We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in May 2022, skipping first 75

[ total of 395 entries: 1-100 | 76-175 | 176-275 | 276-375 | 376-395 ]
[ showing 100 entries per page: fewer | more | all ]
[76]  arXiv:2205.04330 [pdf, other]
Title: Protecting Data from all Parties: Combining FHE and DP in Federated Learning
Comments: 21 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[77]  arXiv:2205.04405 [pdf, other]
Title: Self-Serviced IoT: Practical and Private IoT Computation Offloading with Full User Control
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2205.04410 [pdf, ps, other]
Title: Tight Differential Privacy Blanket for Shuffle Model
Comments: Extended Abstract
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2205.04662 [pdf, other]
Title: SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2205.04685 [pdf, other]
Title: DNS based In-Browser Cryptojacking Detection
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81]  arXiv:2205.04774 [pdf, ps, other]
Title: Automorphism Shuffles for Graphs and Hypergraphs and Its Applications
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[82]  arXiv:2205.04775 [pdf, other]
Title: SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2205.04961 [pdf, other]
Title: Privadome: Protecting Citizen Privacy from Delivery Drones
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2205.05028 [pdf, other]
Title: A Tale of Two Markets: Investigating the Ransomware Payments Economy
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2205.05095 [pdf, other]
Title: Design and Implementation of a Secure RISC-V Microprocessor
Comments: Submitted to IEEE for possible publication. Copyright may be transferred. This version may no longer be accessible
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Systems and Control (eess.SY)
[86]  arXiv:2205.05121 [pdf, other]
Title: Detecting Phishing sites Without Visiting them
Comments: arXiv admin note: text overlap with arXiv:2009.11116, arXiv:2103.12739 by other authors
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2205.05413 [pdf, other]
Title: Compact and Efficient KEMs over NTRU Lattices
Subjects: Cryptography and Security (cs.CR)
[88]  arXiv:2205.05439 [pdf, other]
Title: Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Journal-ref: 30th USENIX Security Symposium (USENIX Security 21), 2021, pages 3165-3182, ISBN 978-1-939133-24-3
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[89]  arXiv:2205.05473 [pdf, other]
Title: The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources
Journal-ref: 30th USENIX Security Symposium (USENIX Security 21), 2021, pages 3147-3164, ISBN 978-1-939133-24-3
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2205.05573 [pdf, other]
Title: A Longitudinal Study of Cryptographic API: a Decade of Android Malware
Comments: Fix processing time data
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2205.05594 [pdf, ps, other]
Title: Delay Encryption by Cubing
Comments: 30 pages
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2205.05611 [pdf, other]
Title: Blockchain-based Secure Client Selection in Federated Learning
Comments: IEEE ICBC 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93]  arXiv:2205.05628 [pdf, other]
Title: Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification
Comments: Paper is 15 pages and has 10 figures. Published in IEEE Transactions on Artificial Intelligence (this https URL). For associated dataset, see this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94]  arXiv:2205.05747 [pdf, other]
Title: Trusted Container Extensions for Container-based Confidential Computing
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2205.05825 [pdf, other]
Title: Privacy-Preserving Distributed Machine Learning Made Faster
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[96]  arXiv:2205.05847 [pdf, other]
Title: Zero-Knowledge Authentication
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:2205.06064 [pdf, other]
Title: Stalloris: RPKI Downgrade Attack
Journal-ref: 31th USENIX Security Symposium (USENIX Security 22), 2022
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[98]  arXiv:2205.06085 [pdf, other]
Title: From IP to transport and beyond: cross-layer attacks against applications
Journal-ref: SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 Conference, August 2021, Pages 836-849
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2205.06091 [pdf, other]
Title: Synergia: Hardening High-Assurance Security Systems with Confidential and Trusted Computing
Journal-ref: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, SAC 2022
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2205.06114 [pdf, other]
Title: Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
Journal-ref: WiSec 2022: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[101]  arXiv:2205.06177 [pdf, ps, other]
Title: Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[102]  arXiv:2205.06361 [pdf, other]
Title: Building A Trusted Execution Environment for In-Storage Computing
Comments: Extended abstract for IceClave. arXiv admin note: substantial text overlap with arXiv:2109.03373
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[103]  arXiv:2205.06401 [pdf, other]
Title: PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning
Comments: USENIX Security Symposium, 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[104]  arXiv:2205.06415 [pdf, other]
Title: A Comprehensive Benchmark Suite for Intel SGX
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[105]  arXiv:2205.06437 [pdf, other]
Title: Impala: Low-Latency, Communication-Efficient Private Deep Learning Inference
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2205.06504 [pdf, other]
Title: DualCF: Efficient Model Extraction Attack from Counterfactual Explanations
Comments: in Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency (FAccT '22), June 21-24, 2022, Seoul, Republic of Korea
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[107]  arXiv:2205.06506 [pdf, other]
Title: Collaborative Drug Discovery: Inference-level Data Protection Perspective
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[108]  arXiv:2205.06567 [pdf, other]
Title: Millimeter-Wave Automotive Radar Spoofing
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2205.06641 [pdf, other]
Title: Privacy Preserving Release of Mobile Sensor Data
Comments: 12 pages, 10 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2205.06661 [pdf, other]
Title: FLAD: Adaptive Federated Learning for DDoS Attack Detection
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2205.06719 [pdf, ps, other]
Title: dewolf: Improving Decompilation by leveraging User Surveys
Subjects: Cryptography and Security (cs.CR)
[112]  arXiv:2205.06720 [pdf, other]
Title: On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[113]  arXiv:2205.06837 [pdf, other]
Title: Strategic Latency Reduction in Blockchain Peer-to-Peer Networks
Journal-ref: Proc. ACM Meas. Anal. Comput. Syst. 7, 2, Article 32 (June 2023), 33 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Networking and Internet Architecture (cs.NI)
[114]  arXiv:2205.06918 [pdf, other]
Title: Representation learning with function call graph transformations for malware open set recognition
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[115]  arXiv:2205.06986 [pdf, other]
Title: Evaluating Membership Inference Through Adversarial Robustness
Comments: Accepted by The Computer Journal. Pre-print version
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2205.06992 [pdf, other]
Title: Verifying Neural Networks Against Backdoor Attacks
Authors: Long H. Pham, Jun Sun
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117]  arXiv:2205.07054 [pdf, ps, other]
Title: CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types
Comments: 11 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2205.07112 [pdf, ps, other]
Title: FROG: Forward-Secure Post-Quantum Signature
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2205.07323 [pdf, ps, other]
Title: Attack vs Benign Network Intrusion Traffic Classification
Authors: M. Andrecut
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2205.07411 [pdf, other]
Title: Phishing Detection Leveraging Machine Learning and Deep Learning: A Review
Comments: Paper accepted for publication at IEEE Security & Privacy
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2205.07478 [pdf, other]
Title: Estimating Patch Propagation Times across (Blockchain) Forks
Comments: A short version of this paper will appear at FC23
Subjects: Cryptography and Security (cs.CR)
[122]  arXiv:2205.07590 [pdf, other]
Title: Metaverse: Security and Privacy Issues
Comments: The 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS'21)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[123]  arXiv:2205.07759 [pdf, ps, other]
Title: Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2205.08043 [pdf, ps, other]
Title: Explainable and Optimally Configured Artificial Neural Networks for Attack Detection in Smart Homes
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[125]  arXiv:2205.08071 [pdf, other]
Title: How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy
Comments: to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2205.08087 [pdf, other]
Title: An Empirical Study of Blockchain Repositories in GitHub
Comments: The International Conference on Evaluation and Assessment in Software Engineering 2022 (EASE 2022)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2205.08252 [pdf, other]
Title: An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots
Comments: Submitted to WISE 2020 Conference
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2205.08265 [pdf, other]
Title: A two-steps approach to improve the performance of Android malware detectors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[129]  arXiv:2205.08287 [pdf, other]
Title: Bankrupting DoS Attackers
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
[130]  arXiv:2205.08305 [pdf, other]
Title: A Study of the Attention Abnormality in Trojaned BERTs
Comments: NAACL-HLT 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[131]  arXiv:2205.08345 [pdf, other]
Title: A compartmental model for cyber-epidemics
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2205.08371 [pdf, ps, other]
Title: Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[133]  arXiv:2205.08425 [pdf, other]
Title: Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2205.08426 [pdf, other]
Title: Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels
Comments: 13 pages, 7 figures, 9 tables, Poster presented at wisec'22
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[135]  arXiv:2205.08440 [pdf, other]
Title: Moving Smart Contracts -- A Privacy Preserving Method for Off-Chain Data Trust
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA); Software Engineering (cs.SE)
[136]  arXiv:2205.08443 [pdf, other]
Title: On the (In)security of Peer-to-Peer Decentralized Machine Learning
Comments: IEEE S&P'23 (Previous title: "On the Privacy of Decentralized Machine Learning") + Fixed error in neighbors-discovery trick
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[137]  arXiv:2205.08462 [pdf, ps, other]
Title: Privacy Preserving Machine Learning for Electric Vehicles: A Survey
Comments: Submitted to Journal
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2205.08529 [pdf, other]
Title: F3B: A Low-Overhead Blockchain Architecture with Per-Transaction Front-Running Protection
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2205.08587 [pdf, other]
Title: Physical Unclonable Functions (PUF) for IoT Devices
Comments: 21 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2205.08778 [pdf, other]
Title: Accuracy Enhancement for Ear Acoustic Authentication Using Between-class Features
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2205.08821 [pdf, other]
Title: Lessons Learned: Defending Against Property Inference Attacks
Authors: Joshua Stock (1), Jens Wettlaufer, Daniel Demmler (1), Hannes Federrath (1) ((1) Universität Hamburg)
Journal-ref: Proceedings of the 20th International Conference on Security and Cryptography SECRYPT (2023) 312-323
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[142]  arXiv:2205.08852 [pdf, other]
Title: BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[143]  arXiv:2205.08858 [pdf, other]
Title: Tight Differential Privacy Guarantees for the Shuffle Model with $k$-Randomized Response
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2205.08890 [pdf, other]
Title: Analysing and strengthening OpenWPM's reliability
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:2205.08944 [pdf, other]
Title: SoK: The Impact of Unlabelled Data in Cyberthreat Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[146]  arXiv:2205.08968 [pdf, other]
Title: Monitoring Security of Enterprise Hosts via DNS Data Analysis
Authors: Jawad Ahmed
Comments: PhD thesis, 165 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[147]  arXiv:2205.09005 [pdf, other]
Title: Confidential Machine Learning within Graphcore IPUs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR)
[148]  arXiv:2205.09020 [pdf, ps, other]
Title: Toward Timed-Release Encryption in Web3 An Efficient Dual-Purpose Proof-of-Work Consensus
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:2205.09026 [pdf, other]
Title: VLC Physical Layer Security through RIS-aided Jamming Receiver for 6G Wireless Networks
Journal-ref: 2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2205.09097 [pdf, ps, other]
Title: The security strength of Blockchain technology : A Survey Report
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2205.09167 [pdf, other]
Title: Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution
Comments: 9 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[152]  arXiv:2205.09170 [pdf, other]
Title: Adaptive Hybrid Heterogeneous IDS for 6LoWPAN
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2205.09199 [pdf, other]
Title: A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
Comments: ACM CPSS'22
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[154]  arXiv:2205.09230 [pdf, other]
Title: ExploitWP2Docker: a Platform for Automating the Generation of Vulnerable WordPress Environments for Cyber Ranges
Comments: 7 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2205.09453 [pdf, other]
Title: Differential Privacy: What is all the noise about?
Authors: Roxana Danger
Comments: 27 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[156]  arXiv:2205.09493 [pdf, other]
Title: Dockerized Android: a container-based platform to build mobile Android scenarios for Cyber Ranges
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2205.09522 [pdf, ps, other]
Title: Defending Against Adversarial Attacks by Energy Storage Facility
Comments: 5 pages, 5 main figures. Published in PESGM 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[158]  arXiv:2205.09524 [pdf, other]
Title: Security Analysis of DeFi: Vulnerabilities, Attacks and Advances
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2205.09635 [pdf, other]
Title: BP-MAC: Fast Authentication for Short Messages
Comments: ACM WiSec'22
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2205.09669 [pdf, other]
Title: Semi-WTC: A Practical Semi-supervised Framework for Attack Categorization through Weight-Task Consistency
Comments: Tech report
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[161]  arXiv:2205.09730 [pdf, other]
Title: Dissemination Control in Dynamic Data Clustering For Dense IIoT Against False Data Injection Attack
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[162]  arXiv:2205.09892 [pdf, other]
Title: Obfuscating the Hierarchy of a Digital IP
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[163]  arXiv:2205.09986 [pdf, other]
Title: SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[164]  arXiv:2205.10159 [pdf, other]
Title: Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness
Subjects: Cryptography and Security (cs.CR)
[165]  arXiv:2205.10174 [pdf, other]
Title: Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web
Comments: Accepted at USENIX Security 2022
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2205.10201 [pdf, other]
Title: On the Decentralization of Blockchain-enabled Asynchronous Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[167]  arXiv:2205.10257 [pdf, other]
Title: Frontrunning Block Attack in PoA Clique: A Case Study
Comments: This work was in part presented at IEEE ICBC 2022
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2205.10292 [pdf, ps, other]
Title: QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer
Comments: 6 pages, conference
Journal-ref: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), Florence, Italy, 2023, pp. 1-6
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2205.10457 [pdf, other]
Title: Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Machine Learning (stat.ML)
[170]  arXiv:2205.10580 [pdf, other]
Title: Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2205.10591 [pdf, other]
Title: Multiplierless Design of Very Large Constant Multiplications in Cryptography
Subjects: Cryptography and Security (cs.CR)
[172]  arXiv:2205.10608 [pdf, other]
Title: Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Comments: This work has been accepted for publication at the ACM SIGSAC Conference on Computer and Communications Security (CCS 22)
Journal-ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (November 2022) Pages 3363 to 3365
Subjects: Cryptography and Security (cs.CR)
[173]  arXiv:2205.10686 [pdf, ps, other]
Title: Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Journal-ref: 2022 ACM Conference on Computer and Communications Security (CCS)
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2205.10695 [pdf, ps, other]
Title: Evaluation of User Perception on Biometric Fingerprint System
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[175]  arXiv:2205.10848 [pdf, other]
Title: Robust Quantity-Aware Aggregation for Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[ total of 395 entries: 1-100 | 76-175 | 176-275 | 276-375 | 376-395 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)