Cryptography and Security
Authors and titles for cs.CR in Jan 2022, skipping first 50
[ total of 333 entries: 1-100 | 51-150 | 151-250 | 251-333 ][ showing 100 entries per page: fewer | more | all ]
- [51] arXiv:2201.03281 [pdf, ps, other]
-
Title: IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device IdentificationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
- [52] arXiv:2201.03388 [pdf, ps, other]
-
Title: A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land bordersSubjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
- [53] arXiv:2201.03391 [pdf, ps, other]
-
Title: Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption StandardSubjects: Cryptography and Security (cs.CR)
- [54] arXiv:2201.03401 [pdf, other]
-
Title: An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILESubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [55] arXiv:2201.03499 [pdf, ps, other]
-
Title: Deletion-Compliance in the Absence of PrivacyComments: 25 pages, 4 figures. Appears in the proceedings of PST2021Subjects: Cryptography and Security (cs.CR)
- [56] arXiv:2201.03767 [pdf, ps, other]
-
Title: Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block CiphersJournal-ref: The Computer Journal 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [57] arXiv:2201.03772 [pdf, other]
-
Title: RFLBAT: A Robust Federated Learning Algorithm against Backdoor AttackSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [58] arXiv:2201.03913 [src]
-
Title: Exponential Randomized Response: Boosting Utility in Differentially Private SelectionComments: This algorithm only works under an assumption that is not realistic for the wider application of differential privacySubjects: Cryptography and Security (cs.CR)
- [59] arXiv:2201.04014 [pdf, other]
-
Title: Captcha Attack: Turning Captchas Against HumanityComments: Currently under submissionSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
- [60] arXiv:2201.04018 [pdf, other]
-
Title: Feature Space Hijacking Attacks against Differentially Private Split LearningComments: To appear at the Third AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-22). (4 pages, short paper.)Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [61] arXiv:2201.04048 [pdf, other]
-
Title: SnapFuzz: An Efficient Fuzzing Framework for Network ApplicationsJournal-ref: ISSTA 22, July 18 22, 2022, Virtual, South KoreaSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [62] arXiv:2201.04211 [pdf, ps, other]
-
Title: Reducing Noise Level in Differential Privacy through Matrix MaskingComments: 31 pagesSubjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
- [63] arXiv:2201.04255 [pdf, other]
-
Title: Rache: Radix-additive caching for homomorphic encryptionAuthors: Dongfang ZhaoSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [64] arXiv:2201.04351 [pdf, other]
-
Title: Diffix Elm: Simple DiffixAuthors: Paul Francis, Sebastian Probst-Eide, David Wagner, Felix Bauer, Cristian Berneanu, Edon GashiSubjects: Cryptography and Security (cs.CR)
- [65] arXiv:2201.04424 [pdf, other]
-
Title: Detecting Ransomware Execution in a Timely MannerComments: 12 Pages, 9 FiguresSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [66] arXiv:2201.04425 [pdf, ps, other]
-
Title: Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV SwarmsComments: 6 pages, 1 figureJournal-ref: 2021 10th MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, p. 81-86Subjects: Cryptography and Security (cs.CR)
- [67] arXiv:2201.04441 [pdf, other]
-
Title: Path Transitions Tell More:Optimizing Fuzzing Schedules via Runtime Program StatesSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [68] arXiv:2201.04569 [pdf, other]
-
Title: Get your Foes Fooled: Proximal Gradient Split Learning for Defense against Model Inversion Attacks on IoMT dataAuthors: Sunder Ali Khowaja, Ik Hyun Lee, Kapal Dev, Muhammad Aslam Jarwar, Nawab Muhammad Faseeh QureshiComments: 10 pages, 5 figures, 2 tablesJournal-ref: IEEE Transactions on Network Science and Engineering, 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
- [69] arXiv:2201.04610 [pdf, other]
-
Title: Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World AttacksSubjects: Cryptography and Security (cs.CR)
- [70] arXiv:2201.04677 [pdf, other]
-
Title: When Machine Learning Meets Spectrum Sharing Security: Methodologies and ChallengesSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
- [71] arXiv:2201.04736 [pdf, other]
-
Title: Security for Machine Learning-based Software Systems: a survey of threats, practices and challengesComments: Accepted at ACM Computing SurveysSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [72] arXiv:2201.04762 [pdf, ps, other]
-
Title: Privacy Amplification by Subsampling in Time DomainSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [73] arXiv:2201.04782 [pdf, other]
-
Title: Privacy-Utility Trades in Crowdsourced Signal Map ObfuscationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [74] arXiv:2201.04803 [pdf, other]
-
Title: A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular NetworksComments: 29 Pages, 5 Figures, Submitted in IEEE Communications Surveys and TutorialsSubjects: Cryptography and Security (cs.CR)
- [75] arXiv:2201.04816 [pdf, other]
-
Title: Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform (EMCP)Authors: Hendrik F. R. Schmidt (1), Jörg Schlötterer (1, 2, 3), Marcel Bargull (1), Enrico Nasca (1, 3), Ryan Aydelott (1), Christin Seifert (1, 2, 3), Folker Meyer (1, 2) ((1) Institute for Artificial Intelligence in Medicine, University Hospital Essen, Essen, Germany (2) University of Duisburg-Essen, Essen, Germany (3) Cancer Research Center Cologne Essen (CCCE), Essen, Germany)Comments: 9 pages, 5 figures, to be published in the proceedings of the 2021 IEEE CogMI conference. Christin Seifert and Folker Meyer are co-senior authorsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [76] arXiv:2201.04845 [pdf, other]
-
Title: Reconstructing Training Data with Informed AdversariesComments: Published at "2022 IEEE Symposium on Security and Privacy (SP)"Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [77] arXiv:2201.04853 [pdf, ps, other]
-
Title: FuzzingDriver: the Missing Dictionary to Increase Code Coverage in FuzzersComments: 29th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022Subjects: Cryptography and Security (cs.CR)
- [78] arXiv:2201.05001 [pdf, ps, other]
-
Title: Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement AnalysisAuthors: Rui WangSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [79] arXiv:2201.05006 [pdf, ps, other]
-
Title: Dynamic Local Searchable Symmetric EncryptionSubjects: Cryptography and Security (cs.CR)
- [80] arXiv:2201.05071 [pdf, other]
-
Title: Evaluation of Neural Networks Defenses and Attacks using NDCG and Reciprocal Rank MetricsComments: 12 pages, 5 figuresJournal-ref: International Journal of Information Security 2022Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
- [81] arXiv:2201.05073 [pdf, ps, other]
-
Title: Low-latency, Scalable, DeFi with ZefSubjects: Cryptography and Security (cs.CR)
- [82] arXiv:2201.05199 [pdf, other]
-
Title: D-Box: DMA-enabled Compartmentalization for Embedded ApplicationsComments: Network and Distributed Systems Security (NDSS) Symposium 2022Subjects: Cryptography and Security (cs.CR)
- [83] arXiv:2201.05326 [pdf, other]
-
Title: Security Orchestration, Automation, and Response Engine for Deployment of Behavioural HoneypotsComments: SOAR Engine for Honeypots Deployment, 8 pages, 7 figuresJournal-ref: 2022 IEEE Conference on Dependable and Secure Computing (DSC)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [84] arXiv:2201.05399 [pdf, other]
-
Title: Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with AndroidSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [85] arXiv:2201.05403 [pdf, ps, other]
-
Title: Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding ProblemSubjects: Cryptography and Security (cs.CR)
- [86] arXiv:2201.05410 [pdf, other]
-
Title: CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum SensorsAuthors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard StillerSubjects: Cryptography and Security (cs.CR)
- [87] arXiv:2201.05415 [pdf, other]
-
Title: Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0Comments: 30 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [88] arXiv:2201.05657 [pdf, other]
-
Title: Authentication and Handover Challenges and Methods for Drone SwarmsComments: Accepted for publication in IEEE Journal of Radio Frequency IdentificationJournal-ref: IEEE Journal of Radio Frequency Identification 2022Subjects: Cryptography and Security (cs.CR)
- [89] arXiv:2201.05671 [pdf, other]
-
Title: Zef: Low-latency, Scalable, Private PaymentsSubjects: Cryptography and Security (cs.CR)
- [90] arXiv:2201.05677 [pdf, other]
-
Title: Bullshark: DAG BFT Protocols Made PracticalSubjects: Cryptography and Security (cs.CR)
- [91] arXiv:2201.05757 [pdf, other]
-
Title: TRacer: Scalable Graph-based Transaction Tracing for Account-based Blockchain Trading SystemsSubjects: Cryptography and Security (cs.CR)
- [92] arXiv:2201.05889 [pdf, other]
-
Title: StolenEncoder: Stealing Pre-trained Encoders in Self-supervised LearningComments: To appear in ACM Conference on Computer and Communications Security (CCS), 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [93] arXiv:2201.05931 [pdf, other]
-
Title: On eliminating blocking interference of RFID unauthorized reader detection systemComments: 4 pages,7 figuresSubjects: Cryptography and Security (cs.CR)
- [94] arXiv:2201.05943 [pdf, other]
-
Title: TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal AttacksComments: Accepted at Design, Automation and Test in Europe Conference (DATE), 2022Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
- [95] arXiv:2201.05964 [pdf, other]
-
Title: Visualizing Privacy-Utility Trade-Offs in Differentially Private Data ReleasesComments: Forthcoming in Proceedings on Privacy Enhancing Technologies 2022Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
- [96] arXiv:2201.05996 [pdf, ps, other]
-
Title: Hardware Implementation of Multimodal Biometric using Fingerprint and IrisAuthors: Tariq M KhanSubjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [97] arXiv:2201.06038 [pdf, other]
-
Title: Image data hiding with multi-scale autoencoder networkComments: accepted by Media Watermarking, Security, and Forensics 2022Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
- [98] arXiv:2201.06068 [pdf, ps, other]
-
Title: Zero Botnets: An Observe-Pursue-Counter ApproachAuthors: Jeremy Kepner, Jonathan Bernays, Stephen Buckley, Kenjiro Cho, Cary Conrad, Leslie Daigle, Keeley Erhardt, Vijay Gadepally, Barry Greene, Michael Jones, Robert Knake, Bruce Maggs, Peter Michaleas, Chad Meiners, Andrew Morris, Alex Pentland, Sandeep Pisharody, Sarah Powazek, Andrew Prout, Philip Reiner, Koichi Suzuki, Kenji Takahashi, Tony Tauber, Leah Walker, Douglas StetsonComments: 26 pages, 13 figures, 2 tables, 72 references, submitted to PlosOneSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
- [99] arXiv:2201.06080 [pdf, other]
-
Title: Evaluating the Security of Open Radio Access NetworksAuthors: Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf ShabtaiSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [100] arXiv:2201.06093 [pdf, other]
-
Title: Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)Authors: Edan Habler, Ron Bitton, Dan Avraham, Dudu Mimran, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf ShabtaiSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [101] arXiv:2201.06100 [pdf, ps, other]
-
Title: Improving Privacy and Security in Unmanned Aerial Vehicles Network using BlockchainComments: 18 Pages; 14 Figures; 2 TablesJournal-ref: Int. J. of Communication Networks and Distributed Systems (IJCNDS) 2023Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [102] arXiv:2201.06235 [pdf, other]
-
Title: Characterizing Sensor Leaks in Android AppsSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [103] arXiv:2201.06335 [pdf, other]
-
Title: End to End Secure Data Exchange in Value Chains with Dynamic Policy UpdatesComments: 22 pages, 9 figures Main changes from the previous version: - The introduction and Sections 5 and 6 are better written now. - State of the Art references update when necessary. - Design Requirements names have been changed to better ones. - Section 4 has been reordered. - Section 4.1 is better explained now. - Algorithms in Section 5 are better explained now, step-by-stepSubjects: Cryptography and Security (cs.CR)
- [104] arXiv:2201.06354 [pdf, other]
-
Title: Improving the Security of the IEEE 802.15.6 Standard for Medical BANsComments: Published in IEEE AccessJournal-ref: IEEE Access, 2022Subjects: Cryptography and Security (cs.CR)
- [105] arXiv:2201.06362 [pdf, other]
-
Title: Silently Disabling ECUs and Enabling Blind Attacks on the CAN BusComments: 12 pages, 6 figuresSubjects: Cryptography and Security (cs.CR)
- [106] arXiv:2201.06394 [pdf, other]
-
Title: Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery TechniquesSubjects: Cryptography and Security (cs.CR)
- [107] arXiv:2201.06446 [pdf, other]
-
Title: Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney ExchangeComments: This is the extended version of the paper that appeared in the 12th ACM Conference on Data and Application Security and Privacy (CODASPY'22), April 24-26, 2022, Baltimore-Washington DC Area, United States, this https URLJournal-ref: 12th ACM Conference on Data and Application Security and Privacy 2022 (CODASPY'22)Subjects: Cryptography and Security (cs.CR)
- [108] arXiv:2201.06680 [pdf, other]
-
Title: Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected VehiclesSubjects: Cryptography and Security (cs.CR)
- [109] arXiv:2201.06699 [pdf, other]
-
Title: AESPA: Accuracy Preserving Low-degree Polynomial Activation for Fast Private InferenceComments: 11 pages, 5 figuresSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [110] arXiv:2201.06785 [pdf, ps, other]
-
Title: Challenges of Return-Oriented-Programming on the Xtensa Hardware ArchitectureSubjects: Cryptography and Security (cs.CR)
- [111] arXiv:2201.06811 [pdf, other]
-
Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado CashAuthors: Mike Wu, Will McTighe, Kaili Wang, Istvan A. Seres, Nick Bax, Manuel Puebla, Mariano Mendez, Federico Carrone, Tomás De Mattey, Herman O. Demaestri, Mariano Nicolini, Pedro FontanaComments: 10 pages content, 2 pages appendixSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [112] arXiv:2201.06971 [pdf, ps, other]
-
Title: Identification for Accountability vs PrivacyComments: 4 pages plus appendix, 9 pages totalSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [113] arXiv:2201.07119 [pdf, ps, other]
-
Title: A Survey on Code-Based CryptographyComments: This book chapter is a part of the Springer Lecture Notes in Mathematics: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and CryptographySubjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
- [114] arXiv:2201.07188 [pdf, other]
-
Title: SoK: Blockchain GovernanceSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
- [115] arXiv:2201.07220 [pdf, other]
-
Title: Do not rug on me: Zero-dimensional Scam DetectionSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
- [116] arXiv:2201.07224 [pdf, other]
-
Title: NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree SearchComments: Published as a conference paper in AAAI 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
- [117] arXiv:2201.07323 [pdf, ps, other]
-
Title: A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) ApplicationsJournal-ref: IEEE Access, vol. 10, 2022Subjects: Cryptography and Security (cs.CR)
- [118] arXiv:2201.07359 [pdf, other]
-
Title: Sandbox Sample Classification Using Behavioral Indicators of CompromiseAuthors: M. AndrecutComments: 10 pages, 2 figuresSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [119] arXiv:2201.07375 [pdf, other]
-
Title: A 333.9uW 0.158mm$^2$ Saber Learning with Rounding based Post-Quantum Crypto AcceleratorAuthors: Archisman Ghosh, J.M.B. Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, Ingrid Verbauwhede, Shreyas SenSubjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [120] arXiv:2201.07388 [pdf, other]
-
Title: Kantorovich Mechanism for Pufferfish PrivacyAuthors: Ni DingComments: 20 pages, incl. supplementary materials, 4 figures, to appear in proceeding of AISTATS 2022Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
- [121] arXiv:2201.07391 [pdf, other]
-
Title: MetaV: A Meta-Verifier Approach to Task-Agnostic Model FingerprintingComments: To Appear in KDD'2022Subjects: Cryptography and Security (cs.CR)
- [122] arXiv:2201.07417 [pdf, other]
-
Title: Defining Security Requirements with the Common Criteria: Applications, Adoptions, and ChallengesAuthors: Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren ArmstrongSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [123] arXiv:2201.07444 [pdf, other]
-
Title: Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural NetworksComments: under reviewSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [124] arXiv:2201.07462 [pdf, other]
-
Title: Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface ExploitsComments: Published in IEEE PerCom Workshops 2022,978-1-6654-1647-4/22/$31.00 pp.643-648 Copyright 2022 IEEESubjects: Cryptography and Security (cs.CR)
- [125] arXiv:2201.07469 [pdf, other]
-
Title: Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional SpaceComments: This paper is accepted and will appear in ICDE 2022 as a regular research paperSubjects: Cryptography and Security (cs.CR); Databases (cs.DB)
- [126] arXiv:2201.07496 [pdf, other]
-
Title: A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security ApplicationsComments: Published in IEEE Solid-State Circuits Letters (SSCL)Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [127] arXiv:2201.07513 [pdf, other]
-
Title: Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image EncodersComments: Accepted by CVPR 2023Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [128] arXiv:2201.07537 [pdf, other]
-
Title: Graph Neural Network-based Android Malware Classification with Jumping KnowledgeComments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [129] arXiv:2201.07597 [pdf, other]
-
Title: FPHammer: A Device Identification Framework based on DRAM FingerprintingComments: This version has been accepted by TrustCom-2023Subjects: Cryptography and Security (cs.CR)
- [130] arXiv:2201.07649 [pdf, other]
-
Title: Malware Classification Using Static Disassembly and Machine LearningComments: To be published in 29th AIAI Irish Conference on Artificial Intelligence and Cognitive ScienceSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [131] arXiv:2201.07651 [pdf, other]
-
Title: Enhancing CryptoGuards Deployability for Continuous Software Security ScanningAuthors: Miles FrantzComments: Masters thesisSubjects: Cryptography and Security (cs.CR)
- [132] arXiv:2201.07654 [pdf, other]
-
Title: Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity CountermeasuresAuthors: Darren CobianComments: 54 pages, 17 figures/tables, 43 citationsSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [133] arXiv:2201.07711 [pdf, other]
-
Title: Enhancing the Security & Privacy of Wearable Brain-Computer InterfacesAuthors: Zahra Tarkhani, Lorena Qendro, Malachy O'Connor Brown, Oscar Hill, Cecilia Mascolo, Anil MadhavapeddySubjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Operating Systems (cs.OS)
- [134] arXiv:2201.07730 [pdf, other]
-
Title: SCOTCH: An Efficient Secure Computation Framework for Secure AggregationAuthors: Yash More, Prashanthi Ramachandran, Priyam Panda, Arup Mondal, Harpreet Virk, Debayan GuptaComments: Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI-22), Third AAAI Privacy-Preserving Artificial Intelligence (PPAI-22) WorkshopSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [135] arXiv:2201.07740 [pdf, other]
-
Title: More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIRComments: 19 pages, 6 figuresSubjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
- [136] arXiv:2201.07746 [pdf, other]
-
Title: A Centrality Analysis of the Lightning NetworkSubjects: Cryptography and Security (cs.CR)
- [137] arXiv:2201.07765 [pdf, other]
-
Title: Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital TwinsAuthors: Sabah Suhail, Saif Ur Rehman Malik, Raja Jurdak, Rasheed Hussain, Raimundas Matulevičius, Davor SvetinovicComments: 39 pages, 10 figuresJournal-ref: Computers in Industry, Volume 141, October 2022, 103699Subjects: Cryptography and Security (cs.CR)
- [138] arXiv:2201.07793 [pdf, ps, other]
-
Title: On Using Blockchains for Beyond Visual Line of Sight (BVLOS) Drones Operation: An Architectural StudyComments: 10 pages, 4 figures, HiPEAC'22Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Software Engineering (cs.SE)
- [139] arXiv:2201.07920 [pdf, other]
-
Title: Shades of Finality and Layer 2 ScalingAuthors: Bennet Yee (1), Dawn Song (1), Patrick McCorry (2), Chris Buckland (2) ((1) Oasis Labs, (2) Infura)Comments: 14 pagesSubjects: Cryptography and Security (cs.CR)
- [140] arXiv:2201.07946 [pdf, other]
-
Title: Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake SecurityComments: 26 pages, 10 figuresSubjects: Cryptography and Security (cs.CR)
- [141] arXiv:2201.07954 [pdf, other]
-
Title: Effective Anomaly Detection in Smart Home by Integrating Event Time IntervalsSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [142] arXiv:2201.07959 [pdf, other]
-
Title: APIRO: A Framework for Automated Security Tools API RecommendationSubjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
- [143] arXiv:2201.07964 [pdf, ps, other]
-
Title: A Systematic Literature Review of Blockchain Technology Adoption in BangladeshAuthors: Abdullah Al Hussain, Md. Akhtaruzzaman Emon, Toufiq Ahmed Tanna, Rasel Iqbal Emon, Md. Mehedi Hassan OnikJournal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-30, Vol. 6, No. 1, 1st January 2022, Published by International Association of Educators and Researchers (IAER)Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [144] arXiv:2201.08052 [pdf, other]
-
Title: Adversarial Jamming for a More Effective Constellation AttackComments: 3 pages, 2 figures, published in The 13th International Symposium on Antennas, Propagation and EM Theory (ISAPE 2021)Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
- [145] arXiv:2201.08120 [pdf, other]
-
Title: Survey on Privacy-Preserving Techniques for Data PublishingComments: 35 pages, 3 figures, 5 tablesSubjects: Cryptography and Security (cs.CR)
- [146] arXiv:2201.08126 [pdf, ps, other]
-
Title: Reversible Data Hiding in Encrypted Images by Lossless Pixel ConversionComments: Submitted to IEEE TDSCSubjects: Cryptography and Security (cs.CR)
- [147] arXiv:2201.08133 [pdf, other]
-
Title: CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious DiseasesJournal-ref: IEEE Journal on Selected Areas in Communications (JSAC), 2022Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
- [148] arXiv:2201.08135 [pdf, other]
-
Title: Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challengesAuthors: Nuria Rodríguez-Barroso, Daniel Jiménez López, M. Victoria Luzón, Francisco Herrera, Eugenio Martínez-CámaraJournal-ref: Information Fusion (2022)Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [149] arXiv:2201.08154 [pdf, other]
-
Title: NapierOne: A modern mixed file data set alternative to Govdocs1Journal-ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817Subjects: Cryptography and Security (cs.CR)
- [150] arXiv:2201.08441 [pdf, other]
-
Title: VUDENC: Vulnerability Detection with Deep Learning on a Natural Codebase for PythonComments: Accepted ManuscriptJournal-ref: Information and Software Technology, Volume 144, April 2022, 106809Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[ showing 100 entries per page: fewer | more | all ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, 2403, contact, help (Access key information)