We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 175

[ total of 395 entries: 1-25 | ... | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | ... | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]
[176]  arXiv:2205.10961 [pdf, other]
Title: Scalable and Privacy-Focused Company-Centric Supply Chain Management
Comments: IEEE ICBC'22
Subjects: Cryptography and Security (cs.CR)
[177]  arXiv:2205.10962 [pdf, other]
Title: Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications
Comments: 37 pages including citations, 14 figures, first edit contained minor repositioning of some of the images
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2205.10963 [pdf, other]
Title: Protecting File Activities via Deception for ARM TrustZone
Comments: Under submission
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[179]  arXiv:2205.11121 [pdf, other]
Title: A normal approximation for joint frequency estimatation under Local Differential Privacy
Authors: Thomas Carette
Comments: Preliminary development, draft
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Statistics Theory (math.ST)
[180]  arXiv:2205.11171 [pdf, other]
Title: Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[181]  arXiv:2205.11458 [pdf, other]
Title: Groundhog: Efficient Request Isolation in FaaS
Subjects: Cryptography and Security (cs.CR)
[182]  arXiv:2205.11459 [pdf, other]
Title: CELEST: Federated Learning for Globally Coordinated Threat Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[183]  arXiv:2205.11518 [pdf, other]
Title: A Practical Influence Approximation for Privacy-Preserving Data Filtering in Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[184]  arXiv:2205.11519 [pdf, other]
Title: FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[185]  arXiv:2205.11597 [pdf, other]
Title: Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[186]  arXiv:2205.11782 [pdf, other]
Title: Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2205.11783 [pdf, other]
Title: Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[188]  arXiv:2205.11895 [pdf]
Title: Efficient and Lightweight In-memory Computing Architecture for Hardware Security
Comments: 14 pages, 18 figures, 4 tables, submitted to the IEEE Transactions on Information Forensics and Security Journal
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[189]  arXiv:2205.11935 [pdf, other]
Title: CryptoTL: Private, Efficient and Secure Transfer Learning
Subjects: Cryptography and Security (cs.CR)
[190]  arXiv:2205.12064 [pdf, other]
Title: Process Mining Algorithm for Online Intrusion Detection System
Comments: International Conference on Software Testing, Machine Learning and Complex Process Analysis
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2205.12094 [pdf, other]
Title: Towards Better Privacy-preserving Electronic Voting System
Subjects: Cryptography and Security (cs.CR)
[192]  arXiv:2205.12311 [pdf, other]
Title: Fast & Furious: Modelling Malware Detection as Evolving Data Streams
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2205.12352 [pdf, other]
Title: Image Based Password Authentication System
Subjects: Cryptography and Security (cs.CR)
[194]  arXiv:2205.12424 [pdf, other]
Title: VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Comments: Accepted as a conference paper at IJCNN 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[195]  arXiv:2205.12568 [pdf, other]
Title: The security of the Coordicide: the implementation and analysis of possible attack vectors
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[196]  arXiv:2205.12569 [pdf, other]
Title: Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[197]  arXiv:2205.12587 [pdf, other]
Title: Deniable Steganography
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[198]  arXiv:2205.12709 [pdf, other]
Title: VeriFi: Towards Verifiable Federated Unlearning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[199]  arXiv:2205.12713 [pdf, other]
Title: jTrans: Jump-Aware Transformer for Binary Code Similarity
Comments: In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[200]  arXiv:2205.12742 [pdf, other]
Title: SoK: Hardware-supported Trusted Execution Environments
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[ total of 395 entries: 1-25 | ... | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | ... | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2302, contact, help  (Access key information)