Cryptography and Security
Authors and titles for cs.CR in Jan 2022
[ total of 333 entries: 1-250 | 251-333 ][ showing 250 entries per page: fewer | more | all ]
- [1] arXiv:2201.00031 [pdf, ps, other]
-
Title: Privacy-Protecting COVID-19 Exposure Notification Based on Cluster EventsAuthors: Paul SyversonComments: 11 pages. This paper was presented at the NIST Workshop on Challenges for Digital Proximity Detection in Pandemics: Privacy, Accuracy, and Impact, January 28 02021Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [2] arXiv:2201.00099 [pdf, other]
-
Title: Differential Privacy Made EasyAuthors: Muhammad AitsamSubjects: Cryptography and Security (cs.CR)
- [3] arXiv:2201.00231 [pdf, ps, other]
-
Title: An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contractsComments: extended version of a paper published in The 14th International Symposium on Foundations and Practice of Security, FPS 2021, 8-10 December 2021Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [4] arXiv:2201.00419 [pdf, other]
-
Title: VISAS -- Detecting GPS spoofing attacks against drones by analyzing camera's video streamComments: 8 pages, 16 figuresSubjects: Cryptography and Security (cs.CR)
- [5] arXiv:2201.00484 [pdf, ps, other]
-
Title: Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing PlatformSubjects: Cryptography and Security (cs.CR)
- [6] arXiv:2201.00568 [pdf, ps, other]
- [7] arXiv:2201.00584 [pdf, ps, other]
-
Title: Feature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based ClassificationSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Neural and Evolutionary Computing (cs.NE)
- [8] arXiv:2201.00757 [pdf, other]
-
Title: Rank-1 Similarity Matrix Decomposition For Modeling Changes in Antivirus Consensus Through TimeSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [9] arXiv:2201.00759 [pdf, other]
-
Title: MetaChain: A Novel Blockchain-based Framework for Metaverse ApplicationsSubjects: Cryptography and Security (cs.CR)
- [10] arXiv:2201.00763 [pdf, other]
-
Title: DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model InspectionComments: 18 pages, 8 figures; to appear in the Network and Distributed System Security Symposium (NDSS)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [11] arXiv:2201.00815 [pdf, other]
- [12] arXiv:2201.00858 [pdf, other]
-
Title: Blockchain Nash Dynamics and the Pursuit of ComplianceSubjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
- [13] arXiv:2201.00864 [pdf, other]
-
Title: Secret Sharing Sharing For Highly Scalable Secure AggregationComments: 12 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [14] arXiv:2201.00900 [pdf, other]
-
Title: A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesComments: to be Published in ACM Computing Surveys (2022)Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [15] arXiv:2201.01051 [pdf, ps, other]
-
Title: Open Access Dataset for Electromyography based Multi-code Biometric AuthenticationComments: manuscript for open access dataset (paper and appendix)Journal-ref: Sci Data 9, 733 (2022)Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
- [16] arXiv:2201.01130 [pdf, other]
-
Title: Reusing Verification Assertions as Security Checkers for Hardware Trojan DetectionComments: 6 pages, 6 figuresJournal-ref: 2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 2022, pp. 1-6Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [17] arXiv:2201.01147 [pdf, ps, other]
-
Title: Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA AttacksComments: Author's version accepted for DTIS-2018; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [18] arXiv:2201.01153 [pdf, ps, other]
-
Title: On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal AttackComments: Author's version accepted for ReConFig-2019; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [19] arXiv:2201.01158 [pdf, ps, other]
-
Title: Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic CurvesComments: Author's version accepted for DSD-2020; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [20] arXiv:2201.01262 [pdf, other]
-
Title: An algebraic attack to the Bluetooth stream cipher E0Comments: 24 pages, 1 figure. To appear in Finite Fields and Their ApplicationsSubjects: Cryptography and Security (cs.CR); Symbolic Computation (cs.SC); Commutative Algebra (math.AC); Rings and Algebras (math.RA)
- [21] arXiv:2201.01326 [pdf, ps, other]
-
Title: OConsent -- Open Consent Protocol for Privacy and Consent Management with BlockchainAuthors: Subhadip MitraSubjects: Cryptography and Security (cs.CR)
- [22] arXiv:2201.01350 [pdf, other]
-
Title: Prospects for Improving Password SelectionSubjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
- [23] arXiv:2201.01574 [pdf, other]
-
Title: Reinforcing Cybersecurity Hands-on Training With Adaptive LearningComments: IEEE FIE 2021 conference, 9 pages, 6 figures, 4 tablesSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [24] arXiv:2201.01621 [pdf, other]
-
Title: ROOM: Adversarial Machine Learning Attacks Under Real-Time ConstraintsComments: 12 pagesSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [25] arXiv:2201.01649 [pdf, other]
-
Title: WebSpec: Towards Machine-Checked Analysis of Browser Security MechanismsAuthors: Lorenzo Veronese, Benjamin Farinier, Pedro Bernardo, Mauro Tempesta, Marco Squarcina, Matteo MaffeiComments: Submitted to IEEE S&P '23 on 19 Aug 2022Subjects: Cryptography and Security (cs.CR)
- [26] arXiv:2201.01711 [pdf, ps, other]
-
Title: Horizontal SCA Attacks against kP Algorithm Using K-Means and PCASubjects: Cryptography and Security (cs.CR)
- [27] arXiv:2201.01717 [pdf, ps, other]
-
Title: Clustering versus Statistical Analysis for SCA: when Machine Learning is BetterSubjects: Cryptography and Security (cs.CR)
- [28] arXiv:2201.01834 [pdf, other]
-
Title: Secure Remote Attestation with Strong Key Insulation GuaranteesSubjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [29] arXiv:2201.01927 [pdf, ps, other]
-
Title: Network Generations and the Security Challenge in IoT ApplicationsAuthors: Mahmoud S. FayedSubjects: Cryptography and Security (cs.CR)
- [30] arXiv:2201.01989 [pdf, other]
-
Title: SPDL: Blockchain-secured and Privacy-preserving Decentralized LearningComments: 11 pages, 7 figuresSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [31] arXiv:2201.02007 [pdf, ps, other]
-
Title: Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCAComments: Author's version accepted for ReConFig-2018; the final publication is available at this https URLSubjects: Cryptography and Security (cs.CR)
- [32] arXiv:2201.02236 [pdf, other]
-
Title: Detecting Anomalies using Overlapping Electrical Measurements in Smart Power GridsSubjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
- [33] arXiv:2201.02351 [pdf, other]
-
Title: Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber DeceptionComments: 16 pages, accepted at IEEE Transactions on Automatic ControlSubjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Systems and Control (eess.SY)
- [34] arXiv:2201.02358 [pdf, other]
-
Title: Towards Trustworthy DeFi Oracles: Past,Present and FutureComments: Under reviewSubjects: Cryptography and Security (cs.CR)
- [35] arXiv:2201.02391 [pdf, ps, other]
-
Title: Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA AttacksComments: Author's version accepted for ICICS-2017; the final publication is available at Springer via this https URLSubjects: Cryptography and Security (cs.CR)
- [36] arXiv:2201.02506 [pdf, ps, other]
-
Title: Evaluation of Cyber Attacks Targeting Internet Facing IoT : An Experimental EvaluationSubjects: Cryptography and Security (cs.CR)
- [37] arXiv:2201.02563 [pdf, ps, other]
-
Title: Security Considerations for Virtual Reality SystemsSubjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [38] arXiv:2201.02601 [pdf, other]
-
Title: Apples and Cars: a Comparison of SecurityAuthors: Zhendong MaComments: Extended Abstract, 5th ACM COMPUTER SCIENCE IN CARS SYMPOSIUM (CSCS 2021)Subjects: Cryptography and Security (cs.CR)
- [39] arXiv:2201.02665 [pdf, other]
-
Title: Detecting CAN Masquerade Attacks with Signal Clustering SimilarityComments: 8 pages, 5 figures, 3 tablesJournal-ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP)
- [40] arXiv:2201.02677 [pdf, other]
-
Title: Predicting sensitive information leakage in IoT applications using flows-aware machine learning approachSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [41] arXiv:2201.02730 [pdf, ps, other]
-
Title: AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler?Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [42] arXiv:2201.02775 [pdf, other]
-
Title: ADI: Adversarial Dominating Inputs in Vertical Federated Learning SystemsSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
- [43] arXiv:2201.02866 [pdf, ps, other]
-
Title: Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication FormulaComments: Author's version accepted for DTIS-2019; the final publication is available at this https URL arXiv admin note: text overlap with arXiv:2201.02868Subjects: Cryptography and Security (cs.CR)
- [44] arXiv:2201.02868 [pdf, ps, other]
-
Title: Horizontal Attacks against ECC: from Simulations to ASICComments: Author's version accepted for IOSEC 2019; the final publication is available at Springer via this https URL arXiv admin note: text overlap with arXiv:2201.02866Subjects: Cryptography and Security (cs.CR)
- [45] arXiv:2201.02949 [pdf, other]
-
Title: Video Source Characterization Using Encoding and Encapsulation CharacteristicsSubjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [46] arXiv:2201.02986 [pdf, other]
-
Title: A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAMAuthors: Zhi Zhang, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang XiangSubjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [47] arXiv:2201.03010 [pdf, other]
-
Title: Differentially Private Release of Event Logs for Process MiningComments: arXiv admin note: text overlap with arXiv:2103.11739Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [48] arXiv:2201.03027 [pdf, ps, other]
-
Title: Meta-Generalization for Multiparty Privacy Learning to Identify Anomaly Multimedia Traffic in GraynetComments: Correct some typosSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
- [49] arXiv:2201.03134 [pdf, other]
-
Title: An Interpretable Federated Learning-based Network Intrusion Detection FrameworkComments: 12 pages, draftSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [50] arXiv:2201.03135 [pdf, other]
-
Title: The SEED Internet Emulator and Its Applications in Cybersecurity EducationSubjects: Cryptography and Security (cs.CR)
- [51] arXiv:2201.03281 [pdf, ps, other]
-
Title: IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device IdentificationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [52] arXiv:2201.03388 [pdf, ps, other]
-
Title: A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land bordersSubjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
- [53] arXiv:2201.03391 [pdf, ps, other]
-
Title: Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption StandardSubjects: Cryptography and Security (cs.CR)
- [54] arXiv:2201.03401 [pdf, other]
-
Title: An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILESubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [55] arXiv:2201.03499 [pdf, ps, other]
-
Title: Deletion-Compliance in the Absence of PrivacyComments: 25 pages, 4 figures. Appears in the proceedings of PST2021Subjects: Cryptography and Security (cs.CR)
- [56] arXiv:2201.03767 [pdf, ps, other]
-
Title: Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block CiphersJournal-ref: The Computer Journal 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [57] arXiv:2201.03772 [pdf, other]
-
Title: RFLBAT: A Robust Federated Learning Algorithm against Backdoor AttackSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [58] arXiv:2201.03913 [src]
-
Title: Exponential Randomized Response: Boosting Utility in Differentially Private SelectionComments: This algorithm only works under an assumption that is not realistic for the wider application of differential privacySubjects: Cryptography and Security (cs.CR)
- [59] arXiv:2201.04014 [pdf, other]
-
Title: Captcha Attack: Turning Captchas Against HumanityComments: Currently under submissionSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
- [60] arXiv:2201.04018 [pdf, other]
-
Title: Feature Space Hijacking Attacks against Differentially Private Split LearningComments: To appear at the Third AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-22). (4 pages, short paper.)Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [61] arXiv:2201.04048 [pdf, other]
-
Title: SnapFuzz: An Efficient Fuzzing Framework for Network ApplicationsJournal-ref: ISSTA 22, July 18 22, 2022, Virtual, South KoreaSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [62] arXiv:2201.04211 [pdf, ps, other]
-
Title: Reducing Noise Level in Differential Privacy through Matrix MaskingComments: 31 pagesSubjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
- [63] arXiv:2201.04255 [pdf, other]
-
Title: Rache: Radix-additive caching for homomorphic encryptionAuthors: Dongfang ZhaoSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [64] arXiv:2201.04351 [pdf, other]
-
Title: Diffix Elm: Simple DiffixAuthors: Paul Francis, Sebastian Probst-Eide, David Wagner, Felix Bauer, Cristian Berneanu, Edon GashiSubjects: Cryptography and Security (cs.CR)
- [65] arXiv:2201.04424 [pdf, other]
-
Title: Detecting Ransomware Execution in a Timely MannerComments: 12 Pages, 9 FiguresSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [66] arXiv:2201.04425 [pdf, ps, other]
-
Title: Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV SwarmsComments: 6 pages, 1 figureJournal-ref: 2021 10th MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, p. 81-86Subjects: Cryptography and Security (cs.CR)
- [67] arXiv:2201.04441 [pdf, other]
-
Title: Path Transitions Tell More:Optimizing Fuzzing Schedules via Runtime Program StatesSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [68] arXiv:2201.04569 [pdf, other]
-
Title: Get your Foes Fooled: Proximal Gradient Split Learning for Defense against Model Inversion Attacks on IoMT dataAuthors: Sunder Ali Khowaja, Ik Hyun Lee, Kapal Dev, Muhammad Aslam Jarwar, Nawab Muhammad Faseeh QureshiComments: 10 pages, 5 figures, 2 tablesJournal-ref: IEEE Transactions on Network Science and Engineering, 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
- [69] arXiv:2201.04610 [pdf, other]
-
Title: Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World AttacksSubjects: Cryptography and Security (cs.CR)
- [70] arXiv:2201.04677 [pdf, other]
-
Title: When Machine Learning Meets Spectrum Sharing Security: Methodologies and ChallengesSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
- [71] arXiv:2201.04736 [pdf, other]
-
Title: Security for Machine Learning-based Software Systems: a survey of threats, practices and challengesComments: Accepted at ACM Computing SurveysSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [72] arXiv:2201.04762 [pdf, ps, other]
-
Title: Privacy Amplification by Subsampling in Time DomainSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [73] arXiv:2201.04782 [pdf, other]
-
Title: Privacy-Utility Trades in Crowdsourced Signal Map ObfuscationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [74] arXiv:2201.04803 [pdf, other]
-
Title: A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular NetworksComments: 29 Pages, 5 Figures, Submitted in IEEE Communications Surveys and TutorialsSubjects: Cryptography and Security (cs.CR)
- [75] arXiv:2201.04816 [pdf, other]
-
Title: Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform (EMCP)Authors: Hendrik F. R. Schmidt (1), Jörg Schlötterer (1, 2, 3), Marcel Bargull (1), Enrico Nasca (1, 3), Ryan Aydelott (1), Christin Seifert (1, 2, 3), Folker Meyer (1, 2) ((1) Institute for Artificial Intelligence in Medicine, University Hospital Essen, Essen, Germany (2) University of Duisburg-Essen, Essen, Germany (3) Cancer Research Center Cologne Essen (CCCE), Essen, Germany)Comments: 9 pages, 5 figures, to be published in the proceedings of the 2021 IEEE CogMI conference. Christin Seifert and Folker Meyer are co-senior authorsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [76] arXiv:2201.04845 [pdf, other]
-
Title: Reconstructing Training Data with Informed AdversariesComments: Published at "2022 IEEE Symposium on Security and Privacy (SP)"Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [77] arXiv:2201.04853 [pdf, ps, other]
-
Title: FuzzingDriver: the Missing Dictionary to Increase Code Coverage in FuzzersComments: 29th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022Subjects: Cryptography and Security (cs.CR)
- [78] arXiv:2201.05001 [pdf, ps, other]
-
Title: Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement AnalysisAuthors: Rui WangSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [79] arXiv:2201.05006 [pdf, ps, other]
-
Title: Dynamic Local Searchable Symmetric EncryptionSubjects: Cryptography and Security (cs.CR)
- [80] arXiv:2201.05071 [pdf, other]
-
Title: Evaluation of Neural Networks Defenses and Attacks using NDCG and Reciprocal Rank MetricsComments: 12 pages, 5 figuresJournal-ref: International Journal of Information Security 2022Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
- [81] arXiv:2201.05073 [pdf, ps, other]
-
Title: Low-latency, Scalable, DeFi with ZefSubjects: Cryptography and Security (cs.CR)
- [82] arXiv:2201.05199 [pdf, other]
-
Title: D-Box: DMA-enabled Compartmentalization for Embedded ApplicationsComments: Network and Distributed Systems Security (NDSS) Symposium 2022Subjects: Cryptography and Security (cs.CR)
- [83] arXiv:2201.05326 [pdf, other]
-
Title: Security Orchestration, Automation, and Response Engine for Deployment of Behavioural HoneypotsComments: SOAR Engine for Honeypots Deployment, 8 pages, 7 figuresJournal-ref: 2022 IEEE Conference on Dependable and Secure Computing (DSC)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [84] arXiv:2201.05399 [pdf, other]
-
Title: Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with AndroidSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [85] arXiv:2201.05403 [pdf, ps, other]
-
Title: Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding ProblemSubjects: Cryptography and Security (cs.CR)
- [86] arXiv:2201.05410 [pdf, other]
-
Title: CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum SensorsAuthors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard StillerSubjects: Cryptography and Security (cs.CR)
- [87] arXiv:2201.05415 [pdf, other]
-
Title: Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0Comments: 30 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [88] arXiv:2201.05657 [pdf, other]
-
Title: Authentication and Handover Challenges and Methods for Drone SwarmsComments: Accepted for publication in IEEE Journal of Radio Frequency IdentificationJournal-ref: IEEE Journal of Radio Frequency Identification 2022Subjects: Cryptography and Security (cs.CR)
- [89] arXiv:2201.05671 [pdf, other]
-
Title: Zef: Low-latency, Scalable, Private PaymentsSubjects: Cryptography and Security (cs.CR)
- [90] arXiv:2201.05677 [pdf, other]
-
Title: Bullshark: DAG BFT Protocols Made PracticalSubjects: Cryptography and Security (cs.CR)
- [91] arXiv:2201.05757 [pdf, other]
-
Title: TRacer: Scalable Graph-based Transaction Tracing for Account-based Blockchain Trading SystemsSubjects: Cryptography and Security (cs.CR)
- [92] arXiv:2201.05889 [pdf, other]
-
Title: StolenEncoder: Stealing Pre-trained Encoders in Self-supervised LearningComments: To appear in ACM Conference on Computer and Communications Security (CCS), 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [93] arXiv:2201.05931 [pdf, other]
-
Title: On eliminating blocking interference of RFID unauthorized reader detection systemComments: 4 pages,7 figuresSubjects: Cryptography and Security (cs.CR)
- [94] arXiv:2201.05943 [pdf, other]
-
Title: TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal AttacksComments: Accepted at Design, Automation and Test in Europe Conference (DATE), 2022Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
- [95] arXiv:2201.05964 [pdf, other]
-
Title: Visualizing Privacy-Utility Trade-Offs in Differentially Private Data ReleasesComments: Forthcoming in Proceedings on Privacy Enhancing Technologies 2022Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
- [96] arXiv:2201.05996 [pdf, ps, other]
-
Title: Hardware Implementation of Multimodal Biometric using Fingerprint and IrisAuthors: Tariq M KhanSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [97] arXiv:2201.06038 [pdf, other]
-
Title: Image data hiding with multi-scale autoencoder networkComments: accepted by Media Watermarking, Security, and Forensics 2022Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [98] arXiv:2201.06068 [pdf, ps, other]
-
Title: Zero Botnets: An Observe-Pursue-Counter ApproachAuthors: Jeremy Kepner, Jonathan Bernays, Stephen Buckley, Kenjiro Cho, Cary Conrad, Leslie Daigle, Keeley Erhardt, Vijay Gadepally, Barry Greene, Michael Jones, Robert Knake, Bruce Maggs, Peter Michaleas, Chad Meiners, Andrew Morris, Alex Pentland, Sandeep Pisharody, Sarah Powazek, Andrew Prout, Philip Reiner, Koichi Suzuki, Kenji Takahashi, Tony Tauber, Leah Walker, Douglas StetsonComments: 26 pages, 13 figures, 2 tables, 72 references, submitted to PlosOneSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
- [99] arXiv:2201.06080 [pdf, other]
-
Title: Evaluating the Security of Open Radio Access NetworksAuthors: Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf ShabtaiSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [100] arXiv:2201.06093 [pdf, other]
-
Title: Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)Authors: Edan Habler, Ron Bitton, Dan Avraham, Dudu Mimran, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf ShabtaiSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [101] arXiv:2201.06100 [pdf, ps, other]
-
Title: Improving Privacy and Security in Unmanned Aerial Vehicles Network using BlockchainComments: 18 Pages; 14 Figures; 2 TablesJournal-ref: Int. J. of Communication Networks and Distributed Systems (IJCNDS) 2023Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [102] arXiv:2201.06235 [pdf, other]
-
Title: Characterizing Sensor Leaks in Android AppsSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [103] arXiv:2201.06335 [pdf, other]
-
Title: End to End Secure Data Exchange in Value Chains with Dynamic Policy UpdatesComments: 22 pages, 9 figures Main changes from the previous version: - The introduction and Sections 5 and 6 are better written now. - State of the Art references update when necessary. - Design Requirements names have been changed to better ones. - Section 4 has been reordered. - Section 4.1 is better explained now. - Algorithms in Section 5 are better explained now, step-by-stepSubjects: Cryptography and Security (cs.CR)
- [104] arXiv:2201.06354 [pdf, other]
-
Title: Improving the Security of the IEEE 802.15.6 Standard for Medical BANsComments: Published in IEEE AccessJournal-ref: IEEE Access, 2022Subjects: Cryptography and Security (cs.CR)
- [105] arXiv:2201.06362 [pdf, other]
-
Title: Silently Disabling ECUs and Enabling Blind Attacks on the CAN BusComments: 12 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [106] arXiv:2201.06394 [pdf, other]
-
Title: Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery TechniquesSubjects: Cryptography and Security (cs.CR)
- [107] arXiv:2201.06446 [pdf, other]
-
Title: Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney ExchangeComments: This is the extended version of the paper that appeared in the 12th ACM Conference on Data and Application Security and Privacy (CODASPY'22), April 24-26, 2022, Baltimore-Washington DC Area, United States, this https URLJournal-ref: 12th ACM Conference on Data and Application Security and Privacy 2022 (CODASPY'22)Subjects: Cryptography and Security (cs.CR)
- [108] arXiv:2201.06680 [pdf, other]
-
Title: Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected VehiclesSubjects: Cryptography and Security (cs.CR)
- [109] arXiv:2201.06699 [pdf, other]
-
Title: AESPA: Accuracy Preserving Low-degree Polynomial Activation for Fast Private InferenceComments: 11 pages, 5 figuresSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [110] arXiv:2201.06785 [pdf, ps, other]
-
Title: Challenges of Return-Oriented-Programming on the Xtensa Hardware ArchitectureSubjects: Cryptography and Security (cs.CR)
- [111] arXiv:2201.06811 [pdf, other]
-
Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado CashAuthors: Mike Wu, Will McTighe, Kaili Wang, Istvan A. Seres, Nick Bax, Manuel Puebla, Mariano Mendez, Federico Carrone, Tomás De Mattey, Herman O. Demaestri, Mariano Nicolini, Pedro FontanaComments: 10 pages content, 2 pages appendixSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [112] arXiv:2201.06971 [pdf, ps, other]
-
Title: Identification for Accountability vs PrivacyComments: 4 pages plus appendix, 9 pages totalSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [113] arXiv:2201.07119 [pdf, ps, other]
-
Title: A Survey on Code-Based CryptographyComments: This book chapter is a part of the Springer Lecture Notes in Mathematics: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and CryptographySubjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
- [114] arXiv:2201.07188 [pdf, other]
-
Title: SoK: Blockchain GovernanceSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
- [115] arXiv:2201.07220 [pdf, other]
-
Title: Do not rug on me: Zero-dimensional Scam DetectionSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
- [116] arXiv:2201.07224 [pdf, other]
-
Title: NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree SearchComments: Published as a conference paper in AAAI 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
- [117] arXiv:2201.07323 [pdf, ps, other]
-
Title: A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) ApplicationsJournal-ref: IEEE Access, vol. 10, 2022Subjects: Cryptography and Security (cs.CR)
- [118] arXiv:2201.07359 [pdf, other]
-
Title: Sandbox Sample Classification Using Behavioral Indicators of CompromiseAuthors: M. AndrecutComments: 10 pages, 2 figuresSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [119] arXiv:2201.07375 [pdf, other]
-
Title: A 333.9uW 0.158mm$^2$ Saber Learning with Rounding based Post-Quantum Crypto AcceleratorAuthors: Archisman Ghosh, J.M.B. Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas SenSubjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [120] arXiv:2201.07388 [pdf, other]
-
Title: Kantorovich Mechanism for Pufferfish PrivacyAuthors: Ni DingComments: 20 pages, incl. supplementary materials, 4 figures, to appear in proceeding of AISTATS 2022Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
- [121] arXiv:2201.07391 [pdf, other]
-
Title: MetaV: A Meta-Verifier Approach to Task-Agnostic Model FingerprintingComments: To Appear in KDD'2022Subjects: Cryptography and Security (cs.CR)
- [122] arXiv:2201.07417 [pdf, other]
-
Title: Defining Security Requirements with the Common Criteria: Applications, Adoptions, and ChallengesAuthors: Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren ArmstrongSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [123] arXiv:2201.07444 [pdf, other]
-
Title: Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural NetworksComments: under reviewSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [124] arXiv:2201.07462 [pdf, other]
-
Title: Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface ExploitsComments: Published in IEEE PerCom Workshops 2022,978-1-6654-1647-4/22/$31.00 pp.643-648 Copyright 2022 IEEESubjects: Cryptography and Security (cs.CR)
- [125] arXiv:2201.07469 [pdf, other]
-
Title: Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional SpaceComments: This paper is accepted and will appear in ICDE 2022 as a regular research paperSubjects: Cryptography and Security (cs.CR); Databases (cs.DB)
- [126] arXiv:2201.07496 [pdf, other]
-
Title: A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security ApplicationsComments: Published in IEEE Solid-State Circuits Letters (SSCL)Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [127] arXiv:2201.07513 [pdf, other]
-
Title: Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image EncodersComments: Accepted by CVPR 2023Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [128] arXiv:2201.07537 [pdf, other]
-
Title: Graph Neural Network-based Android Malware Classification with Jumping KnowledgeComments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [129] arXiv:2201.07597 [pdf, other]
-
Title: FPHammer: A Device Identification Framework based on DRAM FingerprintingComments: This version has been accepted by TrustCom-2023Subjects: Cryptography and Security (cs.CR)
- [130] arXiv:2201.07649 [pdf, other]
-
Title: Malware Classification Using Static Disassembly and Machine LearningComments: To be published in 29th AIAI Irish Conference on Artificial Intelligence and Cognitive ScienceSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [131] arXiv:2201.07651 [pdf, other]
-
Title: Enhancing CryptoGuards Deployability for Continuous Software Security ScanningAuthors: Miles FrantzComments: Masters thesisSubjects: Cryptography and Security (cs.CR)
- [132] arXiv:2201.07654 [pdf, other]
-
Title: Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity CountermeasuresAuthors: Darren CobianComments: 54 pages, 17 figures/tables, 43 citationsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [133] arXiv:2201.07711 [pdf, other]
-
Title: Enhancing the Security & Privacy of Wearable Brain-Computer InterfacesAuthors: Zahra Tarkhani, Lorena Qendro, Malachy O'Connor Brown, Oscar Hill, Cecilia Mascolo, Anil MadhavapeddySubjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Operating Systems (cs.OS)
- [134] arXiv:2201.07730 [pdf, other]
-
Title: SCOTCH: An Efficient Secure Computation Framework for Secure AggregationAuthors: Yash More, Prashanthi Ramachandran, Priyam Panda, Arup Mondal, Harpreet Virk, Debayan GuptaComments: Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), Third AAAI Privacy-Preserving Artificial Intelligence (PPAI-22) WorkshopSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [135] arXiv:2201.07740 [pdf, other]
-
Title: More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIRComments: 19 pages, 6 figuresSubjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
- [136] arXiv:2201.07746 [pdf, other]
-
Title: A Centrality Analysis of the Lightning NetworkSubjects: Cryptography and Security (cs.CR)
- [137] arXiv:2201.07765 [pdf, other]
-
Title: Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital TwinsAuthors: Sabah Suhail, Saif Ur Rehman Malik, Raja Jurdak, Rasheed Hussain, Raimundas Matulevičius, Davor SvetinovicComments: 39 pages, 10 figuresJournal-ref: Computers in Industry, Volume 141, October 2022, 103699Subjects: Cryptography and Security (cs.CR)
- [138] arXiv:2201.07793 [pdf, ps, other]
-
Title: On Using Blockchains for Beyond Visual Line of Sight (BVLOS) Drones Operation: An Architectural StudyComments: 10 pages, 4 figures, HiPEAC'22Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
- [139] arXiv:2201.07920 [pdf, other]
-
Title: Shades of Finality and Layer 2 ScalingAuthors: Bennet Yee (1), Dawn Song (1), Patrick McCorry (2), Chris Buckland (2) ((1) Oasis Labs, (2) Infura)Comments: 14 pagesSubjects: Cryptography and Security (cs.CR)
- [140] arXiv:2201.07946 [pdf, other]
-
Title: Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake SecurityComments: 26 pages, 10 figuresSubjects: Cryptography and Security (cs.CR)
- [141] arXiv:2201.07954 [pdf, other]
-
Title: Effective Anomaly Detection in Smart Home by Integrating Event Time IntervalsSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [142] arXiv:2201.07959 [pdf, other]
-
Title: APIRO: A Framework for Automated Security Tools API RecommendationSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [143] arXiv:2201.07964 [pdf, ps, other]
-
Title: A Systematic Literature Review of Blockchain Technology Adoption in BangladeshAuthors: Abdullah Al Hussain, Md. Akhtaruzzaman Emon, Toufiq Ahmed Tanna, Rasel Iqbal Emon, Md. Mehedi Hassan OnikJournal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-30, Vol. 6, No. 1, 1st January 2022, Published by International Association of Educators and Researchers (IAER)Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [144] arXiv:2201.08052 [pdf, other]
-
Title: Adversarial Jamming for a More Effective Constellation AttackComments: 3 pages, 2 figures, published in The 13th International Symposium on Antennas, Propagation and EM Theory (ISAPE 2021)Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
- [145] arXiv:2201.08120 [pdf, other]
-
Title: Survey on Privacy-Preserving Techniques for Data PublishingComments: 35 pages, 3 figures, 5 tablesSubjects: Cryptography and Security (cs.CR)
- [146] arXiv:2201.08126 [pdf, ps, other]
-
Title: Reversible Data Hiding in Encrypted Images by Lossless Pixel ConversionComments: Submitted to IEEE TDSCSubjects: Cryptography and Security (cs.CR)
- [147] arXiv:2201.08133 [pdf, other]
-
Title: CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious DiseasesJournal-ref: IEEE Journal on Selected Areas in Communications (JSAC), 2022Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [148] arXiv:2201.08135 [pdf, other]
-
Title: Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challengesAuthors: Nuria Rodríguez-Barroso, Daniel Jiménez López, M. Victoria Luzón, Francisco Herrera, Eugenio Martínez-CámaraJournal-ref: Information Fusion (2022)Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [149] arXiv:2201.08154 [pdf, other]
-
Title: NapierOne: A modern mixed file data set alternative to Govdocs1Journal-ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817Subjects: Cryptography and Security (cs.CR)
- [150] arXiv:2201.08441 [pdf, other]
-
Title: VUDENC: Vulnerability Detection with Deep Learning on a Natural Codebase for PythonComments: Accepted ManuscriptJournal-ref: Information and Software Technology, Volume 144, April 2022, 106809Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
- [151] arXiv:2201.08461 [pdf, ps, other]
-
Title: Polytope: Practical Memory Access Control for C++ ApplicationsSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [152] arXiv:2201.08468 [pdf, other]
-
Title: Android Malware Detection using Feature Ranking of PermissionsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [153] arXiv:2201.08473 [pdf, ps, other]
-
Title: Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security ToolsComments: ICCWS 2021 16th International Conference on Cyber Warfare and Security. Academic Conferences Limited, 2021Subjects: Cryptography and Security (cs.CR)
- [154] arXiv:2201.08474 [pdf, other]
-
Title: Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack ScenariosComments: Accepted to ICLR2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [155] arXiv:2201.08551 [pdf, other]
-
Title: Blockchain-based Collaborated Federated Learning for Improved Security, Privacy and ReliabilityComments: Preliminary workSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [156] arXiv:2201.08564 [pdf, ps, other]
-
Title: Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine LearningSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [157] arXiv:2201.08661 [pdf, other]
-
Title: The Security of Deep Learning Defences for Medical ImagingSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
- [158] arXiv:2201.08678 [pdf, other]
-
Title: Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the WildAuthors: Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross AndersonSubjects: Cryptography and Security (cs.CR)
- [159] arXiv:2201.08686 [pdf, other]
-
Title: Modelling Agent-Skipping Attacks in Message Forwarding ProtocolsSubjects: Cryptography and Security (cs.CR)
- [160] arXiv:2201.08697 [pdf, other]
-
Title: Verilay: A Verifiable Proof of Stake Chain RelayComments: 10 pages, 3 figuresJournal-ref: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)Subjects: Cryptography and Security (cs.CR)
- [161] arXiv:2201.08701 [pdf, other]
-
Title: SmartSync: Cross-Blockchain Smart Contract Interaction and SynchronizationComments: 9 pages, 4 figuresJournal-ref: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)Subjects: Cryptography and Security (cs.CR)
- [162] arXiv:2201.08739 [pdf, other]
-
Title: Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996--2021Authors: Isabel WagnerComments: submittedSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
- [163] arXiv:2201.08786 [pdf, other]
-
Title: FedComm: Federated Learning as a Medium for Covert CommunicationComments: 13 pagesSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [164] arXiv:2201.09006 [pdf, other]
-
Title: On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps DevelopmentComments: 40 pages, 13 figuresSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [165] arXiv:2201.09009 [pdf, other]
-
Title: Sliding Window Challenge Process for Congestion DetectionSubjects: Cryptography and Security (cs.CR)
- [166] arXiv:2201.09035 [pdf, other]
-
Title: On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User PrivacyAuthors: Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Ben Livshits, Arthur GervaisSubjects: Cryptography and Security (cs.CR)
- [167] arXiv:2201.09137 [pdf, other]
-
Title: Long-term Data Sharing under Exclusivity AttacksSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT)
- [168] arXiv:2201.09186 [pdf, other]
-
Title: pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network TestingSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [169] arXiv:2201.09243 [pdf, other]
-
Title: Increasing the Cost of Model Extraction with Calibrated Proof of WorkComments: Published as a conference paper at ICLR 2022 (Spotlight - 5% of submitted papers)Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
- [170] arXiv:2201.09338 [pdf, other]
-
Title: Building a Privacy-Preserving Smart Camera SystemAuthors: Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDanielComments: Accepted to PETS (Privacy Enhancing Technologies Symposium) 2022Journal-ref: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2022Subjects: Cryptography and Security (cs.CR)
- [171] arXiv:2201.09370 [pdf, other]
-
Title: Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification ModelsComments: Conditionally accepted to USENIX Security 2022. This is not the camera-ready version. arXiv admin note: substantial text overlap with arXiv:2012.03404Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [172] arXiv:2201.09425 [pdf, other]
-
Title: Post-processing of Differentially Private Data: A Fairness PerspectiveSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [173] arXiv:2201.09487 [pdf, ps, other]
-
Title: Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State InformationComments: To appear in IEEE Transactions on Wireless Communications. arXiv admin note: text overlap with arXiv:2101.00848Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [174] arXiv:2201.09493 [pdf, other]
-
Title: STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture SystemsSubjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
- [175] arXiv:2201.09514 [pdf, other]
-
Title: DDoSDet: An approach to Detect DDoS attacks using Neural NetworksComments: 6 figures, 2 tables, 10 pagesSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [176] arXiv:2201.09538 [pdf, other]
-
Title: Backdoor Defense with Machine UnlearningSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [177] arXiv:2201.09631 [pdf, ps, other]
-
Title: On the Complexity of Attacking Elliptic Curve Based Authentication ChipsComments: This is an author's version of the paper (On the Complexity of Attacking Commercial Authentication Products) accepted for publication in Microprocessors and Microsystems journal. The final publication is available at this https URLJournal-ref: Microprocessors and Microsystems, Volume 80, February 2021, 103480Subjects: Cryptography and Security (cs.CR)
- [178] arXiv:2201.09650 [pdf, other]
-
Title: What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic ContradictionComments: Accepted to NDSS 2022. Camera-ready version with supplementary materials. Code is available at this https URLSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [179] arXiv:2201.09941 [pdf, other]
-
Title: TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable VulnerabilitiesAuthors: Aakash Tyagi (1), Addison Crump (1), Ahmad-Reza Sadeghi (2), Garrett Persyn (1), Jeyavijayan Rajendran (1), Patrick Jauernig (2), Rahul Kande (1) ((1) Texas A&M University, College Station, USA, (2) Technische Universität Darmstadt, Germany)Comments: To be published in the proceedings of the 31st USENIX Security Symposium, 2022Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Software Engineering (cs.SE)
- [180] arXiv:2201.09956 [pdf, other]
-
Title: DRAWNAPART: A Device Identification Technique based on Remote GPU FingerprintingAuthors: Tomer Laor (1), Naif Mehanna (2 and 3 and 4), Antonin Durey (2 and 3 and 4), Vitaly Dyadyuk (1), Pierre Laperdrix (2 and 3 and 4), Clémentine Maurice (2 and 3 and 4), Yossi Oren (1), Romain Rouvoy (2 and 3 and 4), Walter Rudametkin (2 and 3 and 4), Yuval Yarom (5) ((1) Ben-Gurion University of the Negev, (2) University of Lille, (3) CNRS, (4) Inria, (5) University of Adelaide)Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United StatesSubjects: Cryptography and Security (cs.CR)
- [181] arXiv:2201.10087 [pdf, ps, other]
-
Title: Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum with Multiple Mining PoolsComments: 50 pages, 18 figuresSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Performance (cs.PF); Probability (math.PR)
- [182] arXiv:2201.10272 [pdf, ps, other]
-
Title: Image Fragile Watermarking Algorithm Based on Deneighborhood MappingSubjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [183] arXiv:2201.10348 [pdf, other]
-
Title: Correcting for Reporting Delays in Cyber IncidentsJournal-ref: In JSM Proceedings, 2021, pp. 721-735Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
- [184] arXiv:2201.10349 [pdf, ps, other]
-
Title: Roadmap for Cybersecurity in Autonomous VehiclesSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [185] arXiv:2201.10351 [pdf, other]
-
Title: AI-based Re-identification of Behavioral Clickstream DataComments: Submitted to the EMAC Conference 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); General Economics (econ.GN)
- [186] arXiv:2201.10371 [pdf, other]
-
Title: ML-based tunnel detection and tunneled application classificationSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [187] arXiv:2201.10473 [pdf, other]
-
Title: Faster multiplication over $\mathbb{F}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instructionJournal-ref: Journal of Cryptographic Engineering (ISSN : 2190-8508, ISSN \'electronique : 2190-8516), november 2021Subjects: Cryptography and Security (cs.CR)
- [188] arXiv:2201.10500 [pdf, other]
-
Title: A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular NetworksSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [189] arXiv:2201.10505 [pdf, other]
-
Title: Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia ConditionsJournal-ref: IEEE Open Access Journal of Power and Energy 2022Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
- [190] arXiv:2201.10531 [pdf, other]
-
Title: HOLL: Program Synthesis for Higher OrderLogic LockingComments: Accepted in TACAS-22 conference. 24 pages llncs format (without references), 11 figures, 5 tablesSubjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
- [191] arXiv:2201.10606 [pdf, other]
-
Title: FETA: Fair Evaluation of Touch-based AuthenticationSubjects: Cryptography and Security (cs.CR)
- [192] arXiv:2201.10752 [pdf, ps, other]
-
Title: Phishing Attacks Detection -- A Machine Learning-Based ApproachComments: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [193] arXiv:2201.10831 [pdf, ps, other]
-
Title: Tracking on the Web, Mobile and the Internet-of-ThingsAuthors: Reuben BinnsSubjects: Cryptography and Security (cs.CR)
- [194] arXiv:2201.10833 [pdf, ps, other]
-
Title: Automatic detection of access control vulnerabilities via API specification processingJournal-ref: Voprosy kiberbezopasnosti.2022.1(47).p.49-65Subjects: Cryptography and Security (cs.CR)
- [195] arXiv:2201.10838 [pdf, other]
-
Title: Privacy-Preserving Logistic Regression Training with A Faster Gradient VariantAuthors: John ChiangComments: The basic work of this paper, $\texttt{quadratic gradient}$ and the enhanced full batch NAG, was nearly finished in September 2019. The initial version of this paper was written in April 2020, rejected by ICANN 2020. The enhanced mini-batch NAG was introduced into this paper in September 2020 and later rejected by a special issue on the journal FGCS 2020Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [196] arXiv:2201.10839 [pdf, other]
-
Title: Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual DeduplicationSubjects: Cryptography and Security (cs.CR)
- [197] arXiv:2201.10905 [src]
-
Title: Boomerang Spectra of Two Classes of Power Functions via Their Differential SpectraComments: Part of the results of our article are covered by sihem BFA's articleSubjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
- [198] arXiv:2201.11111 [pdf, ps, other]
-
Title: Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber ResilienceSubjects: Cryptography and Security (cs.CR)
- [199] arXiv:2201.11148 [pdf, ps, other]
-
Title: Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?Subjects: Cryptography and Security (cs.CR)
- [200] arXiv:2201.11152 [pdf, ps, other]
-
Title: Cyber Resilience: by Design or by Intervention?Subjects: Cryptography and Security (cs.CR)
- [201] arXiv:2201.11291 [pdf, other]
-
Title: A Survey of PPG's Application in AuthenticationComments: Accepted by Computer & Security (COSE)Subjects: Cryptography and Security (cs.CR)
- [202] arXiv:2201.11300 [pdf, other]
-
Title: Geo-MOEA: A Multi-Objective Evolutionary Algorithm with Geo-obfuscation for Mobile Crowdsourcing WorkersComments: 14 pages, 13 figuresSubjects: Cryptography and Security (cs.CR)
- [203] arXiv:2201.11308 [pdf, other]
-
Title: Calibration with Privacy in Peer ReviewComments: 31 pages, 6 figuresSubjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
- [204] arXiv:2201.11311 [pdf, other]
-
Title: Towards a Secure and Reliable Federated Learning using BlockchainComments: This paper has been accepted for publication by IEEE Global Communications Conference (GLOBECOM). The final version will be published by the IEEESubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [205] arXiv:2201.11337 [pdf, other]
-
Title: Towards a Scalable and Trustworthy Blockchain: IoT Use CaseComments: This paper has been accepted for publication by ICC 2021-IEEE International Conference on Communications. The final version will be published by the IEEESubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [206] arXiv:2201.11362 [pdf, other]
-
Title: HYPERLOCK: In-Memory Hyperdimensional Encryption in Memristor Crossbar ArrayComments: Accepted to IEEE ISCAS 2022Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET); Machine Learning (cs.LG)
- [207] arXiv:2201.11368 [pdf, other]
-
Title: Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoTComments: This paper has been accepted for publication by the IEEE Network. The final version will be published by the IEEEJournal-ref: in IEEE Network, vol. 35, no. 2, pp. 194-201, March/April 2021Subjects: Cryptography and Security (cs.CR)
- [208] arXiv:2201.11377 [pdf, other]
-
Title: CacheFX: A Framework for Evaluating Cache SecurityAuthors: Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval YaromSubjects: Cryptography and Security (cs.CR)
- [209] arXiv:2201.11406 [pdf, other]
-
Title: Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical ContextComments: 23 pages, 3 figures, 3 tablesSubjects: Cryptography and Security (cs.CR)
- [210] arXiv:2201.11603 [pdf, other]
-
Title: Plume: Differential Privacy at ScaleSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [211] arXiv:2201.11628 [pdf, other]
-
Title: Early Detection of Network Attacks Using Deep LearningComments: Submitted to ITEQS 2022 WorkshopSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [212] arXiv:2201.11692 [pdf, other]
-
Title: SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained EncodersComments: Accepted by CCS 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [213] arXiv:2201.11764 [pdf, other]
-
Title: A TOCTOU Attack on DICE AttestationComments: 10 pages, 3 figures, to appear at CODASPY'22Subjects: Cryptography and Security (cs.CR)
- [214] arXiv:2201.11780 [pdf, other]
-
Title: Minotaur: Multi-Resource Blockchain ConsensusAuthors: Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui WangComments: To appear in ACM CCS 2022Subjects: Cryptography and Security (cs.CR)
- [215] arXiv:2201.11796 [pdf, ps, other]
-
Title: A Privacy-Protecting Framework of Autonomous Contact Tracing for SARS-CoV-2 and BeyondComments: 6 pages, 5 figuresSubjects: Cryptography and Security (cs.CR)
- [216] arXiv:2201.11807 [pdf, other]
-
Title: Taxonomy of Security Weaknesses in Java and Kotlin Android AppsAuthors: Alejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, David Vega-Guzmán, Catia Trubiani, Mario Linares-Vásquez, Gabriele BavotaComments: Accepted to JSS journalSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [217] arXiv:2201.11812 [pdf, other]
-
Title: A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of VehiclesComments: Accepted and to appear in IEEE International Conference on Communications (ICC); Code is available at Github link: this https URLSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [218] arXiv:2201.11844 [pdf, ps, other]
-
Title: Speckle-based optical cryptosystem and its application for human face recognition via deep learningAuthors: Qi Zhao, Huanhao Li, Zhipeng Yu, Chi Man Woo, Tianting Zhong, Shengfu Cheng, Yuanjin Zheng, Honglin Liu, Jie Tian, Puxiang LaiSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Optics (physics.optics)
- [219] arXiv:2201.11855 [pdf, other]
-
Title: Accountability and Insurance in IoT Supply ChainSubjects: Cryptography and Security (cs.CR)
- [220] arXiv:2201.11860 [pdf, other]
-
Title: On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by CryptocurrenciesSubjects: Cryptography and Security (cs.CR)
- [221] arXiv:2201.11934 [pdf, other]
-
Title: A Secure and Efficient Federated Learning Framework for NLPAuthors: Jieren Deng, Chenghong Wang, Xianrui Meng, Yijue Wang, Ji Li, Sheng Lin, Shuo Han, Fei Miao, Sanguthevar Rajasekaran, Caiwen DingComments: Accepted by EMNLP 2021Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
- [222] arXiv:2201.12194 [pdf, ps, other]
-
Title: Perfectly-Secure Synchronous MPC with Asynchronous Fallback GuaranteesComments: 62 pages, 18 figures, Full version of the article published in ACM PODC 2022Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
- [223] arXiv:2201.12333 [pdf, other]
-
Title: A Joint Exponential Mechanism For Differentially Private Top-$k$Subjects: Cryptography and Security (cs.CR)
- [224] arXiv:2201.12416 [pdf, other]
-
Title: Discovering Exfiltration Paths Using Reinforcement Learning with Attack GraphsAuthors: Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward BowenComments: The 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [225] arXiv:2201.12439 [pdf, ps, other]
-
Title: Discriminating Defense Against DDoS Attacks; a Novel ApproachAuthors: Naftaly H. MinskyComments: 21 pages 0 figuresSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [226] arXiv:2201.12563 [pdf, other]
-
Title: Dissimilar Redundancy in DeFiSubjects: Cryptography and Security (cs.CR)
- [227] arXiv:2201.12577 [pdf, other]
-
Title: Volley Revolver: A Novel Matrix-Encoding Method for Privacy-Preserving Neural Networks (Inference)Authors: John ChiangComments: The encoding method we proposed in this work, $\texttt{Volley Revolver}$, is particularly tailored for privacy-preserving neural networks. There is a good chance that it can be used to assist the private neural networks training, in which case for the backpropagation algorithm of the fully-connected layer the first matrix $A$ is revolved while the second matrix $B$ is settled to be stillSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [228] arXiv:2201.12727 [pdf, other]
-
Title: Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent ThreatComments: 10 Pages, 9 Figures, 3 Tables Published in the IEEE Internet of Things JournalJournal-ref: IEEE Internet of Things Journal Jan 2022Subjects: Cryptography and Security (cs.CR)
- [229] arXiv:2201.12876 [pdf, other]
-
Title: DeepCatra: Learning Flow- and Graph-based Behaviors for Android Malware DetectionComments: IET Information Security (to appear)Subjects: Cryptography and Security (cs.CR)
- [230] arXiv:2201.12879 [pdf, other]
-
Title: Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps PipelineSubjects: Cryptography and Security (cs.CR)
- [231] arXiv:2201.13010 [pdf, ps, other]
-
Title: Architectures for Protecting Cloud Data PlanesSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
- [232] arXiv:2201.13077 [pdf, ps, other]
-
Title: An Overview of Various Biometric Approaches: ECG One of its TraitComments: Accepted and Published in the International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). Volume 4, Issue 1, January-February 2015Subjects: Cryptography and Security (cs.CR)
- [233] arXiv:2201.13086 [pdf, other]
-
Title: Securing Federated Sensitive Topic Classification against Poisoning AttacksAuthors: Tianyue Chu, Alvaro Garcia-Recuero, Costas Iordanou, Georgios Smaragdakis, Nikolaos LaoutarisJournal-ref: Network and Distributed System Security (NDSS) Symposium 2023Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [234] arXiv:2201.13102 [pdf, other]
-
Title: GADoT: GAN-based Adversarial Training for Robust DDoS Attack DetectionSubjects: Cryptography and Security (cs.CR)
- [235] arXiv:2201.13153 [pdf, other]
-
Title: A new idea for RSA backdoorsAuthors: Marco CesatiComments: 19 pages, 5 figuresSubjects: Cryptography and Security (cs.CR)
- [236] arXiv:2201.13160 [pdf, other]
-
Title: AnyCall: Fast and Flexible System-Call AggregationJournal-ref: PLOS'21: Proceedings of the 11th Workshop on Programming Languages and Operating Systems. 2021. Association for Computing Machinery (ACM), New York, NY, USA, Pages 1-8Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS); Programming Languages (cs.PL)
- [237] arXiv:2201.13266 [pdf, other]
-
Title: Aggregation and Transformation of Vector-Valued Messages in the Shuffle Model of Differential PrivacyComments: 16 pages, 5 figures, in: IEEE Transactions on Information Forensics and Security (TIFS), 2022. arXiv admin note: substantial text overlap with arXiv:2112.05464Subjects: Cryptography and Security (cs.CR)
- [238] arXiv:2201.13354 [pdf, other]
- [239] arXiv:2201.13444 [pdf, other]
-
Title: Boundary Defense Against Black-box Adversarial AttacksSubjects: Cryptography and Security (cs.CR)
- [240] arXiv:2201.00148 (cross-list from cs.LG) [pdf, other]
-
Title: Rethinking Feature Uncertainty in Stochastic Neural Networks for Adversarial RobustnessSubjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [241] arXiv:2201.00313 (cross-list from cs.IT) [pdf, other]
-
Title: Secure Determinant Codes for Distributed Storage SystemsComments: 22 pages, 8 figures. The first two authors contributed equally to this work. Accepted for publication at IEEE Transactions on Information TheorySubjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
- [242] arXiv:2201.00696 (cross-list from cs.IR) [pdf, ps, other]
-
Title: Full-privacy secured search engine empowered by efficient genome-mapping algorithmsAuthors: Yuan-Yu Chang, Sheng-Tang Wong, Emmanuel O Salawu, Yu-Xuan Wang, Jui-Hung Hung, Lee-Wei YangComments: 21 pages, 5 figures, 3 tablesSubjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
- [243] arXiv:2201.00762 (cross-list from cs.LG) [pdf, other]
-
Title: Execute Order 66: Targeted Data Poisoning for Reinforcement LearningComments: Workshop on Safe and Robust Control of Uncertain Systems at the 35th Conference on Neural Information Processing SystemsSubjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
- [244] arXiv:2201.00768 (cross-list from cs.CL) [pdf, other]
-
Title: Robust Natural Language Processing: Recent Advances, Challenges, and Future DirectionsComments: Survey; 2 figures, 4 tablesSubjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
- [245] arXiv:2201.00976 (cross-list from cs.LG) [pdf, ps, other]
-
Title: Survey on the Convergence of Machine Learning and BlockchainSubjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
- [246] arXiv:2201.01139 (cross-list from cs.LG) [pdf, other]
-
Title: Generating synthetic mobility data for a realistic population with RNNs to improve utility and privacyComments: 10 pages. Extended version. Shorter version in The 37th ACM/SIGAPP Symposium on Applied Computing (SAC '22)Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [247] arXiv:2201.01154 (cross-list from cs.CY) [pdf, other]
-
Title: Preventing Cheating in Hands-on Lab AssignmentsComments: ACM SIGCSE 2022 conference, 7 pages, 3 figures, 1 tableSubjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
- [248] arXiv:2201.01810 (cross-list from cs.GT) [pdf, other]
-
Title: Privacy-Friendly Peer-to-Peer Energy Trading: A Game Theoretical ApproachComments: To be published in IEEE Power & Energy Society General Meeting (GM), 2022Subjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
- [249] arXiv:2201.02504 (cross-list from cs.CL) [pdf, other]
-
Title: Repairing Adversarial Texts through PerturbationAuthors: Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song DongSubjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
- [250] arXiv:2201.02873 (cross-list from cs.LG) [pdf, other]
[ showing 250 entries per page: fewer | more | all ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, 2404, contact, help (Access key information)