We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2022, skipping first 100

[ total of 333 entries: 1-100 | 101-200 | 201-300 | 301-333 ]
[ showing 100 entries per page: fewer | more | all ]
[101]  arXiv:2201.06100 [pdf, ps, other]
Title: Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain
Comments: 18 Pages; 14 Figures; 2 Tables
Journal-ref: Int. J. of Communication Networks and Distributed Systems (IJCNDS) 2023
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[102]  arXiv:2201.06235 [pdf, other]
Title: Characterizing Sensor Leaks in Android Apps
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[103]  arXiv:2201.06335 [pdf, other]
Title: End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates
Comments: 22 pages, 9 figures Main changes from the previous version: - The introduction and Sections 5 and 6 are better written now. - State of the Art references update when necessary. - Design Requirements names have been changed to better ones. - Section 4 has been reordered. - Section 4.1 is better explained now. - Algorithms in Section 5 are better explained now, step-by-step
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2201.06354 [pdf, other]
Title: Improving the Security of the IEEE 802.15.6 Standard for Medical BANs
Comments: Published in IEEE Access
Journal-ref: IEEE Access, 2022
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2201.06362 [pdf, other]
Title: Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2201.06394 [pdf, other]
Title: Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2201.06446 [pdf, other]
Title: Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange
Comments: This is the extended version of the paper that appeared in the 12th ACM Conference on Data and Application Security and Privacy (CODASPY'22), April 24-26, 2022, Baltimore-Washington DC Area, United States, this https URL
Journal-ref: 12th ACM Conference on Data and Application Security and Privacy 2022 (CODASPY'22)
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2201.06680 [pdf, other]
Title: Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2201.06699 [pdf, other]
Title: AESPA: Accuracy Preserving Low-degree Polynomial Activation for Fast Private Inference
Comments: 11 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2201.06785 [pdf, ps, other]
Title: Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2201.06811 [pdf, other]
Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash
Comments: 10 pages content, 2 pages appendix
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2201.06971 [pdf, ps, other]
Title: Identification for Accountability vs Privacy
Comments: 4 pages plus appendix, 9 pages total
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[113]  arXiv:2201.07119 [pdf, ps, other]
Title: A Survey on Code-Based Cryptography
Comments: This book chapter is a part of the Springer Lecture Notes in Mathematics: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and Cryptography
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[114]  arXiv:2201.07188 [pdf, other]
Title: SoK: Blockchain Governance
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
[115]  arXiv:2201.07220 [pdf, other]
Title: Do not rug on me: Zero-dimensional Scam Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
[116]  arXiv:2201.07224 [pdf, other]
Title: NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Comments: Published as a conference paper in AAAI 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[117]  arXiv:2201.07323 [pdf, ps, other]
Title: A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications
Journal-ref: IEEE Access, vol. 10, 2022
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2201.07359 [pdf, other]
Title: Sandbox Sample Classification Using Behavioral Indicators of Compromise
Authors: M. Andrecut
Comments: 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119]  arXiv:2201.07375 [pdf, other]
Title: A 333.9uW 0.158mm$^2$ Saber Learning with Rounding based Post-Quantum Crypto Accelerator
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[120]  arXiv:2201.07388 [pdf, other]
Title: Kantorovich Mechanism for Pufferfish Privacy
Authors: Ni Ding
Comments: 20 pages, incl. supplementary materials, 4 figures, to appear in proceeding of AISTATS 2022
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[121]  arXiv:2201.07391 [pdf, other]
Title: MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting
Comments: To Appear in KDD'2022
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2201.07417 [pdf, other]
Title: Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[123]  arXiv:2201.07444 [pdf, other]
Title: Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks
Comments: under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2201.07462 [pdf, other]
Title: Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits
Comments: Published in IEEE PerCom Workshops 2022,978-1-6654-1647-4/22/$31.00 pp.643-648 Copyright 2022 IEEE
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2201.07469 [pdf, other]
Title: Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional Space
Comments: This paper is accepted and will appear in ICDE 2022 as a regular research paper
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[126]  arXiv:2201.07496 [pdf, other]
Title: A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security Applications
Comments: Published in IEEE Solid-State Circuits Letters (SSCL)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[127]  arXiv:2201.07513 [pdf, other]
Title: Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Comments: Accepted by CVPR 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[128]  arXiv:2201.07537 [pdf, other]
Title: Graph Neural Network-based Android Malware Classification with Jumping Knowledge
Comments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[129]  arXiv:2201.07597 [pdf, other]
Title: FPHammer: A Device Identification Framework based on DRAM Fingerprinting
Comments: This version has been accepted by TrustCom-2023
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2201.07649 [pdf, other]
Title: Malware Classification Using Static Disassembly and Machine Learning
Comments: To be published in 29th AIAI Irish Conference on Artificial Intelligence and Cognitive Science
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:2201.07651 [pdf, other]
Title: Enhancing CryptoGuards Deployability for Continuous Software Security Scanning
Authors: Miles Frantz
Comments: Masters thesis
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2201.07654 [pdf, other]
Title: Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures
Authors: Darren Cobian
Comments: 54 pages, 17 figures/tables, 43 citations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[133]  arXiv:2201.07711 [pdf, other]
Title: Enhancing the Security & Privacy of Wearable Brain-Computer Interfaces
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Operating Systems (cs.OS)
[134]  arXiv:2201.07730 [pdf, other]
Title: SCOTCH: An Efficient Secure Computation Framework for Secure Aggregation
Comments: Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), Third AAAI Privacy-Preserving Artificial Intelligence (PPAI-22) Workshop
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2201.07740 [pdf, other]
Title: More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR
Comments: 19 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[136]  arXiv:2201.07746 [pdf, other]
Title: A Centrality Analysis of the Lightning Network
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2201.07765 [pdf, other]
Title: Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins
Comments: 39 pages, 10 figures
Journal-ref: Computers in Industry, Volume 141, October 2022, 103699
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2201.07793 [pdf, ps, other]
Title: On Using Blockchains for Beyond Visual Line of Sight (BVLOS) Drones Operation: An Architectural Study
Comments: 10 pages, 4 figures, HiPEAC'22
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
[139]  arXiv:2201.07920 [pdf, other]
Title: Shades of Finality and Layer 2 Scaling
Authors: Bennet Yee (1), Dawn Song (1), Patrick McCorry (2), Chris Buckland (2) ((1) Oasis Labs, (2) Infura)
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2201.07946 [pdf, other]
Title: Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
Comments: 26 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2201.07954 [pdf, other]
Title: Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[142]  arXiv:2201.07959 [pdf, other]
Title: APIRO: A Framework for Automated Security Tools API Recommendation
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[143]  arXiv:2201.07964 [pdf, ps, other]
Title: A Systematic Literature Review of Blockchain Technology Adoption in Bangladesh
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-30, Vol. 6, No. 1, 1st January 2022, Published by International Association of Educators and Researchers (IAER)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[144]  arXiv:2201.08052 [pdf, other]
Title: Adversarial Jamming for a More Effective Constellation Attack
Comments: 3 pages, 2 figures, published in The 13th International Symposium on Antennas, Propagation and EM Theory (ISAPE 2021)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[145]  arXiv:2201.08120 [pdf, other]
Title: Survey on Privacy-Preserving Techniques for Data Publishing
Comments: 35 pages, 3 figures, 5 tables
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2201.08126 [pdf, ps, other]
Title: Reversible Data Hiding in Encrypted Images by Lossless Pixel Conversion
Comments: Submitted to IEEE TDSC
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2201.08133 [pdf, other]
Title: CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases
Journal-ref: IEEE Journal on Selected Areas in Communications (JSAC), 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[148]  arXiv:2201.08135 [pdf, other]
Title: Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges
Journal-ref: Information Fusion (2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[149]  arXiv:2201.08154 [pdf, other]
Title: NapierOne: A modern mixed file data set alternative to Govdocs1
Journal-ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2201.08441 [pdf, other]
Title: VUDENC: Vulnerability Detection with Deep Learning on a Natural Codebase for Python
Comments: Accepted Manuscript
Journal-ref: Information and Software Technology, Volume 144, April 2022, 106809
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[151]  arXiv:2201.08461 [pdf, ps, other]
Title: Polytope: Practical Memory Access Control for C++ Applications
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[152]  arXiv:2201.08468 [pdf, other]
Title: Android Malware Detection using Feature Ranking of Permissions
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[153]  arXiv:2201.08473 [pdf, ps, other]
Title: Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools
Comments: ICCWS 2021 16th International Conference on Cyber Warfare and Security. Academic Conferences Limited, 2021
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2201.08474 [pdf, other]
Title: Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Comments: Accepted to ICLR2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[155]  arXiv:2201.08551 [pdf, other]
Title: Blockchain-based Collaborated Federated Learning for Improved Security, Privacy and Reliability
Comments: Preliminary work
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[156]  arXiv:2201.08564 [pdf, ps, other]
Title: Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[157]  arXiv:2201.08661 [pdf, other]
Title: The Security of Deep Learning Defences for Medical Imaging
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[158]  arXiv:2201.08678 [pdf, other]
Title: Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2201.08686 [pdf, other]
Title: Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2201.08697 [pdf, other]
Title: Verilay: A Verifiable Proof of Stake Chain Relay
Comments: 10 pages, 3 figures
Journal-ref: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2201.08701 [pdf, other]
Title: SmartSync: Cross-Blockchain Smart Contract Interaction and Synchronization
Comments: 9 pages, 4 figures
Journal-ref: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2201.08739 [pdf, other]
Title: Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996--2021
Authors: Isabel Wagner
Comments: submitted
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[163]  arXiv:2201.08786 [pdf, other]
Title: FedComm: Federated Learning as a Medium for Covert Communication
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[164]  arXiv:2201.09006 [pdf, other]
Title: On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development
Comments: 40 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[165]  arXiv:2201.09009 [pdf, other]
Title: Sliding Window Challenge Process for Congestion Detection
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2201.09035 [pdf, other]
Title: On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2201.09137 [pdf, other]
Title: Long-term Data Sharing under Exclusivity Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT)
[168]  arXiv:2201.09186 [pdf, other]
Title: pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2201.09243 [pdf, other]
Title: Increasing the Cost of Model Extraction with Calibrated Proof of Work
Comments: Published as a conference paper at ICLR 2022 (Spotlight - 5% of submitted papers)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[170]  arXiv:2201.09338 [pdf, other]
Title: Building a Privacy-Preserving Smart Camera System
Comments: Accepted to PETS (Privacy Enhancing Technologies Symposium) 2022
Journal-ref: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2022
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2201.09370 [pdf, other]
Title: Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
Comments: Conditionally accepted to USENIX Security 2022. This is not the camera-ready version. arXiv admin note: substantial text overlap with arXiv:2012.03404
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[172]  arXiv:2201.09425 [pdf, other]
Title: Post-processing of Differentially Private Data: A Fairness Perspective
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[173]  arXiv:2201.09487 [pdf, ps, other]
Title: Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information
Comments: To appear in IEEE Transactions on Wireless Communications. arXiv admin note: text overlap with arXiv:2101.00848
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[174]  arXiv:2201.09493 [pdf, other]
Title: STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[175]  arXiv:2201.09514 [pdf, other]
Title: DDoSDet: An approach to Detect DDoS attacks using Neural Networks
Comments: 6 figures, 2 tables, 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[176]  arXiv:2201.09538 [pdf, other]
Title: Backdoor Defense with Machine Unlearning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[177]  arXiv:2201.09631 [pdf, ps, other]
Title: On the Complexity of Attacking Elliptic Curve Based Authentication Chips
Comments: This is an author's version of the paper (On the Complexity of Attacking Commercial Authentication Products) accepted for publication in Microprocessors and Microsystems journal. The final publication is available at this https URL
Journal-ref: Microprocessors and Microsystems, Volume 80, February 2021, 103480
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2201.09650 [pdf, other]
Title: What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction
Comments: Accepted to NDSS 2022. Camera-ready version with supplementary materials. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[179]  arXiv:2201.09941 [pdf, other]
Title: TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Authors: Aakash Tyagi (1), Addison Crump (1), Ahmad-Reza Sadeghi (2), Garrett Persyn (1), Jeyavijayan Rajendran (1), Patrick Jauernig (2), Rahul Kande (1) ((1) Texas A&M University, College Station, USA, (2) Technische Universität Darmstadt, Germany)
Comments: To be published in the proceedings of the 31st USENIX Security Symposium, 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Software Engineering (cs.SE)
[180]  arXiv:2201.09956 [pdf, other]
Title: DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
Authors: Tomer Laor (1), Naif Mehanna (2 and 3 and 4), Antonin Durey (2 and 3 and 4), Vitaly Dyadyuk (1), Pierre Laperdrix (2 and 3 and 4), Clémentine Maurice (2 and 3 and 4), Yossi Oren (1), Romain Rouvoy (2 and 3 and 4), Walter Rudametkin (2 and 3 and 4), Yuval Yarom (5) ((1) Ben-Gurion University of the Negev, (2) University of Lille, (3) CNRS, (4) Inria, (5) University of Adelaide)
Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2201.10087 [pdf, ps, other]
Title: Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum with Multiple Mining Pools
Comments: 50 pages, 18 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Performance (cs.PF); Probability (math.PR)
[182]  arXiv:2201.10272 [pdf, ps, other]
Title: Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[183]  arXiv:2201.10348 [pdf, other]
Title: Correcting for Reporting Delays in Cyber Incidents
Journal-ref: In JSM Proceedings, 2021, pp. 721-735
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[184]  arXiv:2201.10349 [pdf, ps, other]
Title: Roadmap for Cybersecurity in Autonomous Vehicles
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[185]  arXiv:2201.10351 [pdf, other]
Title: AI-based Re-identification of Behavioral Clickstream Data
Comments: Submitted to the EMAC Conference 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); General Economics (econ.GN)
[186]  arXiv:2201.10371 [pdf, other]
Title: ML-based tunnel detection and tunneled application classification
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[187]  arXiv:2201.10473 [pdf, other]
Title: Faster multiplication over $\mathbb{F}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instruction
Journal-ref: Journal of Cryptographic Engineering (ISSN : 2190-8508, ISSN \'electronique : 2190-8516), november 2021
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2201.10500 [pdf, other]
Title: A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[189]  arXiv:2201.10505 [pdf, other]
Title: Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia Conditions
Journal-ref: IEEE Open Access Journal of Power and Energy 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[190]  arXiv:2201.10531 [pdf, other]
Title: HOLL: Program Synthesis for Higher OrderLogic Locking
Comments: Accepted in TACAS-22 conference. 24 pages llncs format (without references), 11 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[191]  arXiv:2201.10606 [pdf, other]
Title: FETA: Fair Evaluation of Touch-based Authentication
Subjects: Cryptography and Security (cs.CR)
[192]  arXiv:2201.10752 [pdf, ps, other]
Title: Phishing Attacks Detection -- A Machine Learning-Based Approach
Comments: 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2201.10831 [pdf, ps, other]
Title: Tracking on the Web, Mobile and the Internet-of-Things
Authors: Reuben Binns
Subjects: Cryptography and Security (cs.CR)
[194]  arXiv:2201.10833 [pdf, ps, other]
Title: Automatic detection of access control vulnerabilities via API specification processing
Journal-ref: Voprosy kiberbezopasnosti.2022.1(47).p.49-65
Subjects: Cryptography and Security (cs.CR)
[195]  arXiv:2201.10838 [pdf, other]
Title: Privacy-Preserving Logistic Regression Training with A Faster Gradient Variant
Authors: John Chiang
Comments: The basic work of this paper, $\texttt{quadratic gradient}$ and the enhanced full batch NAG, was nearly finished in September 2019. The initial version of this paper was written in April 2020, rejected by ICANN 2020. The enhanced mini-batch NAG was introduced into this paper in September 2020 and later rejected by a special issue on the journal FGCS 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[196]  arXiv:2201.10839 [pdf, other]
Title: Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication
Subjects: Cryptography and Security (cs.CR)
[197]  arXiv:2201.10905 [src]
Title: Boomerang Spectra of Two Classes of Power Functions via Their Differential Spectra
Comments: Part of the results of our article are covered by sihem BFA's article
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[198]  arXiv:2201.11111 [pdf, ps, other]
Title: Doers, not Watchers: Intelligent Autonomous Agents are a Path to Cyber Resilience
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2201.11148 [pdf, ps, other]
Title: Autonomous Cyber Defense Introduces Risk: Can We Manage the Risk?
Subjects: Cryptography and Security (cs.CR)
[200]  arXiv:2201.11152 [pdf, ps, other]
Title: Cyber Resilience: by Design or by Intervention?
Subjects: Cryptography and Security (cs.CR)
[ total of 333 entries: 1-100 | 101-200 | 201-300 | 301-333 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)