We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 175

[ total of 395 entries: 1-100 | 76-175 | 176-275 | 276-375 | 376-395 ]
[ showing 100 entries per page: fewer | more | all ]
[176]  arXiv:2205.10961 [pdf, other]
Title: Scalable and Privacy-Focused Company-Centric Supply Chain Management
Comments: IEEE ICBC'22
Journal-ref: In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22)
Subjects: Cryptography and Security (cs.CR)
[177]  arXiv:2205.10962 [pdf, other]
Title: Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications
Comments: 37 pages including citations, 14 figures, first edit contained minor repositioning of some of the images
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2205.10963 [pdf, other]
Title: Protecting File Activities via Deception for ARM TrustZone
Comments: Under submission
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[179]  arXiv:2205.11121 [pdf, other]
Title: A normal approximation for joint frequency estimatation under Local Differential Privacy
Authors: Thomas Carette
Comments: Preliminary development, draft
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Statistics Theory (math.ST)
[180]  arXiv:2205.11171 [pdf, other]
Title: Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations
Comments: IEEE Systems Journal (2023)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[181]  arXiv:2205.11458 [pdf, other]
Title: Groundhog: Efficient Request Isolation in FaaS
Subjects: Cryptography and Security (cs.CR)
[182]  arXiv:2205.11459 [pdf, other]
Title: CELEST: Federated Learning for Globally Coordinated Threat Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[183]  arXiv:2205.11518 [pdf, other]
Title: A Practical Influence Approximation for Privacy-Preserving Data Filtering in Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[184]  arXiv:2205.11519 [pdf, other]
Title: FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[185]  arXiv:2205.11597 [pdf, other]
Title: Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[186]  arXiv:2205.11782 [pdf, other]
Title: Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2205.11783 [pdf, other]
Title: Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[188]  arXiv:2205.11895 [pdf, ps, other]
Title: Efficient and Lightweight In-memory Computing Architecture for Hardware Security
Comments: 14 pages, 18 figures, 4 tables, submitted to the IEEE Transactions on Information Forensics and Security Journal
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[189]  arXiv:2205.11935 [pdf, other]
Title: CryptoTL: Private, Efficient and Secure Transfer Learning
Subjects: Cryptography and Security (cs.CR)
[190]  arXiv:2205.12064 [pdf, other]
Title: Process Mining Algorithm for Online Intrusion Detection System
Comments: International Conference on Software Testing, Machine Learning and Complex Process Analysis
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2205.12094 [pdf, other]
Title: Towards Better Privacy-preserving Electronic Voting System
Subjects: Cryptography and Security (cs.CR)
[192]  arXiv:2205.12311 [pdf, other]
Title: Fast & Furious: Modelling Malware Detection as Evolving Data Streams
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2205.12352 [pdf, other]
Title: Image Based Password Authentication System
Subjects: Cryptography and Security (cs.CR)
[194]  arXiv:2205.12424 [pdf, other]
Title: VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Comments: Accepted as a conference paper at IJCNN 2022
Journal-ref: International Joint Conference on Neural Networks (IJCNN), 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[195]  arXiv:2205.12568 [pdf, other]
Title: The security of the Coordicide: the implementation and analysis of possible attack vectors
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[196]  arXiv:2205.12569 [pdf, other]
Title: Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[197]  arXiv:2205.12587 [pdf, other]
Title: Deniable Steganography
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[198]  arXiv:2205.12709 [pdf, other]
Title: VeriFi: Towards Verifiable Federated Unlearning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[199]  arXiv:2205.12713 [pdf, other]
Title: jTrans: Jump-Aware Transformer for Binary Code Similarity
Comments: In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[200]  arXiv:2205.12742 [pdf, other]
Title: SoK: Hardware-supported Trusted Execution Environments
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[201]  arXiv:2205.12748 [pdf, other]
Title: Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[202]  arXiv:2205.12757 [pdf, other]
Title: A Case for Practical Configuration Management Using Hardware-based Security Tokens
Comments: 8 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[203]  arXiv:2205.12887 [pdf, ps, other]
Title: SPANSE: combining sparsity with density for efficient one-time code-based digital signatures
Comments: 19 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[204]  arXiv:2205.12897 [pdf, other]
Title: Cryptocurrency Giveaway Scam with YouTube Live Stream
Authors: Iman Vakilinia
Subjects: Cryptography and Security (cs.CR)
[205]  arXiv:2205.12911 [pdf, other]
Title: SoK: Cross-border Criminal Investigations and Digital Evidence
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[206]  arXiv:2205.13155 [pdf, other]
Title: A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs
Subjects: Cryptography and Security (cs.CR)
[207]  arXiv:2205.13160 [pdf, other]
Title: Integration of Blockchain and Edge Computing in Internet of Things: A Survey
Authors: He Xue (1), Dajiang Chen (2), Ning Zhang (3), Hong-Ning Dai (4), Keping Yu (5) ((1) Sichuan Fire Research Institute of Ministry of Emergency Management, (2) University of Electronic Science and Technology of China, (3) University of Windsor, (4) Lingnan University, (5) Waseda University)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[208]  arXiv:2205.13169 [pdf, ps, other]
Title: Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries
Subjects: Cryptography and Security (cs.CR)
[209]  arXiv:2205.13176 [pdf, other]
Title: On Collective Robustness of Bagging Against Data Poisoning
Comments: Accepted by ICML22, code: this https URL
Subjects: Cryptography and Security (cs.CR)
[210]  arXiv:2205.13216 [pdf, other]
Title: Encoded Gradients Aggregation against Gradient Leakage in Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[211]  arXiv:2205.13322 [pdf, ps, other]
Title: DoS Attacks on Blockchain Ecosystem
Comments: Accepted at 4TH INTERNATIONAL WORKSHOP ON FUTURE PERSPECTIVE OF DECENTRALIZED APPLICATIONS (FPDAPP), Euro-Par 2021: Parallel Processing Workshops
Subjects: Cryptography and Security (cs.CR)
[212]  arXiv:2205.13333 [pdf, other]
Title: SoK: Decentralized Randomness Beacon Protocols
Comments: Accepted at the 27th Australasian Conference on Information Security and Privacy (ACISP 2022)
Subjects: Cryptography and Security (cs.CR)
[213]  arXiv:2205.13523 [pdf, other]
Title: PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations
Subjects: Cryptography and Security (cs.CR)
[214]  arXiv:2205.13576 [pdf, other]
Title: Factors Impacting Resilience of Internet of Things Systems in Critical Infrastructure
Comments: Paper accepted at IEEE AIIoT 2022, Seattle, USA, 6-9 June 2022
Subjects: Cryptography and Security (cs.CR)
[215]  arXiv:2205.13593 [pdf, ps, other]
Title: Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain
Comments: 17 pages, 5 figures, Journal
Journal-ref: Computational Intelligence and Neuroscience,2022
Subjects: Cryptography and Security (cs.CR)
[216]  arXiv:2205.13685 [pdf, other]
Title: Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Comments: 38pages, 2 figures, 2 tables. Journal of Systems Architecture,2022
Subjects: Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[217]  arXiv:2205.13702 [pdf, other]
Title: R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
Subjects: Cryptography and Security (cs.CR)
[218]  arXiv:2205.13765 [pdf, other]
Title: Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor
Comments: 8 pages
Journal-ref: 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022, pp. 323-330
Subjects: Cryptography and Security (cs.CR)
[219]  arXiv:2205.13776 [pdf, other]
Title: PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Types
Comments: Accepted and presented at the conference GI Sicherheit 2022
Subjects: Cryptography and Security (cs.CR)
[220]  arXiv:2205.13808 [pdf, other]
Title: Hide and Seek -- Preserving Location Privacy and Utility in the Remote Identification of Unmanned Aerial Vehicles
Subjects: Cryptography and Security (cs.CR)
[221]  arXiv:2205.13882 [pdf, other]
Title: How to Peel a Million: Validating and Expanding Bitcoin Clusters
Subjects: Cryptography and Security (cs.CR)
[222]  arXiv:2205.14017 [pdf, other]
Title: BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[223]  arXiv:2205.14246 [pdf, other]
Title: Defending Against Stealthy Backdoor Attacks
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[224]  arXiv:2205.14281 [pdf, other]
Title: SHORTSTACK: Distributed, Fault-tolerant, Oblivious Data Access
Authors: Midhul Vuppalapati (1), Kushal Babel (1), Anurag Khandelwal (2), Rachit Agarwal (1) ((1) Cornell University, (2) Yale University)
Comments: Full version of USENIX OSDI'22 paper
Journal-ref: In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), pp. 719-734. 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[225]  arXiv:2205.14324 [pdf, other]
Title: Differentially Private Covariance Revisited
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[226]  arXiv:2205.14371 [pdf, other]
Title: GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code
Comments: arXiv admin note: text overlap with arXiv:1907.07159 by other authors
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[227]  arXiv:2205.14498 [pdf, other]
Title: Towards a Security Stress-Test for Cloud Configurations
Comments: Conference: The IEEE International Conference on Cloud Computing (CLOUD) 2022
Subjects: Cryptography and Security (cs.CR)
[228]  arXiv:2205.14576 [pdf, other]
Title: Problem-Space Evasion Attacks in the Android OS: a Survey
Subjects: Cryptography and Security (cs.CR)
[229]  arXiv:2205.14611 [pdf, ps, other]
Title: Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications
Subjects: Cryptography and Security (cs.CR)
[230]  arXiv:2205.14697 [pdf, other]
Title: Evaluating Automated Driving Planner Robustness against Adversarial Influence
Comments: To appear at the 2022 Workshop on Deception Against Planning Systems and Planning in Adversarial Conditions (DAPSPAC)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[231]  arXiv:2205.14759 [pdf, other]
Title: Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[232]  arXiv:2205.14806 [pdf, ps, other]
Title: Data Trust and IoT
Authors: Mayra Samaniego
Subjects: Cryptography and Security (cs.CR)
[233]  arXiv:2205.14940 [pdf, other]
Title: Detecting Unknown DGAs without Context Information
Comments: Accepted at The 17th International Conference on Availability, Reliability and Security (ARES 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234]  arXiv:2205.15037 [pdf, other]
Title: Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance
Comments: The codes used for the analyses presented in the paper will be made available online only after the manuscript is accepted for publication at any conference/journal
Subjects: Cryptography and Security (cs.CR)
[235]  arXiv:2205.15202 [pdf, other]
Title: A Small Leak Will Sink Many Ships: Vulnerabilities Related to Mini Programs Permissions
Subjects: Cryptography and Security (cs.CR)
[236]  arXiv:2205.15359 [pdf, other]
Title: CTR: Checkpoint, Transfer, and Restore for Secure Enclaves
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[237]  arXiv:2205.15444 [pdf, other]
Title: Integrity Authentication in Tree Models
Subjects: Cryptography and Security (cs.CR)
[238]  arXiv:2205.15545 [pdf, other]
Title: Rethinking Block Storage Encryption with Virtual Disks
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[239]  arXiv:2205.15915 [pdf, ps, other]
Title: IFCIL: An Information Flow Configuration Language for SELinux (Extended Version)
Comments: Extended version of the paper "IFCIL: An Information Flow Configuration Language for SELinux"
Subjects: Cryptography and Security (cs.CR)
[240]  arXiv:2205.15944 [pdf, other]
Title: Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Comments: To appear in European Symposium on Research in Computer Security (ESORICS) 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[241]  arXiv:2205.00047 (cross-list from cs.LG) [pdf, other]
Title: Logically Consistent Adversarial Attacks for Soft Theorem Provers
Comments: IJCAI-ECAI 2022
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[242]  arXiv:2205.00107 (cross-list from cs.LG) [pdf, ps, other]
Title: Bridging Differential Privacy and Byzantine-Robustness via Model Aggregation
Authors: Heng Zhu, Qing Ling
Comments: IJCAI-ECAI 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[243]  arXiv:2205.00361 (cross-list from cs.LG) [pdf, other]
Title: Combined Learning of Neural Network Weights for Privacy in Collaborative Tasks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[244]  arXiv:2205.00436 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Multivariate Time Series Forecasting of Aggregated Human Mobility With Deep Learning: Input or Gradient Perturbation?
Comments: Final version accepted in the journal Neural Computing and Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[245]  arXiv:2205.00807 (cross-list from cs.LG) [pdf, other]
Title: Deep-Attack over the Deep Reinforcement Learning
Comments: Accepted to Knowledge-Based Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[246]  arXiv:2205.01184 (cross-list from cs.LG) [pdf, other]
Title: Performance Weighting for Robust Federated Learning Against Corrupted Sources
Comments: 27 pages, 40 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[247]  arXiv:2205.01432 (cross-list from cs.LG) [pdf, other]
Title: ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[248]  arXiv:2205.01533 (cross-list from cs.IT) [pdf, other]
Title: Average Age of Information Minimization in Reliable Covert Communication on Time-Varying Channels
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[249]  arXiv:2205.01556 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy Amplification via Random Participation in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[250]  arXiv:2205.01625 (cross-list from cs.NE) [pdf, other]
Title: Toward Robust Spiking Neural Network Against Adversarial Perturbation
Subjects: Neural and Evolutionary Computing (cs.NE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[251]  arXiv:2205.01714 (cross-list from cs.CL) [pdf, other]
Title: Don't sweat the small stuff, classify the rest: Sample Shielding to protect text classifiers against adversarial attacks
Comments: 9 pages, 8 figures, Accepted to NAACL 2022
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252]  arXiv:2205.01772 (cross-list from cs.CV) [pdf, other]
Title: The Brazilian Data at Risk in the Age of AI?
Comments: 8 pages in Portuguese and 5 figures, Top 3 among the best papers at the ENIAC 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[253]  arXiv:2205.01797 (cross-list from cs.NI) [pdf, other]
Title: Coded Transaction Broadcasting for High-throughput Blockchains
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[254]  arXiv:2205.01863 (cross-list from cs.CL) [pdf, other]
Title: Provably Confidential Language Modelling
Comments: NAACL 2022
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[255]  arXiv:2205.01950 (cross-list from cs.LG) [pdf, other]
Title: Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation
Comments: Paper accepted at the 2022 IEEE International Joint Conference on Neural Networks (IJCNN)
Journal-ref: 2022 International Joint Conference on Neural Networks (IJCNN)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[256]  arXiv:2205.01992 (cross-list from cs.LG) [pdf, other]
Title: Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Comments: 35 pages, Accepted at ACM Computing Surveys
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[257]  arXiv:2205.02466 (cross-list from cs.LG) [pdf, other]
Title: Optimal Algorithms for Mean Estimation under Local Differential Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[258]  arXiv:2205.02511 (cross-list from cs.CV) [pdf, other]
Title: One Picture is Worth a Thousand Words: A New Wallet Recovery Process
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[259]  arXiv:2205.02652 (cross-list from cs.LG) [pdf, other]
Title: Can collaborative learning be private, robust and scalable?
Comments: Accepted at MICCAI DeCaF 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[260]  arXiv:2205.02741 (cross-list from cs.LG) [pdf, ps, other]
Title: CE-based white-box adversarial attacks will not work using super-fitting
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[261]  arXiv:2205.02743 (cross-list from cs.LG) [pdf, ps, other]
Title: Rethinking Classifier and Adversarial Attack
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[262]  arXiv:2205.02973 (cross-list from cs.LG) [pdf, other]
Title: Large Scale Transfer Learning for Differentially Private Image Classification
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[263]  arXiv:2205.03105 (cross-list from cs.LG) [pdf, other]
Title: LPGNet: Link Private Graph Networks for Node Classification
Comments: Accepted at CCS'22
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[264]  arXiv:2205.03259 (cross-list from cs.CY) [pdf, ps, other]
Title: Decentralized Digital Currency System using Merkle Hash Trees
Comments: 37 pages, 9 Figures, 8 Tables, submitted to Journal of Banking and Financial Technology
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[265]  arXiv:2205.03546 (cross-list from cs.LG) [pdf, other]
Title: Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees
Comments: Accepted by CVPR 2022 Oral presentation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[266]  arXiv:2205.03925 (cross-list from cs.CY) [pdf, ps, other]
Title: Transparency, Compliance, And Contestability When Code Is(n't) Law
Authors: Alexander Hicks
Comments: 11 pages, to appear at NSPW 2022
Journal-ref: New Security Paradigms Workshop, 2022
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[267]  arXiv:2205.04047 (cross-list from cs.SE) [pdf, other]
Title: GreyConE: Greybox fuzzing+Concolic execution guided test generation for high level design
Comments: 5 pages, 5 figures, 2 tables, 2 algorithms. Accepted in International Test Conference (ITC 2022)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[268]  arXiv:2205.04112 (cross-list from cs.NI) [pdf, other]
Title: On Generalisability of Machine Learning-based Network Intrusion Detection Systems
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[269]  arXiv:2205.04657 (cross-list from cs.DC) [pdf, ps, other]
Title: Operations Smart Contract to Realize Decentralized System Operations Workflow for Consortium Blockchain
Journal-ref: IEICE Transactions on Communications, 2022
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[270]  arXiv:2205.04855 (cross-list from cs.MA) [pdf, ps, other]
Title: Secure Distributed/Federated Learning: Prediction-Privacy Trade-Off for Multi-Agent System
Comments: 6 pages, 2 figures
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[271]  arXiv:2205.04899 (cross-list from cs.SE) [pdf, other]
Title: From Trade-only to Zero-Value NFTs: The Asset Proxy NFT Paradigm in Web3
Comments: 15 pages, 2 figures
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[272]  arXiv:2205.05015 (cross-list from cs.IT) [pdf, ps, other]
Title: Robust Optimization for Local Differential Privacy
Comments: To be presented at International Symposium on Information Theory (ISIT 2022)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[273]  arXiv:2205.05068 (cross-list from cs.IT) [pdf, ps, other]
Title: Secure and Private Source Coding with Private Key and Decoder Side Information
Comments: Shorter version to appear in the 2022 IEEE Information Theory Workshop
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[274]  arXiv:2205.05211 (cross-list from cs.DS) [pdf, other]
Title: Parallel Private Retrieval of Merkle Proofs via Tree Colorings
Comments: 27 pages
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Combinatorics (math.CO)
[275]  arXiv:2205.05249 (cross-list from cs.LG) [pdf, other]
Title: Secure & Private Federated Neuroimaging
Comments: 18 pages, 13 figures, 2 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Distributed, Parallel, and Cluster Computing (cs.DC)
[ total of 395 entries: 1-100 | 76-175 | 176-275 | 276-375 | 376-395 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)