We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2022, skipping first 50

[ total of 333 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | ... | 301-333 ]
[ showing 50 entries per page: fewer | more | all ]
[51]  arXiv:2201.03281 [pdf, ps, other]
Title: IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[52]  arXiv:2201.03388 [pdf, ps, other]
Title: A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[53]  arXiv:2201.03391 [pdf, ps, other]
Title: Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2201.03401 [pdf, other]
Title: An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[55]  arXiv:2201.03499 [pdf, ps, other]
Title: Deletion-Compliance in the Absence of Privacy
Comments: 25 pages, 4 figures. Appears in the proceedings of PST2021
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2201.03767 [pdf, ps, other]
Title: Improved (Related-key) Differential-based Neural Distinguishers for SIMON and SIMECK Block Ciphers
Journal-ref: The Computer Journal 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[57]  arXiv:2201.03772 [pdf, other]
Title: RFLBAT: A Robust Federated Learning Algorithm against Backdoor Attack
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[58]  arXiv:2201.03913 [src]
Title: Exponential Randomized Response: Boosting Utility in Differentially Private Selection
Comments: This algorithm only works under an assumption that is not realistic for the wider application of differential privacy
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2201.04014 [pdf, other]
Title: Captcha Attack: Turning Captchas Against Humanity
Comments: Currently under submission
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[60]  arXiv:2201.04018 [pdf, other]
Title: Feature Space Hijacking Attacks against Differentially Private Split Learning
Comments: To appear at the Third AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-22). (4 pages, short paper.)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2201.04048 [pdf, other]
Title: SnapFuzz: An Efficient Fuzzing Framework for Network Applications
Journal-ref: ISSTA 22, July 18 22, 2022, Virtual, South Korea
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[62]  arXiv:2201.04211 [pdf, ps, other]
Title: Reducing Noise Level in Differential Privacy through Matrix Masking
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[63]  arXiv:2201.04255 [pdf, other]
Title: Rache: Radix-additive caching for homomorphic encryption
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[64]  arXiv:2201.04351 [pdf, other]
Title: Diffix Elm: Simple Diffix
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2201.04424 [pdf, other]
Title: Detecting Ransomware Execution in a Timely Manner
Comments: 12 Pages, 9 Figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2201.04425 [pdf, ps, other]
Title: Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms
Comments: 6 pages, 1 figure
Journal-ref: 2021 10th MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, p. 81-86
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2201.04441 [pdf, other]
Title: Path Transitions Tell More:Optimizing Fuzzing Schedules via Runtime Program States
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[68]  arXiv:2201.04569 [pdf, other]
Title: Get your Foes Fooled: Proximal Gradient Split Learning for Defense against Model Inversion Attacks on IoMT data
Comments: 10 pages, 5 figures, 2 tables
Journal-ref: IEEE Transactions on Network Science and Engineering, 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[69]  arXiv:2201.04610 [pdf, other]
Title: Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2201.04677 [pdf, other]
Title: When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[71]  arXiv:2201.04736 [pdf, other]
Title: Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges
Comments: Accepted at ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[72]  arXiv:2201.04762 [pdf, ps, other]
Title: Privacy Amplification by Subsampling in Time Domain
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[73]  arXiv:2201.04782 [pdf, other]
Title: Privacy-Utility Trades in Crowdsourced Signal Map Obfuscation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[74]  arXiv:2201.04803 [pdf, other]
Title: A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks
Comments: 29 Pages, 5 Figures, Submitted in IEEE Communications Surveys and Tutorials
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2201.04816 [pdf, other]
Title: Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform (EMCP)
Authors: Hendrik F. R. Schmidt (1), Jörg Schlötterer (1, 2, 3), Marcel Bargull (1), Enrico Nasca (1, 3), Ryan Aydelott (1), Christin Seifert (1, 2, 3), Folker Meyer (1, 2) ((1) Institute for Artificial Intelligence in Medicine, University Hospital Essen, Essen, Germany (2) University of Duisburg-Essen, Essen, Germany (3) Cancer Research Center Cologne Essen (CCCE), Essen, Germany)
Comments: 9 pages, 5 figures, to be published in the proceedings of the 2021 IEEE CogMI conference. Christin Seifert and Folker Meyer are co-senior authors
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[76]  arXiv:2201.04845 [pdf, other]
Title: Reconstructing Training Data with Informed Adversaries
Comments: Published at "2022 IEEE Symposium on Security and Privacy (SP)"
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:2201.04853 [pdf, ps, other]
Title: FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers
Comments: 29th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2201.05001 [pdf, ps, other]
Title: Evaluation of Four Black-box Adversarial Attacks and Some Query-efficient Improvement Analysis
Authors: Rui Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[79]  arXiv:2201.05006 [pdf, ps, other]
Title: Dynamic Local Searchable Symmetric Encryption
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2201.05071 [pdf, other]
Title: Evaluation of Neural Networks Defenses and Attacks using NDCG and Reciprocal Rank Metrics
Comments: 12 pages, 5 figures
Journal-ref: International Journal of Information Security 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[81]  arXiv:2201.05073 [pdf, ps, other]
Title: Low-latency, Scalable, DeFi with Zef
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2201.05199 [pdf, other]
Title: D-Box: DMA-enabled Compartmentalization for Embedded Applications
Comments: Network and Distributed Systems Security (NDSS) Symposium 2022
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2201.05326 [pdf, other]
Title: Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots
Comments: SOAR Engine for Honeypots Deployment, 8 pages, 7 figures
Journal-ref: 2022 IEEE Conference on Dependable and Secure Computing (DSC)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[84]  arXiv:2201.05399 [pdf, other]
Title: Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[85]  arXiv:2201.05403 [pdf, ps, other]
Title: Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2201.05410 [pdf, other]
Title: CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2201.05415 [pdf, other]
Title: Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0
Comments: 30 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2201.05657 [pdf, other]
Title: Authentication and Handover Challenges and Methods for Drone Swarms
Comments: Accepted for publication in IEEE Journal of Radio Frequency Identification
Journal-ref: IEEE Journal of Radio Frequency Identification 2022
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2201.05671 [pdf, other]
Title: Zef: Low-latency, Scalable, Private Payments
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2201.05677 [pdf, other]
Title: Bullshark: DAG BFT Protocols Made Practical
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2201.05757 [pdf, other]
Title: TRacer: Scalable Graph-based Transaction Tracing for Account-based Blockchain Trading Systems
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2201.05889 [pdf, other]
Title: StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning
Comments: To appear in ACM Conference on Computer and Communications Security (CCS), 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:2201.05931 [pdf, other]
Title: On eliminating blocking interference of RFID unauthorized reader detection system
Comments: 4 pages,7 figures
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2201.05943 [pdf, other]
Title: TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal Attacks
Comments: Accepted at Design, Automation and Test in Europe Conference (DATE), 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[95]  arXiv:2201.05964 [pdf, other]
Title: Visualizing Privacy-Utility Trade-Offs in Differentially Private Data Releases
Comments: Forthcoming in Proceedings on Privacy Enhancing Technologies 2022
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[96]  arXiv:2201.05996 [pdf, ps, other]
Title: Hardware Implementation of Multimodal Biometric using Fingerprint and Iris
Authors: Tariq M Khan
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[97]  arXiv:2201.06038 [pdf, other]
Title: Image data hiding with multi-scale autoencoder network
Comments: accepted by Media Watermarking, Security, and Forensics 2022
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[98]  arXiv:2201.06068 [pdf, ps, other]
Title: Zero Botnets: An Observe-Pursue-Counter Approach
Comments: 26 pages, 13 figures, 2 tables, 72 references, submitted to PlosOne
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[99]  arXiv:2201.06080 [pdf, other]
Title: Evaluating the Security of Open Radio Access Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[100]  arXiv:2201.06093 [pdf, other]
Title: Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 333 entries: 1-50 | 51-100 | 101-150 | 151-200 | 201-250 | ... | 301-333 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)