We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 225

[ total of 395 entries: 1-25 | ... | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | ... | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]
[226]  arXiv:2205.14371 [pdf, other]
Title: GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code
Comments: arXiv admin note: text overlap with arXiv:1907.07159 by other authors
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[227]  arXiv:2205.14498 [pdf, other]
Title: Towards a Security Stress-Test for Cloud Configurations
Comments: Conference: The IEEE International Conference on Cloud Computing (CLOUD) 2022
Subjects: Cryptography and Security (cs.CR)
[228]  arXiv:2205.14576 [pdf, other]
Title: Problem-Space Evasion Attacks in the Android OS: a Survey
Subjects: Cryptography and Security (cs.CR)
[229]  arXiv:2205.14611 [pdf, ps, other]
Title: Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications
Subjects: Cryptography and Security (cs.CR)
[230]  arXiv:2205.14697 [pdf, other]
Title: Evaluating Automated Driving Planner Robustness against Adversarial Influence
Comments: To appear at the 2022 Workshop on Deception Against Planning Systems and Planning in Adversarial Conditions (DAPSPAC)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[231]  arXiv:2205.14759 [pdf, other]
Title: Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[232]  arXiv:2205.14806 [pdf, ps, other]
Title: Data Trust and IoT
Authors: Mayra Samaniego
Subjects: Cryptography and Security (cs.CR)
[233]  arXiv:2205.14940 [pdf, other]
Title: Detecting Unknown DGAs without Context Information
Comments: Accepted at The 17th International Conference on Availability, Reliability and Security (ARES 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234]  arXiv:2205.15037 [pdf, other]
Title: Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance
Comments: The codes used for the analyses presented in the paper will be made available online only after the manuscript is accepted for publication at any conference/journal
Subjects: Cryptography and Security (cs.CR)
[235]  arXiv:2205.15202 [pdf, other]
Title: A Small Leak Will Sink Many Ships: Vulnerabilities Related to Mini Programs Permissions
Subjects: Cryptography and Security (cs.CR)
[236]  arXiv:2205.15359 [pdf, other]
Title: CTR: Checkpoint, Transfer, and Restore for Secure Enclaves
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[237]  arXiv:2205.15444 [pdf, other]
Title: Integrity Authentication in Tree Models
Subjects: Cryptography and Security (cs.CR)
[238]  arXiv:2205.15545 [pdf, other]
Title: Rethinking Block Storage Encryption with Virtual Disks
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[239]  arXiv:2205.15915 [pdf, ps, other]
Title: IFCIL: An Information Flow Configuration Language for SELinux (Extended Version)
Comments: Extended version of the paper "IFCIL: An Information Flow Configuration Language for SELinux"
Subjects: Cryptography and Security (cs.CR)
[240]  arXiv:2205.15944 [pdf, other]
Title: Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Comments: To appear in European Symposium on Research in Computer Security (ESORICS) 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[241]  arXiv:2205.00047 (cross-list from cs.LG) [pdf, other]
Title: Logically Consistent Adversarial Attacks for Soft Theorem Provers
Comments: IJCAI-ECAI 2022
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[242]  arXiv:2205.00107 (cross-list from cs.LG) [pdf, ps, other]
Title: Bridging Differential Privacy and Byzantine-Robustness via Model Aggregation
Authors: Heng Zhu, Qing Ling
Comments: IJCAI-ECAI 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[243]  arXiv:2205.00361 (cross-list from cs.LG) [pdf, other]
Title: Combined Learning of Neural Network Weights for Privacy in Collaborative Tasks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[244]  arXiv:2205.00436 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Multivariate Time Series Forecasting of Aggregated Human Mobility With Deep Learning: Input or Gradient Perturbation?
Comments: Final version accepted in the journal Neural Computing and Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[245]  arXiv:2205.00807 (cross-list from cs.LG) [pdf, other]
Title: Deep-Attack over the Deep Reinforcement Learning
Comments: Accepted to Knowledge-Based Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[246]  arXiv:2205.01184 (cross-list from cs.LG) [pdf, other]
Title: Performance Weighting for Robust Federated Learning Against Corrupted Sources
Comments: 27 pages, 40 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[247]  arXiv:2205.01432 (cross-list from cs.LG) [pdf, other]
Title: ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[248]  arXiv:2205.01533 (cross-list from cs.IT) [pdf, other]
Title: Average Age of Information Minimization in Reliable Covert Communication on Time-Varying Channels
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[249]  arXiv:2205.01556 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy Amplification via Random Participation in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[250]  arXiv:2205.01625 (cross-list from cs.NE) [pdf, other]
Title: Toward Robust Spiking Neural Network Against Adversarial Perturbation
Subjects: Neural and Evolutionary Computing (cs.NE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 395 entries: 1-25 | ... | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | ... | 376-395 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)