Attacks against ECC: from Simulations to ASIC
Comments: Author's version accepted for IOSEC 2019; the final publication is available at Springer via this https URL arXiv admin note: text overlap with arXiv:2201.02866
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2201.02949 [pdf, other]
Title: Camera-Model Identification Using Encoding and Container Characteristics of Video Files
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[46]  arXiv:2201.02986 [pdf, other]
Title: A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[47]  arXiv:2201.03010 [pdf, other]
Title: Differentially Private Release of Event Logs for Process Mining
Comments: arXiv admin note: text overlap with arXiv:2103.11739
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[48]  arXiv:2201.03027 [pdf]
Title: Meta-Generalization for Multiparty Privacy Learning to Identify Anomaly Multimedia Traffic in Graynet
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
[49]  arXiv:2201.03134 [pdf, other]
Title: An Interpretable Federated Learning-based Network Intrusion Detection Framework
Comments: 12 pages, draft
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2201.03135 [pdf, other]
Title: The SEED Internet Emulator and Its Applications in Cybersecurity Education
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2201.03281 [pdf, ps, other]
Title: IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[52]  arXiv:2201.03388 [pdf]
Title: A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[53]  arXiv:2201.03391 [pdf]
Title: Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2201.03401 [pdf, other]
Title: An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[55]  arXiv:2201.03499 [pdf, ps, other]
Title: Deletion-Compliance in the Absence of Privacy
Comments: 25 pages, 4 figures. Appears in the proceedings of PST2021
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2201.03767 [pdf, other]
Title: Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[57]  arXiv:2201.03772 [pdf, other]
Title: RFLBAT: A Robust Federated Learning Algorithm against Backdoor Attack
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[58]  arXiv:2201.03913 [src]
Title: Exponential Randomized Response: Boosting Utility in Differentially Private Selection
Comments: This algorithm only works under an assumption that is not realistic for the wider application of differential privacy
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2201.04014 [pdf, other]
Title: Captcha Attack: Turning Captchas Against Humanity
Comments: Currently under submission
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[60]  arXiv:2201.04018 [pdf, other]
Title: Feature Space Hijacking Attacks against Differentially Private Split Learning
Comments: To appear at the Third AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-22). (4 pages, short paper.)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2201.04048 [pdf, other]
Title: SnapFuzz: An Efficient Fuzzing Framework for Network Applications
Journal-ref: ISSTA 22, July 18 22, 2022, Virtual, South Korea
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[62]  arXiv:2201.04211 [pdf, ps, other]
Title: Achieving Differential Privacy with Matrix Masking in Big Data
Comments: 27 pages
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[63]  arXiv:2201.04255 [pdf, other]
Title: Rache: Radix-additive caching for homomorphic encryption
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[64]  arXiv:2201.04351 [pdf, other]
Title: Diffix Elm: Simple Diffix
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2201.04424 [pdf, other]
Title: Detecting Ransomware Execution in a Timely Manner
Comments: 12 Pages, 9 Figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2201.04425 [pdf]
Title: Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms
Comments: 6 pages, 1 figure
Journal-ref: 2021 10th MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, p. 81-86
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2201.04441 [pdf, other]
Title: Path Transitions Tell More:Optimizing Fuzzing Schedules via Runtime Program States
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[68]  arXiv:2201.04569 [pdf, other]
Title: Get your Foes Fooled: Proximal Gradient Split Learning for Defense against Model Inversion Attacks on IoMT data
Comments: 10 pages, 5 figures, 2 tables
Journal-ref: IEEE Transactions on Network Science and Engineering, 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[69]  arXiv:2201.04610 [pdf, other]
Title: Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2201.04677 [pdf, other]
Title: When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[71]  arXiv:2201.04736 [pdf]
Title: Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[72]  arXiv:2201.04762 [pdf, ps, other]
Title: Privacy Amplification by Subsampling in Time Domain
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[73]  arXiv:2201.04782 [pdf, other]
Title: Privacy-Utility Trades in Crowdsourced Signal Map Obfuscation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[74]  arXiv:2201.04803 [pdf, other]
Title: A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks
Comments: 29 Pages, 5 Figures, Submitted in IEEE Communications Surveys and Tutorials
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2201.04816 [pdf, other]
Title: Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform (EMCP)
Authors: Hendrik F. R. Schmidt (1), Jörg Schlötterer (1, 2, 3), Marcel Bargull (1), Enrico Nasca (1, 3), Ryan Aydelott (1), Christin Seifert (1, 2, 3), Folker Meyer (1, 2) ((1) Institute for Artificial Intelligence in Medicine, University Hospital Essen, Essen, Germany (2) University of Duisburg-Essen, Essen, Germany (3) Cancer Research Center Cologne Essen (CCCE), Essen, Germany)
Comments: 9 pages, 5 figures, to be published in the proceedings of the 2021 IEEE CogMI conference. Christin Seifert and Folker Meyer are co-senior authors
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[76]  arXiv:2201.04845 [pdf, other]
Title: Reconstructing Training Data with Informed Adversaries
Comments: Published at "2022 IEEE Symposium on Security and Privacy (SP)"
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:2201.04853 [pdf]
Title: FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers
Comments: 29th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2201.05001 [pdf]
Title: Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement Analysis
Authors: Rui Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[79]  arXiv:2201.05006 [pdf, ps, other]
Title: Dynamic Local Searchable Symmetric Encryption
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2201.05071 [pdf, other]
Title: Evaluation of Neural Networks Defenses and Attacks using NDCG and Reciprocal Rank Metrics
Comments: 12 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[81]  arXiv:2201.05073 [pdf, ps, other]
Title: Low-latency, Scalable, DeFi with Zef
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2201.05199 [pdf, other]
Title: D-Box: DMA-enabled Compartmentalization for Embedded Applications
Comments: Network and Distributed Systems Security (NDSS) Symposium 2022
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2201.05326 [pdf, other]
Title: Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots
Comments: SOAR Engine for Honeypots Deployment, 8 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[84]  arXiv:2201.05399 [pdf, other]
Title: Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[85]  arXiv:2201.05403 [pdf, ps, other]
Title: Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2201.05410 [pdf, other]
Title: CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2201.05415 [pdf, other]
Title: Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0
Comments: 30 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2201.05657 [pdf, other]
Title: Authentication and Handover Challenges and Methods for Drone Swarms
Comments: Accepted for publication in IEEE Journal of Radio Frequency Identification
Journal-ref: IEEE Journal of Radio Frequency Identification 2022
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2201.05671 [pdf, other]
Title: Zef: Low-latency, Scalable, Private Payments
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2201.05677 [pdf, other]
Title: Bullshark: DAG BFT Protocols Made Practical
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2201.05757 [pdf, other]
Title: TRacer: Scalable Graph-based Transaction Tracing for Account-based Blockchain Trading Systems
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2201.05889 [pdf, other]
Title: StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning
Comments: To appear in ACM Conference on Computer and Communications Security (CCS), 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:2201.05931 [pdf, other]
Title: On eliminating blocking interference of RFID unauthorized reader detection system
Comments: 4 pages,7 figures
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2201.05943 [pdf, other]
Title: TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal Attacks
Comments: Accepted at Design, Automation and Test in Europe Conference (DATE), 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[95]  arXiv:2201.05964 [pdf, other]
Title: Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases
Comments: Forthcoming in Proceedings on Privacy Enhancing Technologies 2022
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[96]  arXiv:2201.05996 [pdf, ps, other]
Title: Hardware Implementation of Multimodal Biometric using Fingerprint and Iris
Authors: Tariq M Khan
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[97]  arXiv:2201.06038 [pdf, other]
Title: Image data hiding with multi-scale autoencoder network
Comments: accepted by Media Watermarking, Security, and Forensics 2022
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[98]  arXiv:2201.06068 [pdf]
Title: Zero Botnets: An Observe-Pursue-Counter Approach
Comments: 26 pages, 13 figures, 2 tables, 72 references, submitted to PlosOne
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[99]  arXiv:2201.06080 [pdf, other]
Title: Evaluating the Security of Open Radio Access Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[100]  arXiv:2201.06093 [pdf, other]
Title: Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[101]  arXiv:2201.06100 [pdf]
Title: Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain
Comments: 18 Pages; 14 Figures; 2 Tables
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[102]  arXiv:2201.06235 [pdf, other]
Title: Characterizing Sensor Leaks in Android Apps
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[103]  arXiv:2201.06335 [pdf, other]
Title: End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates
Comments: 21 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2201.06354 [pdf, other]
Title: Improving the Security of the IEEE 802.15.6 Standard for Medical BANs
Comments: Published in IEEE Access
Journal-ref: IEEE Access, 2022
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2201.06362 [pdf, other]
Title: Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2201.06394 [pdf, other]
Title: Improved Degree Evaluation and Superpoly Recovery methods with Application to Trivium
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2201.06446 [pdf, other]
Title: Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange
Comments: This is the extended version of the paper that appeared in the 12th ACM Conference on Data and Application Security and Privacy (CODASPY'22), April 24-26, 2022, Baltimore-Washington DC Area, United States, this https URL
Journal-ref: 12th ACM Conference on Data and Application Security and Privacy 2022 (CODASPY'22)
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2201.06680 [pdf, other]
Title: Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2201.06699 [pdf, other]
Title: AESPA: Accuracy Preserving Low-degree Polynomial Activation for Fast Private Inference
Comments: 11 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2201.06785 [pdf, ps, other]
Title: Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2201.06811 [pdf, other]
Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash
Comments: 10 pages content, 2 pages appendix
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2201.06971 [pdf]
Title: Identification for Accountability vs Privacy
Comments: 4 pages plus appendix, 9 pages total
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[113]  arXiv:2201.07119 [pdf, ps, other]
Title: A Survey on Code-Based Cryptography
Comments: This book chapter is considered to be part of the Springer Lecture Notes in Mathematics: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and Cryptography
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[114]  arXiv:2201.07188 [pdf, other]
Title: SoK: Blockchain Governance
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
[115]  arXiv:2201.07220 [pdf, other]
Title: Do not rug on me: Zero-dimensional Scam Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
[116]  arXiv:2201.07224 [pdf, other]
Title: NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Comments: Published as a conference paper in AAAI 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[117]  arXiv:2201.07323 [pdf]
Title: A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications
Journal-ref: IEEE Access, vol. 10, 2022
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2201.07359 [pdf, other]
Title: Sandbox Sample Classification Using Behavioral Indicators of Compromise
Authors: M. Andrecut
Comments: 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119]  arXiv:2201.07375 [pdf, other]
Title: A 333.9uW 0.158mm$^2$ Saber Learning with Rounding based Post-Quantum Crypto Accelerator
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[120]  arXiv:2201.07388 [pdf, other]
Title: Kantorovich Mechanism for Pufferfish Privacy
Authors: Ni Ding
Comments: 20 pages, incl. supplementary materials, 4 figures, to appear in proceeding of AISTATS 2022
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[121]  arXiv:2201.07391 [pdf, other]
Title: MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
Comments: To Appear in KDD'2022
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2201.07417 [pdf, other]
Title: Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[123]  arXiv:2201.07444 [pdf, other]
Title: Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks
Comments: under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2201.07462 [pdf, other]
Title: Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits
Comments: Published in IEEE PerCom Workshops 2022,978-1-6654-1647-4/22/$31.00 pp.643-648 Copyright 2022 IEEE
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2201.07469 [pdf, other]
Title: Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional Space
Comments: This paper is accepted and will appear in ICDE 2022 as a regular research paper
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[126]  arXiv:2201.07496 [pdf, other]
Title: A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security Applications
Comments: Published in IEEE Solid-State Circuits Letters (SSCL)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[127]  arXiv:2201.07513 [pdf, other]
Title: Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[128]  arXiv:2201.07537 [pdf, other]
Title: Graph Neural Network-based Android Malware Classification with Jumping Knowledge
Comments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[129]  arXiv:2201.07597 [pdf, other]
Title: CyberRadar: A PUF-based Detecting and Mapping Framework for Physical Devices
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2201.07649 [pdf, other]
Title: Malware Classification Using Static Disassembly and Machine Learning
Comments: To be published in 29th AIAI Irish Conference on Artificial Intelligence and Cognitive Science
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:2201.07651 [pdf, other]
Title: Enhancing CryptoGuards Deployability for Continuous Software Security Scanning
Authors: Miles Frantz
Comments: Masters thesis
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2201.07654 [pdf, other]
Title: Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures
Authors: Darren Cobian
Comments: 54 pages, 17 figures/tables, 43 citations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[133]  arXiv:2201.07711 [pdf, other]
Title: Enhancing the Security & Privacy of Wearable Brain-Computer Interfaces
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Operating Systems (cs.OS)
[134]  arXiv:2201.07730 [pdf, other]
Title: SCOTCH: An Efficient Secure Computation Framework for Secure Aggregation
Comments: Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), Third AAAI Privacy-Preserving Artificial Intelligence (PPAI-22) Workshop
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2201.07740 [pdf, other]
Title: Relax the Non-Collusion Assumption for Multi-Server PIR
Comments: 20 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[136]  arXiv:2201.07746 [pdf, other]
Title: A Centrality Analysis of the Lightning Network
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2201.07765 [pdf, other]
Title: Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins
Comments: 39 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2201.07793 [pdf]
Title: On Using Blockchains for Beyond Visual Line of Sight (BVLOS) Drones Operation: An Architectural Study
Comments: 10 pages, 4 figures, HiPEAC'22
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
[139]  arXiv:2201.07920 [pdf, other]
Title: Shades of Finality and Layer 2 Scaling
Authors: Bennet Yee (1), Dawn Song (1), Patrick McCorry (2), Chris Buckland (2) ((1) Oasis Labs, (2) Infura)
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2201.07946 [pdf, other]
Title: Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
Comments: 26 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2201.07954 [pdf, other]
Title: Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[142]  arXiv:2201.07959 [pdf, other]
Title: APIRO: A Framework for Automated Security Tools API Recommendation
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[143]  arXiv:2201.07964 [pdf]
Title: A Systematic Literature Review of Blockchain Technology Adoption in Bangladesh
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-30, Vol. 6, No. 1, 1st January 2022, Published by International Association of Educators and Researchers (IAER)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[144]  arXiv:2201.08052 [pdf, other]
Title: Adversarial Jamming for a More Effective Constellation Attack
Comments: 3 pages, 2 figures, published in The 13th International Symposium on Antennas, Propagation and EM Theory (ISAPE 2021)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[145]  arXiv:2201.08120 [pdf, other]
Title: Survey on Privacy-Preserving Techniques for Data Publishing
Comments: 35 pages, 3 figures, 5 tables
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2201.08126 [pdf]
Title: Reversible Data Hiding in Encrypted Images by Lossless Pixel Conversion
Comments: Submitted to IEEE TDSC
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2201.08133 [pdf, other]
Title: CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[148]  arXiv:2201.08135 [pdf, other]
Title: Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[149]  arXiv:2201.08154 [pdf, other]
Title: NapierOne: A modern mixed file data set alternative to Govdocs1
Journal-ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2201.08441 [pdf, other]
Title: VUDENC: Vulnerability Detection with Deep Learning on a Natural Codebase for Python
Comments: Accepted Manuscript
Journal-ref: Information and Software Technology, Volume 144, April 2022, 106809
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[151]  arXiv:2201.08461 [pdf, ps, other]
Title: Polytope: Practical Memory Access Control for C++ Applications
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[152]  arXiv:2201.08468 [pdf, other]
Title: Android Malware Detection using Feature Ranking of Permissions
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[153]  arXiv:2201.08473 [pdf]
Title: Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools
Comments: ICCWS 2021 16th International Conference on Cyber Warfare and Security. Academic Conferences Limited, 2021
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2201.08474 [pdf, other]
Title: Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Comments: Accepted to ICLR2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[155]  arXiv:2201.08551 [pdf, other]
Title: Blockchain-based Collaborated Federated Learning for Improved Security, Privacy and Reliability
Comments: Preliminary work
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[156]  arXiv:2201.08564 [pdf]
Title: Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[157]  arXiv:2201.08661 [pdf, other]
Title: The Security of Deep Learning Defences for Medical Imaging
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[158]  arXiv:2201.08678 [pdf, other]
Title: Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2201.08686 [pdf, other]
Title: Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2201.08697 [pdf, other]
Title: Verilay: A Verifiable Proof of Stake Chain Relay
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2201.08701 [pdf, other]
Title: SmartSync: Cross-Blockchain Smart Contract Interaction and Synchronization
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2201.08739 [pdf, other]
Title: Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996--2021
Authors: Isabel Wagner
Comments: submitted
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[163]  arXiv:2201.08786 [pdf, other]
Title: FedComm: Federated Learning as a Medium for Covert Communication
Comments: 18 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[164]  arXiv:2201.09006 [pdf, other]
Title: On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development
Comments: 40 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[165]  arXiv:2201.09009 [pdf, other]
Title: Sliding Window Challenge Process for Congestion Detection
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2201.09035 [pdf, other]
Title: On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2201.09137 [pdf, other]
Title: Long-term Data Sharing under Exclusivity Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT)
[168]  arXiv:2201.09186 [pdf, other]
Title: pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2201.09243 [pdf, other]
Title: Increasing the Cost of Model Extraction with Calibrated Proof of Work
Comments: Published as a conference paper at ICLR 2022 (Spotlight - 5% of submitted papers)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[170]  arXiv:2201.09338 [pdf, other]
Title: Building a Privacy-Preserving Smart Camera System
Comments: Accepted to PETS (Privacy Enhancing Technologies Symposium) 2022
Journal-ref: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2022
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2201.09370 [pdf, other]
Title: Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Comments: Conditionally accepted to USENIX Security 2022. This is not the camera-ready version. arXiv admin note: substantial text overlap with arXiv:2012.03404
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[172]  arXiv:2201.09425 [pdf, other]
Title: Post-processing of Differentially Private Data: A Fairness Perspective
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[173]  arXiv:2201.09487 [pdf, ps, other]
Title: Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information
Comments: To appear in IEEE Transactions on Wireless Communications. arXiv admin note: text overlap with arXiv:2101.00848
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[174]  arXiv:2201.09493 [pdf, other]
Title: STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[175]  arXiv:2201.09514 [pdf, other]
Title: DDoSDet: An approach to Detect DDoS attacks using Neural Networks
Comments: 6 figures, 2 tables, 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[176]  arXiv:2201.09538 [pdf, other]
Title: Backdoor Defense with Machine Unlearning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[177]  arXiv:2201.09631 [pdf]
Title: On the Complexity of Attacking Elliptic Curve Based Authentication Chips
Comments: This is an author's version of the paper (On the Complexity of Attacking Commercial Authentication Products) accepted for publication in Microprocessors and Microsystems journal. The final publication is available at this https URL
Journal-ref: Microprocessors and Microsystems, Volume 80, February 2021, 103480
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2201.09650 [pdf, other]
Title: What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction
Comments: Accepted to NDSS 2022. Camera-ready version with supplementary materials. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[179]  arXiv:2201.09941 [pdf, other]
Title: TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Authors: Aakash Tyagi (1), Addison Crump (1), Ahmad-Reza Sadeghi (2), Garrett Persyn (1), Jeyavijayan Rajendran (1), Patrick Jauernig (2), Rahul Kande (1) ((1) Texas A&M University, College Station, USA, (2) Technische Universität Darmstadt, Germany)
Comments: To be published in the proceedings of the 31st USENIX Security Symposium, 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Software Engineering (cs.SE)
[180]  arXiv:2201.09956 [pdf, other]
Title: DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
Authors: Tomer Laor (1), Naif Mehanna (2 and 3 and 4), Antonin Durey (2 and 3 and 4), Vitaly Dyadyuk (1), Pierre Laperdrix (2 and 3 and 4), Clémentine Maurice (2 and 3 and 4), Yossi Oren (1), Romain Rouvoy (2 and 3 and 4), Walter Rudametkin (2 and 3 and 4), Yuval Yarom (5) ((1) Ben-Gurion University of the Negev, (2) University of Lille, (3) CNRS, (4) Inria, (5) University of Adelaide)
Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2201.10087 [pdf, ps, other]
Title: Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum with Multiple Mining Pools
Comments: 50 pages, 18 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Performance (cs.PF); Probability (math.PR)
[182]  arXiv:2201.10272 [pdf]
Title: Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[183]  arXiv:2201.10348 [pdf, other]
Title: Correcting for Reporting Delays in Cyber Incidents
Journal-ref: In JSM Proceedings, 2021, pp. 721-735
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[184]  arXiv:2201.10349 [pdf]
Title: Roadmap for Cybersecurity in Autonomous Vehicles
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[185]  arXiv:2201.10351 [pdf, other]
Title: AI-based Re-identification of Behavioral Clickstream Data
Comments: Submitted to the EMAC Conference 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); General Economics (econ.GN)
[186]  arXiv:2201.10371 [pdf, other]
Title: ML-based tunnel detection and tunneled application classification
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[187]  arXiv:2201.10473 [pdf, other]
Title: Faster multiplication over $\mathbb{F}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instruction
Journal-ref: Journal of Cryptographic Engineering (ISSN : 2190-8508, ISSN \'electronique : 2190-8516), november 2021
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2201.10500 [pdf, other]
Title: A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[189]  arXiv:2201.10505 [pdf, other]
Title: Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia Conditions
Journal-ref: IEEE Open Access Journal of Power and Energy 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[190]  arXiv:2201.10531 [pdf, other]
Title: HOLL: Program Synthesis for Higher OrderLogic Locking
Comments: Accepted in TACAS-22 conference. 24 pages llncs format (without references), 11 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[191]  arXiv:2201.10606 [pdf, other]
Title: Common Evaluation Pitfalls in Touch-Based Authentication Systems
Subjects: Cryptography and Security (cs.CR)
[192]  arXiv:2201.10752 [pdf]
Title: Phishing Attacks Detection -- A Machine Learning-Based Approach
Comments: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2201.10831 [pdf, ps, other]
Title: Tracking on the Web, Mobile and the Internet-of-Things
Authors: Reuben Binns
Subjects: Cryptography and Security (cs.CR)
[194]  arXiv:2201.10833 [pdf]
Title: Automatic detection of access control vulnerabilities via API specification processing
Journal-ref: Voprosy kiberbezopasnosti.2022.1(47).p.49-65
Subjects: Cryptography and Security (cs.CR)
[195]  arXiv:2201.10838 [pdf, other]
Title: Privacy-Preserving Logistic Regression Training with A Faster Gradient Variant
Authors: John Chiang
Comments: The basic work of this paper, $\texttt{quadratic gradient}$ and the enhanced full batch NAG, was nearly finished in September 2019. The initial version of this paper was written in April 2020, rejected by ICANN 2020. The enhanced mini-batch NAG was introduced into this paper in September 2020 and later rejected by a special issue on the journal FGCS 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[196]  arXiv:2201.10839 [pdf, other]
Title: Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication
Subjects: Cryptography and Security (cs.CR)
[197]  arXiv:2201.10905 [src]
Title: Boomerang Spectra of Two Classes of Power Functions via Their Differential Spectra
Comments: Part of the results of our article are covered by sihem BFA's article
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[198]  arXiv:2201.11111 [pdf]
Title: Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber Resilience
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2201.11148 [pdf]
Title: Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?
Subjects: Cryptography and Security (cs.CR)
[200]  arXiv:2201.11152 [pdf]
Title: Cyber Resilience: by Design or by Intervention?
Subjects: Cryptography and Security (cs.CR)
[201]  arXiv:2201.11291 [pdf, other]
Title: SoK: An Overview of PPG's Application in Authentication
Subjects: Cryptography and Security (cs.CR)
[202]  arXiv:2201.11300 [pdf, other]
Title: Geo-obfuscation Mechanisms for Spatial Crowdsourcing via Multi-Objective Evolutionary Optimization
Subjects: Cryptography and Security (cs.CR)
[203]  arXiv:2201.11308 [pdf, other]
Title: Calibration with Privacy in Peer Review
Comments: 31 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[204]  arXiv:2201.11311 [pdf, other]
Title: Towards a Secure and Reliable Federated Learning using Blockchain
Comments: This paper has been accepted for publication by IEEE Global Communications Conference (GLOBECOM). The final version will be published by the IEEE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[205]  arXiv:2201.11337 [pdf, other]
Title: Towards a Scalable and Trustworthy Blockchain: IoT Use Case
Comments: This paper has been accepted for publication by ICC 2021-IEEE International Conference on Communications. The final version will be published by the IEEE
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[206]  arXiv:2201.11362 [pdf, other]
Title: HYPERLOCK: In-Memory Hyperdimensional Encryption in Memristor Crossbar Array
Comments: Accepted to IEEE ISCAS 2022
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
[207]  arXiv:2201.11368 [pdf, other]
Title: Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT
Comments: This paper has been accepted for publication by the IEEE Network. The final version will be published by the IEEE
Journal-ref: in IEEE Network, vol. 35, no. 2, pp. 194-201, March/April 2021
Subjects: Cryptography and Security (cs.CR)
[208]  arXiv:2201.11377 [pdf, other]
Title: CacheFX: A Framework for Evaluating Cache Security
Subjects: Cryptography and Security (cs.CR)
[209]  arXiv:2201.11406 [pdf, other]
Title: Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context
Comments: 23 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[210]  arXiv:2201.11603 [pdf, other]
Title: Plume: Differential Privacy at Scale
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[211]  arXiv:2201.11628 [pdf, other]
Title: Early Detection of Network Attacks Using Deep Learning
Comments: Submitted to ITEQS 2022 Workshop
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[212]  arXiv:2201.11692 [pdf, other]
Title: SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders
Comments: Accepted by CCS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[213]  arXiv:2201.11764 [pdf, other]
Title: A TOCTOU Attack on DICE Attestation
Comments: 10 pages, 3 figures, to appear at CODASPY'22
Subjects: Cryptography and Security (cs.CR)
[214]  arXiv:2201.11780 [pdf, other]
Title: Minotaur: Multi-Resource Blockchain Consensus
Comments: 17 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[215]  arXiv:2201.11796 [pdf]
Title: A Privacy-Protecting Framework of Autonomous Contact Tracing for SARS-CoV-2 and Beyond
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[216]  arXiv:2201.11807 [pdf, other]
Title: Taxonomy of Security Weaknesses in Java and Kotlin Android Apps
Comments: Accepted to JSS journal
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[217]  arXiv:2201.11812 [pdf, other]
Title: A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles
Comments: Accepted and to appear in IEEE International Conference on Communications (ICC); Code is available at Github link: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[218]  arXiv:2201.11844 [pdf]
Title: Speckle-based optical cryptosystem and its application for human face recognition via deep learning
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Optics (physics.optics)
[219]  arXiv:2201.11855 [pdf, other]
Title: Accountability and Insurance in IoT Supply Chain
Subjects: Cryptography and Security (cs.CR)
[220]  arXiv:2201.11860 [pdf, other]
Title: On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies
Subjects: Cryptography and Security (cs.CR)
[221]  arXiv:2201.11934 [pdf, other]
Title: A Secure and Efficient Federated Learning Framework for NLP
Comments: Accepted by EMNLP 2021
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[222]  arXiv:2201.12194 [pdf, ps, other]
Title: Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
Comments: 62 pages, 18 figures, Full version of the article published in ACM PODC 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[223]  arXiv:2201.12333 [pdf, other]
Title: A Joint Exponential Mechanism For Differentially Private Top-$k$
Subjects: Cryptography and Security (cs.CR)
[224]  arXiv:2201.12416 [pdf, other]
Title: Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Comments: The 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[225]  arXiv:2201.12439 [pdf, ps, other]
Title: Discriminating Defense Against DDoS Attacks; a Novel Approach
Comments: 21 pages 0 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[226]  arXiv:2201.12563 [pdf, other]
Title: Dissimilar Redundancy in DeFi
Subjects: Cryptography and Security (cs.CR)
[227]  arXiv:2201.12577 [pdf, other]
Title: Volley Revolver: A Novel Matrix-Encoding Method for Privacy-Preserving Neural Networks (Inference)
Authors: John Chiang
Comments: The encoding method we proposed in this work, $\texttt{Volley Revolver}$, is particularly tailored for privacy-preserving neural networks. There is a good chance that it can be used to assist the private neural networks training, in which case for the backpropagation algorithm of the fully-connected layer the first matrix $A$ is revolved while the second matrix $B$ is settled to be still
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[228]  arXiv:2201.12727 [pdf, other]
Title: Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat
Comments: 10 Pages, 9 Figures, 3 Tables Published in the IEEE Internet of Things Journal
Journal-ref: IEEE Internet of Things Journal Jan 2022
Subjects: Cryptography and Security (cs.CR)
[229]  arXiv:2201.12876 [pdf, other]
Title: DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware Detection
Comments: IET Information Security (to appear)
Subjects: Cryptography and Security (cs.CR)
[230]  arXiv:2201.12879 [pdf, other]
Title: Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline
Subjects: Cryptography and Security (cs.CR)
[231]  arXiv:2201.13010 [pdf]
Title: Architectures for Protecting Cloud Data Planes
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[232]  arXiv:2201.13077 [pdf]
Title: An Overview of Various Biometric Approaches: ECG One of its Trait
Comments: Accepted and Published in the International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). Volume 4, Issue 1, January-February 2015
Subjects: Cryptography and Security (cs.CR)
[233]  arXiv:2201.13086 [pdf, other]
Title: Securing Federated Sensitive Topic Classification against Poisoning Attacks
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[234]  arXiv:2201.13102 [pdf, other]
Title: GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection
Subjects: Cryptography and Security (cs.CR)
[235]  arXiv:2201.13153 [pdf, other]
Title: A new idea for RSA backdoors
Authors: Marco Cesati
Comments: 19 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[236]  arXiv:2201.13160 [pdf, other]
Title: AnyCall: Fast and Flexible System-Call Aggregation
Journal-ref: PLOS'21: Proceedings of the 11th Workshop on Programming Languages and Operating Systems. 2021. Association for Computing Machinery (ACM), New York, NY, USA, Pages 1-8
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS); Programming Languages (cs.PL)
[237]  arXiv:2201.13266 [pdf, other]
Title: Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential Privacy
Comments: 16 pages, 5 figures, in: IEEE Transactions on Information Forensics and Security (TIFS), 2022. arXiv admin note: substantial text overlap with arXiv:2112.05464
Subjects: Cryptography and Security (cs.CR)
[238]  arXiv:2201.13354 [pdf, other]
Title: Graph Set-colorings And Hypergraphs In Topological Coding
Authors: Bing Yao, Fei Ma
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[239]  arXiv:2201.13444 [pdf, other]
Title: Boundary Defense Against Black-box Adversarial Attacks
Subjects: Cryptography and Security (cs.CR)
[240]  arXiv:2201.00148 (cross-list from cs.LG) [pdf, other]
Title: Rethinking Feature Uncertainty in Stochastic Neural Networks for Adversarial Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[241]  arXiv:2201.00313 (cross-list from cs.IT) [pdf, other]
Title: Secure Determinant Codes for Distributed Storage Systems
Comments: 23 pages, 8 figures. Submitted to IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[242]  arXiv:2201.00696 (cross-list from cs.IR) [pdf]
Title: Full-privacy secured search engine empowered by efficient genome-mapping algorithms
Comments: 21 pages, 5 figures, 3 tables
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[243]  arXiv:2201.00762 (cross-list from cs.LG) [pdf, other]
Title: Execute Order 66: Targeted Data Poisoning for Reinforcement Learning
Comments: Workshop on Safe and Robust Control of Uncertain Systems at the 35th Conference on Neural Information Processing Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[244]  arXiv:2201.00768 (cross-list from cs.CL) [pdf, other]
Title: Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Comments: Survey; 2 figures, 4 tables
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[245]  arXiv:2201.00976 (cross-list from cs.LG) [pdf]
Title: Survey on the Convergence of Machine Learning and Blockchain
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[246]  arXiv:2201.01139 (cross-list from cs.LG) [pdf, other]
Title: Generating synthetic mobility data for a realistic population with RNNs to improve utility and privacy
Comments: 10 pages. Extended version. Shorter version in The 37th ACM/SIGAPP Symposium on Applied Computing (SAC '22)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[247]  arXiv:2201.01154 (cross-list from cs.CY) [pdf, other]
Title: Preventing Cheating in Hands-on Lab Assignments
Comments: ACM SIGCSE 2022 conference, 7 pages, 3 figures, 1 table
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[248]  arXiv:2201.01810 (cross-list from cs.GT) [pdf, other]
Title: Privacy-Friendly Peer-to-Peer Energy Trading: A Game Theoretical Approach
Comments: To be published in IEEE Power & Energy Society General Meeting (GM), 2022
Subjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[249]  arXiv:2201.02504 (cross-list from cs.CL) [pdf, other]
Title: Repairing Adversarial Texts through Perturbation
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[250]  arXiv:2201.02873 (cross-list from cs.LG) [pdf, other]
Title: LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[251]  arXiv:2201.02993 (cross-list from cs.CL) [pdf, other]
Title: Rethink the Evaluation for Attack Strength of Backdoor Attacks in Natural Language Processing
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252]  arXiv:2201.03004 (cross-list from cs.LG) [pdf, other]
Title: Privacy-aware Early Detection of COVID-19 through Adversarial Training
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[253]  arXiv:2201.03041 (cross-list from cs.DS) [pdf, ps, other]
Title: Locality-Preserving Hashing for Shifts with Connections to Cryptography
Journal-ref: ITCS 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[254]  arXiv:2201.03045 (cross-list from cs.CV) [pdf, other]
Title: Applying Artificial Intelligence for Age Estimation in Digital Forensic Investigations
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[255]  arXiv:2201.03052 (cross-list from cs.HC) [pdf]
Title: Measuring User Perceived Security of Mobile Banking Applications
Comments: NA
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[256]  arXiv:2201.03080 (cross-list from cs.CV) [pdf, other]
Title: The State of Aerial Surveillance: A Survey
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[257]  arXiv:2201.03139 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Generative Adversarial Networks with Model Inversion
Comments: Accepted by 13th IEEE International Workshop on Information Forensics and Security (WIFS 2021), Montpellier, France
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[258]  arXiv:2201.03201 (cross-list from cs.CY) [pdf, other]
Title: Fusing Blockchain and AI with Metaverse: A Survey
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[259]  arXiv:2201.03204 (cross-list from cs.LG) [pdf, ps, other]
Title: Differentially Private $\ell_1$-norm Linear Regression with Heavy-tailed Data
Authors: Di Wang, Jinhui Xu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[260]  arXiv:2201.03330 (cross-list from cs.SI) [pdf]
Title: Social Media Networks Attacks and their Preventive Mechanisms: A Review
Comments: 14 pages
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[261]  arXiv:2201.03380 (cross-list from cs.DS) [pdf, other]
Title: Bounded Space Differentially Private Quantiles
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Databases (cs.DB)
[262]  arXiv:2201.03869 (cross-list from cs.LG) [pdf, other]
Title: Dictionary Learning with Uniform Sparse Representations for Anomaly Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[263]  arXiv:2201.03948 (cross-list from cs.IT) [pdf, other]
Title: Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints
Authors: Onur Günlü
Comments: Appeared in the Entropy journal
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR)
[264]  arXiv:2201.03968 (cross-list from cs.GT) [pdf, other]
Title: Optimal and Differentially Private Data Acquisition: Central and Local Mechanisms
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[265]  arXiv:2201.04266 (cross-list from cs.GT) [pdf, ps, other]
Title: Safe Equilibrium
Authors: Sam Ganzfried
Subjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Theoretical Economics (econ.TH)
[266]  arXiv:2201.05057 (cross-list from cs.CV) [pdf, other]
Title: On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles
Comments: 13 pages, 13 figures, accepted by CVPR 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[267]  arXiv:2201.05286 (cross-list from cs.LG) [pdf, other]
Title: Demystifying Swarm Learning: A New Paradigm of Blockchain-based Decentralized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[268]  arXiv:2201.05819 (cross-list from cs.LG) [pdf, other]
Title: Interpretable and Effective Reinforcement Learning for Attacking against Graph-based Rumor Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[269]  arXiv:2201.06187 (cross-list from cs.NI) [pdf, other]
Title: Understanding the Decentralization of DPoS: Perspectives From Data-Driven Analysis on EOSIO
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[270]  arXiv:2201.06244 (cross-list from cs.LG) [pdf, other]
Title: EFMVFL: An Efficient and Flexible Multi-party Vertical Federated Learning without a Third Party
Comments: 9pages,2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[271]  arXiv:2201.07063 (cross-list from cs.LG) [pdf, other]
Title: Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[272]  arXiv:2201.07206 (cross-list from cs.LG) [pdf, other]
Title: Minimax Optimality (Probably) Doesn't Imply Distribution Learning for GANs
Comments: 32 pages, 1 figure
Subjects: Machine Learning (cs.LG); Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[273]  arXiv:2201.07287 (cross-list from cs.IT) [pdf, other]
Title: Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems
Comments: 9 pages, 4 figures, 2 tables, To appear in IEEE International Symposium on Information Theory (ISIT) 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[274]  arXiv:2201.07352 (cross-list from cs.NI) [pdf, other]
Title: Analyzing Enterprise DNS Traffic to Classify Assets and Track Cyber-Health
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[275]  arXiv:2201.07519 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Aware Human Mobility Prediction via Adversarial Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[276]  arXiv:2201.07936 (cross-list from cs.CY) [pdf, other]
Title: How Do Socio-Demographic Patterns Define Digital Privacy Divide?
Comments: 11 pages
Journal-ref: IEEE Access, 2022
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[277]  arXiv:2201.08261 (cross-list from cs.IT) [pdf, ps, other]
Title: Optimization of a Reed-Solomon code-based protocol against blockchain data availability attacks
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[278]  arXiv:2201.08378 (cross-list from cs.OS) [pdf, other]
Title: Adelie: Continuous Address Space Layout Re-randomization for Linux Drivers
Comments: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '22), February 28 - March 4, 2022, Lausanne, Switzerland
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[279]  arXiv:2201.08470 (cross-list from cs.RO) [pdf, other]
Title: RoboMal: Malware Detection for Robot Network Systems
Comments: Published in the proceedings of 2021 5th IEEE International Conference on Robotic Computing (IRC)
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[280]  arXiv:2201.08522 (cross-list from cs.IT) [pdf, other]
Title: Orthonormal Sketches for Secure Coded Regression
Comments: 3 figures, 5 pages excluding appendices
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Numerical Analysis (math.NA)
[281]  arXiv:2201.08555 (cross-list from cs.CL) [pdf, other]
Title: Identifying Adversarial Attacks on Text Classifiers
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[282]  arXiv:2201.08565 (cross-list from cs.LG) [pdf]
Title: Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[283]  arXiv:2201.08619 (cross-list from cs.CV) [pdf, other]
Title: Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[284]  arXiv:2201.08688 (cross-list from cs.HC) [pdf]
Title: Physical Activity Recognition by Utilising Smartphone Sensor Signals
Comments: 10 pages, 10 figures, conference
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[285]  arXiv:2201.09046 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private SGDA for Minimax Problems
Comments: To appear in UAI 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[286]  arXiv:2201.09369 (cross-list from cs.LG) [pdf, other]
Title: Efficient and Robust Classification for Sparse Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[287]  arXiv:2201.09398 (cross-list from cs.LG) [pdf, other]
Title: Towards Private Learning on Decentralized Graphs with Local Differential Privacy
Comments: in submission
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[288]  arXiv:2201.09441 (cross-list from cs.LG) [pdf, other]
Title: Federated Unlearning with Knowledge Distillation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[289]  arXiv:2201.09652 (cross-list from cs.OS) [pdf, ps, other]
Title: DuVisor: a User-level Hypervisor Through Delegated Virtualization
Comments: 17 pages, 9 figures
Subjects: Operating Systems (cs.OS); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[290]  arXiv:2201.09668 (cross-list from cs.AR) [pdf, ps, other]
Title: Variability aware Golden Reference Free methodology for Hardware Trojan Detection Using Robust Delay Analysis
Comments: 17 pages, 10 figures, 3 algorithms
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[291]  arXiv:2201.09709 (cross-list from cs.SD) [pdf, other]
Title: Optimizing Tandem Speaker Verification and Anti-Spoofing Systems
Comments: Published in IEEE/ACM Transactions on Audio, Speech, and Language Processing. Published version available at: this https URL
Journal-ref: in IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 30, pp. 477-488, 2022
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[292]  arXiv:2201.09774 (cross-list from cs.LG) [pdf, other]
Title: Hiding Behind Backdoors: Self-Obfuscation Against Generative Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[293]  arXiv:2201.09986 (cross-list from cs.IT) [pdf, ps, other]
Title: Bayesian Inference with Nonlinear Generative Models: Comments on Secure Learning
Comments: 72 pages, 14 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[294]  arXiv:2201.10055 (cross-list from cs.LG) [pdf, other]
Title: Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[295]  arXiv:2201.10115 (cross-list from cs.GT) [pdf, other]
Title: The Privacy-Welfare Trade-off: Effects of Differential Privacy on Influence & Welfare in Social Choice
Comments: 19 pages, 1 figure
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); General Economics (econ.GN); Probability (math.PR); Statistics Theory (math.ST)
[296]  arXiv:2201.10283 (cross-list from cs.SD) [pdf, ps, other]
Title: SASV Challenge 2022: A Spoofing Aware Speaker Verification Challenge Evaluation Plan
Comments: Evaluation plan of the SASV Challenge 2022. See this webpage for more information: this https URL
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[297]  arXiv:2201.10290 (cross-list from cs.IT) [pdf, ps, other]
Title: Characterizations and constructions of n-to-1 mappings over finite fields
Comments: 23 pages, submitted to a journel
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[298]  arXiv:2201.10761 (cross-list from cs.LG) [pdf, other]
Title: An Efficient and Robust System for Vertically Federated Random Forest
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[299]  arXiv:2201.10787 (cross-list from cs.LG) [pdf, other]
Title: Variational Model Inversion Attacks
Comments: 35th Conference on Neural Information Processing Systems (NeurIPS 2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[300]  arXiv:2201.11006 (cross-list from cs.CV) [pdf, other]
Title: An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[301]  arXiv:2201.11297 (cross-list from cs.DS) [pdf, other]
Title: Generation Matrix: An Embeddable Matrix Representation for Hierarchical Trees
Comments: 25 pages, 10 figures
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[302]  arXiv:2201.11303 (cross-list from cs.SE) [pdf, ps, other]
Title: Mutation Analysis: Answering the Fuzzing Challenge
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[303]  arXiv:2201.11370 (cross-list from cs.NI) [pdf, other]
Title: An IoT Blockchain Architecture Using Oracles and Smart Contracts: the Use-Case of a Food Supply Chain
Comments: This paper has been accepted for publication by IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). The final version will be published by the IEEE
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[304]  arXiv:2201.11670 (cross-list from cs.IT) [pdf, ps, other]
Title: Strong Converse Theorem for Source Encryption under Side-Channel Attacks
Comments: 9 pages, 6 figures. The short version of this paper was submitted to ISIT2022, arXiv admin note: text overlap with arXiv:1801.02563, arXiv:2102.06363
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[305]  arXiv:2201.12018 (cross-list from cs.LG) [pdf, other]
Title: Transfer Learning In Differential Privacy's Hybrid-Model
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[306]  arXiv:2201.12211 (cross-list from cs.LG) [pdf, other]
Title: Backdoors Stuck At The Frontdoor: Multi-Agent Backdoor Attacks That Backfire
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[307]  arXiv:2201.12306 (cross-list from cs.DS) [pdf, other]
Title: Statistical anonymity: Quantifying reidentification risks without reidentifying users
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Databases (cs.DB); Computation (stat.CO)
[308]  arXiv:2201.12327 (cross-list from cs.IT) [pdf, ps, other]
Title: Communication Cost of Two-Database Symmetric Private Information Retrieval: A Conditional Disclosure of Multiple Secrets Perspective
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Databases (cs.DB); Signal Processing (eess.SP)
[309]  arXiv:2201.12347 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness in Deep Learning: Attacks on Fragile Neurons
Journal-ref: Artificial Neural Networks and Machine Learning ICANN 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[310]  arXiv:2201.12383 (cross-list from cs.LG) [pdf, other]
Title: Bounding Training Data Reconstruction in Private (Deep) Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[311]  arXiv:2201.12406 (cross-list from cs.LG) [pdf, other]
Title: Syfer: Neural Obfuscation for Private Data Release
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[312]  arXiv:2201.12648 (cross-list from cs.LG) [pdf, other]
Title: Private Boosted Decision Trees via Smooth Re-Weighting
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[313]  arXiv:2201.12666 (cross-list from cs.LG) [pdf, other]
Title: Challenges and approaches to privacy preserving post-click conversion prediction
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[314]  arXiv:2201.12675 (cross-list from cs.LG) [pdf, other]
Title: Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models
Comments: First two authors contributed equally. Order chosen by coin flip
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[315]  arXiv:2201.12686 (cross-list from cs.IR) [pdf, other]
Title: Rank List Sensitivity of Recommender Systems to Interaction Perturbations
Comments: Accepted for publication at: 31st ACM International Conference on Information and Knowledge Management (CIKM 2022). Code and data at: this https URL
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[316]  arXiv:2201.12700 (cross-list from cs.LG) [pdf, other]
Title: Coordinated Attacks against Contextual Bandits: Fundamental Limits and Defense Mechanisms
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (stat.ML)
[317]  arXiv:2201.12705 (cross-list from cs.CV) [pdf]
Title: A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[318]  arXiv:2201.13108 (cross-list from cs.IT) [pdf, ps, other]
Title: Multi-twisted Reed-Solomon codes with small dimensional hull
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Commutative Algebra (math.AC)
[319]  arXiv:2201.13178 (cross-list from cs.CV) [pdf, other]
Title: Few-Shot Backdoor Attacks on Visual Object Tracking
Comments: This work is accepted by the ICLR 2022. The first two authors contributed equally to this work. In this version, we fix some typos and errors contained in the last one. 21 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[320]  arXiv:2201.13329 (cross-list from cs.LG) [pdf, other]
Title: Can Adversarial Training Be Manipulated By Non-Robust Features?
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[321]  arXiv:2201.13376 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Top-k Selection via Canonical Lipschitz Mechanism
Comments: 22 pages, 10 figures, 1 table
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[322]  arXiv:2201.00402 (cross-list from math.OC) [pdf, other]
Title: A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs
Subjects: Optimization and Control (math.OC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[323]  arXiv:2201.01805 (cross-list from math.RT) [pdf, other]
Title: Monoidal categories, representation gap and cryptography
Comments: 45 pages, many figures, comments welcome
Subjects: Representation Theory (math.RT); Cryptography and Security (cs.CR); Group Theory (math.GR); Quantum Algebra (math.QA)
[324]  arXiv:2201.02707 (cross-list from stat.ME) [pdf, ps, other]
Title: ALPHA: Audit that Learns from Previously Hand-Audited Ballots
Authors: Philip B. Stark
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[325]  arXiv:2201.03321 (cross-list from eess.AS) [pdf, other]
Title: A Practical Guide to Logical Access Voice Presentation Attack Detection
Comments: This work will appear as one chapter for a new book called Frontiers in Fake Media Generation and Detection, edited by Mahdi Khosravy, Isao Echizen, Noboru Babaguchi. The code for this chapter is available in this https URL
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[326]  arXiv:2201.05574 (cross-list from econ.GN) [pdf, other]
Title: Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT)
[327]  arXiv:2201.07791 (cross-list from quant-ph) [pdf, other]
Title: On the success probability of quantum order finding
Authors: Martin Ekerå
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[328]  arXiv:2201.09419 (cross-list from quant-ph) [pdf, other]
Title: Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution
Comments: 9 pages, 5 figures
Journal-ref: Opt. Express 30, 15024 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[329]  arXiv:2201.09470 (cross-list from eess.AS) [pdf, other]
Title: Synthetic speech detection using meta-learning with prototypical loss
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[330]  arXiv:2201.10200 (cross-list from quant-ph) [pdf, ps, other]
Title: The multiplicative complexity of interval checking
Comments: 7 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[331]  arXiv:2201.11079 (cross-list from math.NT) [pdf, other]
Title: Orienteering with one endomorphism
Comments: 39 pages, 1 figure; 2nd revision implements small corrections and expositional improvements
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[332]  arXiv:2201.12893 (cross-list from econ.GN) [pdf, other]
Title: Cryptocurrency Valuation: An Explainable AI Approach
Subjects: General Economics (econ.GN); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); Machine Learning (stat.ML)
[333]  arXiv:2201.13445 (cross-list from quant-ph) [pdf, other]
Title: Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more
Comments: 81 pages, 7 protocols
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 333 entries: 1-333 ]
[ showing 333 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2208, contact, help  (Access key information)