We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022

[ total of 374 entries: 1-374 ]
[ showing 374 entries per page: fewer | more ]
[1]  arXiv:2206.00101 [pdf, other]
Title: MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[2]  arXiv:2206.00145 [pdf, other]
Title: CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Comments: 11pages,7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2206.00216 [pdf, other]
Title: THE-X: Privacy-Preserving Transformer Inference with Homomorphic Encryption
Comments: Findings of ACL 2022
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[4]  arXiv:2206.00219 [pdf, ps, other]
Title: Inter-BIN: Interaction-based Cross-architecture IoT Binary Similarity Comparison
Comments: Accepted by IEEE Internet of Things Journal,15 pages, 11 figures and 8 tables
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2206.00240 [pdf, other]
Title: Privacy for Free: How does Dataset Condensation Help Privacy?
Comments: Accepted by ICML 2022 as Oral
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[6]  arXiv:2206.00279 [pdf, other]
Title: Defensive Design of Saturating Counters Based on Differential Privacy
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)
[7]  arXiv:2206.00288 [pdf, ps, other]
Title: Sustaining Security and Safety in ICT: A Quest for Terminology, Objectives, and Limits
Journal-ref: LIMITS '22: Workshop on Computing within Limits, June 21--22, 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[8]  arXiv:2206.00322 [pdf, other]
Title: Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
Comments: 15 pages, 6 figures
Journal-ref: In Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22), Association for Computing Machinery, New York, NY, USA, pages 252-266
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[9]  arXiv:2206.00325 [pdf]
Title: LDoS attack detection method based on traffic time-frequency characteristics
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[10]  arXiv:2206.00375 [pdf, other]
Title: Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2206.00385 [pdf, other]
Title: Mining Function Homology of Bot Loaders from Honeypot Logs
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2206.00402 [pdf, other]
Title: NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks
Comments: The definitive Version of Record will be Published in the 2022 International Joint Conference on Neural Networks (IJCNN)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13]  arXiv:2206.00477 [pdf, other]
Title: Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations
Comments: Accepted by IJCAI 2022
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2206.00539 [pdf, other]
Title: Privacy-Preserving Epidemiological Modeling on Mobile Graphs
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[15]  arXiv:2206.00592 [pdf, other]
Title: Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2206.00716 [pdf, other]
Title: Not so immutable: Upgradeability of Smart Contracts on Ethereum
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2206.00921 [pdf, other]
Title: A Scalable Shannon Entropy Estimator
Comments: 24 pages, 1 figure, A preliminary version of this work appears at CAV, 2022
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Information Theory (cs.IT)
[18]  arXiv:2206.01028 [pdf, other]
Title: Impact of Sampling on Locally Differentially Private Data Collection
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2206.01041 [pdf, other]
Title: End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs
Authors: Gianluca Scopelliti (1 and 2), Sepideh Pouyanrad (2), Job Noorman (2), Fritz Alder (2), Christoph Baumann (1), Frank Piessens (2), Jan Tobias Mühlberg (2) ((1) Ericsson AB, Sweden, (2) KU Leuven, Belgium)
Comments: 40 pages, submitted to ACM Transactions on Privacy and Security, first co-authorship between Gianluca Scopelliti and Sepideh Pouyanrad, source code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2206.01121 [pdf, other]
Title: The Loop of the Rings: A Distributed Cooperative System
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2206.01314 [pdf]
Title: A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
Journal-ref: https://airccse.org/journal/ijc2022.html
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2206.01832 [pdf, other]
Title: Kallima: A Clean-label Framework for Textual Backdoor Attacks
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[23]  arXiv:2206.01919 [pdf, other]
Title: Leveraging Machine Learning for Ransomware Detection
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2206.01956 [pdf, other]
Title: Multi-Party Computation in IoT for Privacy-Preservation
Comments: Accepted in 42nd IEEE International Conference on Distributed Computing Systems (ICDCS), 2022, Bologna, Italy
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2206.02060 [pdf, other]
Title: A privacy preserving querying mechanism with high utility for electric vehicles
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2206.02156 [pdf, other]
Title: Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter
Comments: 18 pages, 5 figures, submitted to Computers & Security
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2206.02248 [pdf, other]
Title: LNGate$^2$: Secure Bidirectional IoT Micro-payments using Bitcoin's Lightning Network and Threshold Cryptography
Comments: Journal extension of this https URL arXiv admin note: substantial text overlap with arXiv:2105.08902
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2206.02285 [pdf, other]
Title: Story Beyond the Eye: Glyph Positions Break PDF Text Redaction
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2206.02384 [pdf, other]
Title: Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2206.02443 [pdf]
Title: Spam Detection Using BERT
Comments: 6 pages, 8 figures and 2 tabels
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2206.02541 [pdf]
Title: PCPT and ACPT: Copyright Protection and Traceability Scheme for DNN Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[32]  arXiv:2206.02602 [pdf, other]
Title: LIN-MM: Multiplexed Message Authentication Code for Local Interconnect Network message authentication in road vehicles
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2206.02603 [pdf, other]
Title: CAN-MM: Multiplexed Message Authentication Code for Controller Area Network message authentication in road vehicles
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2206.02658 [pdf, other]
Title: Longitudinal Analysis of Privacy Labels in the Apple App Store
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2206.02733 [pdf, other]
Title: Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review
Journal-ref: International Conference On Secure Knowledge Management In Artificial Intelligence Era. Springer, Cham, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[36]  arXiv:2206.02760 [pdf]
Title: Blockchain for the Cybersecurity of Smart City Applications
Comments: 65 pages, 6 figures, 37 tables
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2206.02852 [pdf, other]
Title: CompartOS: CHERI Compartmentalization for Embedded Systems
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2206.02894 [pdf, other]
Title: ASAP: Reconciling Asynchronous Real-Time Operations and Proofs of Execution in Simple Embedded Systems
Comments: 2022 59th ACM/IEEE Design Automation Conference (DAC)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[39]  arXiv:2206.03079 [pdf, other]
Title: An Empirical Study of IoT Security Aspects at Sentence-Level in Developer Textual Discussions
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[40]  arXiv:2206.03265 [pdf, other]
Title: Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41]  arXiv:2206.03391 [pdf]
Title: Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[42]  arXiv:2206.03419 [pdf, other]
Title: A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain
Journal-ref: IEEE Transactions on Industrial Informatics 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[43]  arXiv:2206.03445 [pdf, other]
Title: Timed automata as a formalism for expressing security: A survey on theory and practice
Comments: This is the author version of the manuscript of the same name published in ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[44]  arXiv:2206.03481 [pdf, other]
Title: Topos: A Secure, Trustless, and Decentralized Interoperability Protocol
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[45]  arXiv:2206.03488 [pdf, other]
Title: Towards Practical Differential Privacy in Data Analysis: Understanding the Effect of Epsilon on Utility in Private ERM
Comments: 16 pages,4 figures,2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[46]  arXiv:2206.03492 [pdf, other]
Title: A Privacy-Preserving Subgraph-Level Federated Graph Neural Network via Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[47]  arXiv:2206.03581 [pdf, other]
Title: Compromised account detection using authorship verification: a novel approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[48]  arXiv:2206.03582 [pdf, other]
Title: Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
Comments: This is the extended version of a paper to appear at CAV 2022
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[49]  arXiv:2206.03583 [pdf, other]
Title: Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[50]  arXiv:2206.03584 [pdf]
Title: White-box Membership Attack Against Machine Learning Based Retinopathy Classification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[51]  arXiv:2206.03585 [pdf, other]
Title: XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions
Comments: Submitted to peer review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[52]  arXiv:2206.03623 [pdf, other]
Title: Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2206.03745 [pdf, other]
Title: Probing for Passwords -- Privacy Implications of SSIDs in Probe Requests
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2206.03776 [pdf, ps, other]
Title: Circuit Privacy and Novel Protocols for Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2206.03780 [pdf, other]
Title: Attestation Mechanisms for Trusted Execution Environments Demystified
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197. arXiv admin note: substantial text overlap with arXiv:2204.06790
Journal-ref: DAIS'22: Proceedings of the 22nd IFIP International Conference on Distributed Applications and Interoperable Systems, June 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[56]  arXiv:2206.03838 [pdf, other]
Title: Efficient reversible data hiding via two layers of double-peak embedding
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2206.03867 [pdf]
Title: Blockchain-enabled supply chain: An experimental study
Comments: 13 pages, 15 figures, 10 tables
Journal-ref: Computers and Industrial Engineering, 136 (2019), 57-69
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2206.03905 [pdf, other]
Title: To remove or not remove Mobile Apps? A data-driven predictive model approach
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2206.03930 [pdf, other]
Title: "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[60]  arXiv:2206.04049 [pdf, other]
Title: Hypersyn: A Peer-to-Peer System for Mutual Credit
Authors: Lum Ramabaja
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2206.04055 [pdf, other]
Title: Gradient Obfuscation Gives a False Sense of Security in Federated Learning
Comments: Accepted by USENIX Security 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[62]  arXiv:2206.04123 [pdf, ps, other]
Title: A Framework for Building Secure, Scalable, Networked Enclaves
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2206.04141 [pdf]
Title: Role of Blockchain in Revolutionizing Online Transactional Security
Authors: Rishav Kumar
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2206.04185 [pdf, other]
Title: A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools
Comments: 14 pages, ACM IMC 2022
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2206.04236 [pdf, other]
Title: Analytical Composition of Differential Privacy via the Edgeworth Accountant
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[66]  arXiv:2206.04489 [pdf, ps, other]
Title: Holistic Verification of Blockchain Consensus
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Formal Languages and Automata Theory (cs.FL)
[67]  arXiv:2206.04507 [pdf, other]
Title: Software Mitigation of RISC-V Spectre Attacks
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[68]  arXiv:2206.04572 [pdf, other]
Title: Log-Concave and Multivariate Canonical Noise Distributions for Differential Privacy
Comments: 10 pages before references, 1 Figure
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[69]  arXiv:2206.04621 [pdf, ps, other]
Title: A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning
Comments: ACM Computing Surveys (to appear)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2206.04677 [pdf, other]
Title: Can Backdoor Attacks Survive Time-Varying Models?
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[71]  arXiv:2206.04754 [pdf, other]
Title: AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking
Comments: arXiv admin note: text overlap with arXiv:2007.10512
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2206.04793 [pdf]
Title: Securing AI-based Healthcare Systems using Blockchain Technology: A State-of-the-Art Systematic Literature Review and Future Research Directions
Comments: 44 Pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[73]  arXiv:2206.04803 [pdf, other]
Title: Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application of Machine Learning-based Forensics
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[74]  arXiv:2206.04823 [pdf, other]
Title: Membership Inference via Backdooring
Comments: This paper has been accepted by IJCAI-22
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2206.04881 [pdf, other]
Title: Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[76]  arXiv:2206.04911 [pdf, ps, other]
Title: NSSIA: A New Self-Sovereign Identity Scheme with Accountability
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2206.04947 [pdf, other]
Title: Semantic Technology based Usage Control for Decentralized Systems
Authors: Ines Akaichi
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Logic in Computer Science (cs.LO); Systems and Control (eess.SY)
[78]  arXiv:2206.05091 [pdf, other]
Title: Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[79]  arXiv:2206.05276 [pdf, other]
Title: Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion
Authors: Yinan Hu, Quanyan Zhu
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); Systems and Control (eess.SY)
[80]  arXiv:2206.05359 [pdf, other]
Title: Blades: A Simulator for Attacks and Defenses in Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[81]  arXiv:2206.05438 [pdf, other]
Title: Guaranteeing Timed Opacity using Parametric Timed Model Checking
Comments: This is the author version of the manuscript of the same name published in ACM Transactions on Software Engineering and Methodology (ToSEM). This work is partially supported by the ANR national research program PACS (ANR-14-CE28-0002), by the ANR-NRF research program ProMiS (ANR-19-CE25-0015), and by ERATO HASUO Metamathematics for Systems Design Project (No. JPMJER1603), JST. arXiv admin note: substantial text overlap with arXiv:1907.00537
Journal-ref: ACM Transactions on Software Engineering and Methodology (ToSEM), Volume 31(4), 2022
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[82]  arXiv:2206.05565 [pdf]
Title: NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[83]  arXiv:2206.05679 [pdf, other]
Title: Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2206.05735 [pdf, other]
Title: Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2206.05821 [pdf, other]
Title: RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis
Comments: This extended abstract is 2 pages containing 2 Figures. This abstract was presented at the 2022 Non-Volatile Memories Workshop (NVMW'22) and the full paper was published at ASPLOS 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[86]  arXiv:2206.06010 [pdf, other]
Title: Constant-Round Linear-Broadcast Secure Computation with Penalties
Comments: 32 pages
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2206.06019 [pdf, other]
Title: SBvote: Scalable Self-Tallying Blockchain-Based Voting
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[88]  arXiv:2206.06027 [pdf, ps, other]
Title: Adversarial Models Towards Data Availability and Integrity of Distributed State Estimation for Industrial IoT-Based Smart Grid
Comments: 11 pages (DC), Journal manuscript
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2206.06256 [pdf]
Title: On the impact of dataset size and class imbalance in evaluating machine-learning-based windows malware detection techniques
Authors: David Illes
Comments: Project report for my MSc project at The Open University originally submitted to obtain an MSc in Cyber Security
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[90]  arXiv:2206.06261 [pdf, other]
Title: An Application of Nodal Curves
Comments: arXiv admin note: substantial text overlap with arXiv:1904.03978
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Number Theory (math.NT)
[91]  arXiv:2206.06274 [pdf, other]
Title: Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2206.06457 [pdf]
Title: A Privacy Glossary for Cloud Computing
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2206.06493 [pdf, other]
Title: A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study
Comments: 35 pages
Subjects: Cryptography and Security (cs.CR); Econometrics (econ.EM)
[94]  arXiv:2206.06669 [pdf, other]
Title: Snakes and Ladder Logic: PLC-VBS, a PLC Control Logic Vulnerability Discovery Tool
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2206.06670 [pdf]
Title: PROACT: Parallel Multi-Miner Proof of Accumulated Trust Protocol for Internet of Drones
Authors: Khaleel Mershad
Comments: 45 pages, 9 Figures, 2 Tables, accepted for publication at Elsevier Vehicular Communications Journal
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[96]  arXiv:2206.06925 [pdf]
Title: Towards a secured smart IoT using light weight blockchain: An aim to secure Pharmacy Products
Authors: Md. Faruk Abdullah Al Sohan (Department of Computer Science, American International University-Bangladesh), Samiur Rahman Khan (Department of Computer Science, American International University-Bangladesh), Nusrat Jahan Anannya (Department of Computer Science, American International University-Bangladesh), Md Taimur Ahad (Department of Computer Science, American International University-Bangladesh)
Comments: 9 pages 3 figures
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:2206.06934 [pdf, other]
Title: A Layered Reference Model for Penetration Testing with Reinforcement Learning and Attack Graphs
Authors: Tyler Cody
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[98]  arXiv:2206.06938 [pdf, other]
Title: Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2206.07009 [pdf, other]
Title: Private Set Matching Protocols
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2206.07012 [pdf, other]
Title: Frequency Throttling Side-Channel Attack
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2206.07019 [pdf, other]
Title: An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2206.07164 [pdf, other]
Title: Edge Security: Challenges and Issues
Comments: 21 pages. Survey paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2206.07215 [pdf, other]
Title: SPENDER: A Platform for Secure and Privacy-Preserving Decentralized P2P E-Commerce
Comments: 9 pages, 2 figures, preprint
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[104]  arXiv:2206.07220 [pdf, other]
Title: Towards Verifiable Differentially-Private Polling
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2206.07248 [pdf]
Title: Blockchain based Secure Energy Marketplace Scheme to Motivate P2P Microgrids
Comments: Accepted to be published in the International Journal of Informatics and Communication Technology (IJ-ICT)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[106]  arXiv:2206.07321 [pdf, other]
Title: Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Comments: 13 pages, 6 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2108.13952
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107]  arXiv:2206.07323 [pdf, other]
Title: A Continuous Risk Assessment Methodology for Cloud Infrastructures
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2206.07329 [pdf, ps, other]
Title: Application-Oriented Selection of Privacy Enhancing Technologies
Journal-ref: Annual Privacy Forum. Springer, Cham, 2022. S. 75-87
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2206.07418 [pdf, other]
Title: Designing a Provenance Analysis for SGX Enclaves
Comments: 16 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2206.07429 [pdf, other]
Title: Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting
Comments: 34 pages, 5 figures
Journal-ref: SN COMPUT. SCI. 3, 334 (2022)
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2206.07507 [pdf, other]
Title: YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
Comments: This paper was published in the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria, ACM
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[112]  arXiv:2206.07581 [pdf]
Title: Learn to Adapt: Robust Drift Detection in Security Domain
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2206.07895 [pdf, other]
Title: Dual-channel Early Warning Framework for Ethereum Ponzi Schemes
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2206.07910 [pdf, ps, other]
Title: Introducing the Huber mechanism for differentially private low-rank matrix completion
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[115]  arXiv:2206.07998 [pdf, other]
Title: Differentially Private Multi-Party Data Release for Linear Regression
Comments: UAI 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116]  arXiv:2206.08004 [pdf, other]
Title: When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117]  arXiv:2206.08132 [pdf, other]
Title: Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[118]  arXiv:2206.08260 [pdf, other]
Title: Adversarial Robustness of Graph-based Anomaly Detection
Comments: arXiv admin note: substantial text overlap with arXiv:2106.09989
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2206.08396 [pdf, other]
Title: User Customizable and Robust Geo-Indistinguishability for Location Privacy
Comments: Under review
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2206.08565 [pdf, other]
Title: Identifying Counterfeit Products using Blockchain Technology in Supply Chain System
Comments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)
Journal-ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2206.08722 [pdf, other]
Title: WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: ICDCS'22: Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, July 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[122]  arXiv:2206.08821 [pdf, other]
Title: Exploring Web3 From the View of Blockchain
Comments: Tech Report 2022
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2206.09009 [pdf, other]
Title: Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Comments: Accepted at IEEE Network Magazine, 8 pages. arXiv admin note: substantial text overlap with arXiv:2109.14263
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[124]  arXiv:2206.09011 [pdf, other]
Title: Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks
Comments: 12 pages, 12 figures, 13 equations
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2206.09122 [pdf, other]
Title: Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2206.09133 [pdf, other]
Title: Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers
Comments: 10 pages,
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[127]  arXiv:2206.09237 [pdf, other]
Title: Systematic Analysis and Comparison of Security Advice as Datasets
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2206.09272 [pdf, other]
Title: DECK: Model Hardening for Defending Pervasive Backdoors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[129]  arXiv:2206.09388 [pdf, other]
Title: Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition
Comments: Accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE)
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2206.09424 [pdf]
Title: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Comments: 15 pages, 3 figuers, Journal Paper
Journal-ref: Computers, Materials & Continua, 2022
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2206.09428 [pdf]
Title: Reputation, Risk, and Trust on User Adoption of Internet Search Engines: The Case of DuckDuckGo
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[132]  arXiv:2206.09519 [pdf, other]
Title: Walking to Hide: Privacy Amplification via Random Message Exchanges in Network
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2206.09569 [pdf, other]
Title: Shuffle Gaussian Mechanism for Differential Privacy
Comments: Fixed typos. The source code of our implementation is available at this http URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[134]  arXiv:2206.09707 [pdf, other]
Title: The Role of Machine Learning in Cybersecurity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2206.09834 [pdf]
Title: The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2206.09870 [pdf, other]
Title: Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2206.10050 [pdf, ps, other]
Title: Better Incentives for Proof-of-Work
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2206.10112 [pdf, other]
Title: General Framework for Reversible Data Hiding in Texts Based on Masked Language Modeling
Comments: this https URL&hl=en
Journal-ref: IEEE International Workshop on Multimedia Signal Processing (2022)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[139]  arXiv:2206.10272 [pdf, other]
Title: Identification of Attack Paths Using Kill Chain and Attack Graphs
Comments: IEEE/IFIP NOMS 2022 conference, 6 pages
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2206.10334 [pdf, other]
Title: Defending Adversarial Examples by Negative Correlation Ensemble
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[141]  arXiv:2206.10341 [pdf, other]
Title: Neurotoxin: Durable Backdoors in Federated Learning
Comments: Appears in ICML 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[142]  arXiv:2206.10368 [pdf, other]
Title: Real-Time Waveform Matching with a Digitizer at 10 GS/s
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[143]  arXiv:2206.10379 [pdf, other]
Title: Can process mining help in anomaly-based intrusion detection?
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2206.10400 [pdf, other]
Title: Using EBGAN for Anomaly Intrusion Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[145]  arXiv:2206.10413 [pdf, other]
Title: Multilayer Block Models for Exploratory Analysis of Computer Event Logs
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[146]  arXiv:2206.10473 [pdf]
Title: Securing the Future Internet of Things with Post-Quantum Cryptography
Comments: Accepted version
Journal-ref: Security and Privacy 5 (2), e20, 2022
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2206.10525 [pdf, other]
Title: Three-way optimization of privacy and utility of location data
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR)
[148]  arXiv:2206.10685 [pdf, other]
Title: Differentially Private Maximal Information Coefficients
Comments: 38 pages, to appear in ICML 2022
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Methodology (stat.ME)
[149]  arXiv:2206.10746 [pdf]
Title: A Practical Methodology for ML-Based EM Side Channel Disassemblers
Comments: Accepted to the poster section of the 7th IEEE European Symposium on Security and Privacy 2022
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2206.10753 [pdf, other]
Title: Secure and Efficient Query Processing in Outsourced Databases
Authors: Dmytro Bogatov
Comments: Ph.D. thesis
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[151]  arXiv:2206.10835 [pdf, other]
Title: Interpreting Graph-based Sybil Detection Methods as Low-Pass Filtering
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[152]  arXiv:2206.10898 [src]
Title: Q-rMinRank attack: The first quantum approach for key recovery attacks on Rainbow
Comments: The paper has been withdrawn because the research work is still in progress
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2206.10927 [pdf]
Title: Exploration of User Privacy in 802.11 Probe Requests with MAC Address Randomization Using Temporal Pattern Analysis
Comments: 10 pages, 5 figures, submitted to LBS2022 conference
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[154]  arXiv:2206.10963 [pdf, other]
Title: FLaaS: Enabling Practical Federated Learning on Mobile Environments
Comments: 12 pages, 5 figures, 40 references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[155]  arXiv:2206.11024 [pdf, other]
Title: ROSE: A RObust and SEcure DNN Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[156]  arXiv:2206.11133 [pdf, other]
Title: Multi-party Secure Broad Learning System for Privacy Preserving
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2206.11171 [pdf, other]
Title: Attack Techniques and Threat Identification for Vulnerabilities
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[158]  arXiv:2206.11175 [pdf, other]
Title: HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2206.11182 [pdf, other]
Title: Vulnerability Prioritization: An Offensive Security Approach
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[160]  arXiv:2206.11402 [pdf, other]
Title: Optimal Local Bayesian Differential Privacy over Markov Chains
Journal-ref: In AAMAS (pp. 1563-1565) 2022
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2206.11411 [pdf, other]
Title: Linear recurrent cryptography: golden-like cryptography for higher order linear recurrences
Comments: 27 pages, 1 figure
Journal-ref: Discrete Mathematics, Algorithms and Applications, 2022
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Number Theory (math.NT); Spectral Theory (math.SP)
[162]  arXiv:2206.11519 [pdf, other]
Title: Homomorphic Sortition -- Secret Leader Election for Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[163]  arXiv:2206.11586 [pdf, ps, other]
Title: MAGIC: A Method for Assessing Cyber Incidents Occurrence
Comments: 16 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2206.11641 [pdf, other]
Title: Advancing Blockchain-based Federated Learning through Verifiable Off-chain Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[165]  arXiv:2206.11793 [pdf, other]
Title: Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Comments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[166]  arXiv:2206.11821 [pdf, other]
Title: A Survey of DeFi Security: Challenges and Opportunities
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2206.11840 [pdf, other]
Title: Design Exploration and Security Assessment of PUF-on-PUF Implementations
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[168]  arXiv:2206.11961 [pdf, ps, other]
Title: LRPC codes with multiple syndromes: near ideal-size KEMs without ideals
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2206.11974 [pdf, other]
Title: Keep Your Transactions On Short Leashes
Authors: Bennet Yee
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2206.12093 [pdf, ps, other]
Title: An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2206.12224 [pdf, other]
Title: MPClan: Protocol Suite for Privacy-Conscious Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (cs.LG)
[172]  arXiv:2206.12227 [pdf, other]
Title: Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[173]  arXiv:2206.12236 [pdf, other]
Title: Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison
Comments: Accepted by EAI SecureComm 2022, 20 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2206.12251 [pdf]
Title: Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[175]  arXiv:2206.12447 [pdf, other]
Title: XMD: An Expansive Hardware-telemetry based Malware Detector to enhance Endpoint Detection
Subjects: Cryptography and Security (cs.CR)
[176]  arXiv:2206.12770 [pdf]
Title: Malware Detection and Prevention using Artificial Intelligence Techniques
Journal-ref: 2021 IEEE International Conference on Big Data (Big Data)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[177]  arXiv:2206.12790 [src]
Title: APPFLChain: A Privacy Protection Distributed Artificial-Intelligence Architecture Based on Federated Learning and Consortium Blockchain
Comments: We found that the simulation part in section V is not completed. We need to add more experiments to support it
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB); Machine Learning (cs.LG)
[178]  arXiv:2206.12864 [pdf, ps, other]
Title: A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications
Subjects: Cryptography and Security (cs.CR)
[179]  arXiv:2206.12944 [pdf, other]
Title: Don't Look Up: Ubiquitous Data Exfiltration Pathways in Commercial Spaces
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2206.12970 [pdf, ps, other]
Title: Cost-Asymmetric Memory Hard Password Hashing
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2206.13046 [pdf, other]
Title: DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[182]  arXiv:2206.13050 [pdf, other]
Title: Libra: High-Utility Anonymization of Event Logs for Process Mining via Subsampling
Subjects: Cryptography and Security (cs.CR)
[183]  arXiv:2206.13055 [pdf, other]
Title: Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[184]  arXiv:2206.13104 [pdf, other]
Title: Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Graphs
Subjects: Cryptography and Security (cs.CR)
[185]  arXiv:2206.13144 [pdf]
Title: An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory
Subjects: Cryptography and Security (cs.CR)
[186]  arXiv:2206.13172 [pdf, ps, other]
Title: Comment on "Provably secure biometric-based client-server secure communication over unreliable networks"
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2206.13350 [pdf, ps, other]
Title: Intractable Group-theoretic Problems Around Zero-knowledge Proofs
Authors: Cansu Betin Onur
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[188]  arXiv:2206.13358 [pdf, other]
Title: FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks
Subjects: Cryptography and Security (cs.CR)
[189]  arXiv:2206.13594 [pdf, other]
Title: Cyber Network Resilience against Self-Propagating Malware Attacks
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Spectral Theory (math.SP); Applications (stat.AP)
[190]  arXiv:2206.13599 [pdf, other]
Title: Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2206.13614 [pdf, other]
Title: Measuring and Clustering Network Attackers using Medium-Interaction Honeypots
Comments: In Proceedings of the 7th IEEE EuroS&P Workshop on Traffic Measurements for Cybersecurity (WTMC 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[192]  arXiv:2206.13660 [pdf, other]
Title: DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2206.13889 [pdf, other]
Title: Parallel Instance Filtering for Malware Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[194]  arXiv:2206.14076 [pdf, other]
Title: Reasoning about Moving Target Defense in Attack Modeling Formalisms
Subjects: Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[195]  arXiv:2206.14107 [pdf, ps, other]
Title: Special subsets of addresses for blockchains using the secp256k1 curve
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[196]  arXiv:2206.14136 [pdf, other]
Title: Gender Bias in Password Managers
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[197]  arXiv:2206.14304 [pdf, other]
Title: Indistinguishability Obfuscation of Circuits and its Application in Security
Authors: Shilun Li, Zijing Di
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[198]  arXiv:2206.14317 [pdf, ps, other]
Title: Quantitative Verification of Opacity Properties in Security Systems
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2206.14341 [pdf]
Title: CoAP-DoS: An IoT Network Intrusion Dataset
Comments: 6 pages, 8 figures, Publication Title: 2022 6th International Conference on Cryptography, Security and Privacy (CSP), eCF Paper Id: 1641864704381, accepted for publishing, not yet published
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[200]  arXiv:2206.14346 [pdf, other]
Title: A Deep Learning Approach to Create DNS Amplification Attacks
Comments: 12 pages, 6 figures, Conference: to 2022 4th International Conference on Management Science and Industrial Engineering (MSIE) (MSIE 2022), DOI: this https URL, accepted to conference above, not yet published
Subjects: Cryptography and Security (cs.CR)
[201]  arXiv:2206.14519 [pdf, other]
Title: Effect of Auditory Stimuli on Electroencephalography-based Authentication
Subjects: Cryptography and Security (cs.CR)
[202]  arXiv:2206.14539 [pdf, other]
Title: Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
Comments: The 17th International Conference on Availability, Reliability and Security (ARES 2022), 8 pages
Subjects: Cryptography and Security (cs.CR)
[203]  arXiv:2206.14547 [pdf, ps, other]
Title: A Novel Attack to the Permuted Kernel Problem
Subjects: Cryptography and Security (cs.CR)
[204]  arXiv:2206.14560 [pdf, ps, other]
Title: A note on a Code-Based Signature Scheme
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[205]  arXiv:2206.14567 [pdf, other]
Title: Contributions to Context-Aware Smart Healthcare: A Security and Privacy Perspective
Authors: Edgar Batista
Comments: Doctoral thesis
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[206]  arXiv:2206.14782 [pdf, ps, other]
Title: Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices
Subjects: Cryptography and Security (cs.CR)
[207]  arXiv:2206.14977 [pdf, other]
Title: Multiple Targets Directed Greybox Fuzzing
Comments: 14 pages, 5 figures, 10 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[208]  arXiv:2206.14980 [pdf, ps, other]
Title: On the image of an affine subspace under the inverse function within a finite field
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[209]  arXiv:2206.15055 [pdf, other]
Title: Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats
Comments: 23 pages, 3 figures. Presented at the 21st Workshop on the Economics of Information Security (WEIS), 2022, Tulsa, USA
Subjects: Cryptography and Security (cs.CR); Physics and Society (physics.soc-ph)
[210]  arXiv:2206.15068 [pdf, ps, other]
Title: Accountable Private Set Cardinality for Distributed Measurement
Comments: Includes additional appendix over version published in ACM TOPS. 37 pages, 11 figures
Journal-ref: ACM Transactions on Privacy and Security, Vol. 25, No. 4, Article 25. Publication date: May 2022
Subjects: Cryptography and Security (cs.CR)
[211]  arXiv:2206.15089 [pdf, other]
Title: Fairness and Cost Constrained Privacy-Aware Record Linkage
Subjects: Cryptography and Security (cs.CR)
[212]  arXiv:2206.15139 [pdf, other]
Title: Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service
Comments: 35 pages, 18 figures, 7 tables. Data set awarded with Open Data Impact Award 2022 by the German Stifterverband
Journal-ref: ACM Transactions on Privacy and Security, Vol. 26, No. 1 (February 2023). Article No. 6, pp 1-36
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[213]  arXiv:2206.00052 (cross-list from cs.CL) [pdf, other]
Title: CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[214]  arXiv:2206.00071 (cross-list from cs.LG) [pdf, other]
Title: Generative Models with Information-Theoretic Protection Against Membership Inference Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[215]  arXiv:2206.00169 (cross-list from cs.LG) [pdf, other]
Title: Discovering the Hidden Vocabulary of DALLE-2
Comments: 6 pages, 4 figures
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[216]  arXiv:2206.00363 (cross-list from cs.LG) [pdf, ps, other]
Title: Bring Your Own Algorithm for Optimal Differentially Private Stochastic Minimax Optimization
Comments: NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[217]  arXiv:2206.00511 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Shapley Values for Data Evaluation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[218]  arXiv:2206.00513 (cross-list from cs.LG) [pdf, ps, other]
Title: The robust way to stack and bag: the local Lipschitz way
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[219]  arXiv:2206.00686 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[220]  arXiv:2206.00769 (cross-list from cs.LG) [pdf, other]
Title: Defense Against Gradient Leakage Attacks via Learning to Obscure Data
Comments: 13 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[221]  arXiv:2206.00772 (cross-list from cs.LG) [pdf, other]
Title: On the reversibility of adversarial attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[222]  arXiv:2206.00810 (cross-list from cs.LG) [pdf, other]
Title: Offline Reinforcement Learning with Differential Privacy
Comments: 50 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[223]  arXiv:2206.00846 (cross-list from cs.LG) [pdf, ps, other]
Title: Faster Rates of Convergence to Stationary Points in Differentially Private Optimization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[224]  arXiv:2206.01102 (cross-list from cs.CV) [pdf, other]
Title: A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[225]  arXiv:2206.01349 (cross-list from cs.LG) [pdf, other]
Title: On the Privacy Properties of GAN-generated Samples
Comments: AISTATS 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[226]  arXiv:2206.01367 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Unlearning: Reducing Confidence Along Adversarial Directions
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[227]  arXiv:2206.01467 (cross-list from cs.CV) [pdf, other]
Title: Evaluating Transfer-based Targeted Adversarial Perturbations against Real-World Computer Vision Systems based on Human Judgments
Comments: technical report
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[228]  arXiv:2206.01559 (cross-list from cs.IT) [pdf, ps, other]
Title: Root of Unity for Secure Distributed Matrix Multiplication: Grid Partition Case
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[229]  arXiv:2206.01733 (cross-list from cs.CV) [pdf, other]
Title: Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[230]  arXiv:2206.01797 (cross-list from cs.LO) [pdf, other]
Title: Prophecy Variables for Hyperproperty Verification
Comments: CSF 2022
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[231]  arXiv:2206.01838 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Model Compression
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[232]  arXiv:2206.01888 (cross-list from cs.LG) [pdf, ps, other]
Title: Reward Poisoning Attacks on Offline Multi-Agent Reinforcement Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[233]  arXiv:2206.01898 (cross-list from cs.LG) [pdf, other]
Title: Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[234]  arXiv:2206.01904 (cross-list from cs.LG) [pdf, ps, other]
Title: Soft Adversarial Training Can Retain Natural Accuracy
Comments: 7 pages, 6 figures
Journal-ref: In Proceedings of the 14th International Conference on Agents and Artificial Intelligence - Volume 3: ICAART 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[235]  arXiv:2206.02131 (cross-list from cs.LG) [pdf, other]
Title: Federated Adversarial Training with Transformers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[236]  arXiv:2206.02158 (cross-list from cs.CV) [pdf, other]
Title: Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training
Comments: 12 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[237]  arXiv:2206.02617 (cross-list from cs.LG) [pdf, other]
Title: Individual Privacy Accounting for Differentially Private Stochastic Gradient Descent
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[238]  arXiv:2206.02670 (cross-list from cs.LG) [pdf, other]
Title: Robust Adversarial Attacks Detection based on Explainable Deep Reinforcement Learning For UAV Guidance and Planning
Comments: 13 pages, 20 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Robotics (cs.RO)
[239]  arXiv:2206.02749 (cross-list from cs.CV) [pdf, other]
Title: CORE: Consistent Representation Learning for Face Forgery Detection
Comments: Accepted by CVPRW 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[240]  arXiv:2206.03008 (cross-list from cs.LG) [pdf, other]
Title: Histogram Estimation under User-level Privacy with Heterogeneous Data
Comments: 21 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[241]  arXiv:2206.03151 (cross-list from cs.LG) [pdf, other]
Title: Shuffled Check-in: Privacy Amplification towards Practical Distributed Learning
Comments: 16 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[242]  arXiv:2206.03178 (cross-list from cs.LG) [pdf, ps, other]
Title: Fooling Explanations in Text Classifiers
Journal-ref: International Conference on Learning Representations, 2022
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[243]  arXiv:2206.03200 (cross-list from cs.LG) [pdf, other]
Title: FairVFL: A Fair Vertical Federated Learning Framework with Contrastive Adversarial Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[244]  arXiv:2206.03227 (cross-list from cs.CY) [pdf]
Title: Does Crypto Kill? Relationship between Electricity Consumption Carbon Footprints and Bitcoin Transactions
Comments: 8 pages, 17 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[245]  arXiv:2206.03317 (cross-list from cs.LG) [pdf, other]
Title: Subject Membership Inference Attacks in Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[246]  arXiv:2206.03351 (cross-list from cs.SD) [pdf, other]
Title: AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[247]  arXiv:2206.03362 (cross-list from cs.LG) [pdf, other]
Title: Building Robust Ensembles via Margin Boosting
Comments: Accepted by ICML 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Methodology (stat.ME); Machine Learning (stat.ML)
[248]  arXiv:2206.03393 (cross-list from cs.SD) [pdf, other]
Title: Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[249]  arXiv:2206.03396 (cross-list from cs.LG) [pdf, other]
Title: Group privacy for personalized federated learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[250]  arXiv:2206.03426 (cross-list from cs.LG) [pdf, other]
Title: Improving Fairness in Graph Neural Networks via Mitigating Sensitive Attribute Leakage
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[251]  arXiv:2206.03440 (cross-list from eess.SY) [pdf, other]
Title: Enhancing Strong PUF Security with Non-monotonic Response Quantization
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[252]  arXiv:2206.03468 (cross-list from cs.IT) [pdf, ps, other]
Title: Rate Distortion Tradeoff in Private Read Update Write in Federated Submodel Learning
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[253]  arXiv:2206.03617 (cross-list from cs.LG) [pdf, other]
Title: Subject Granular Differential Privacy in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[254]  arXiv:2206.03693 (cross-list from cs.LG) [pdf, other]
Title: Autoregressive Perturbations for Data Poisoning
Comments: Accepted to NeurIPS 2022. Code available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[255]  arXiv:2206.03891 (cross-list from cs.CV) [pdf, other]
Title: PrivHAR: Recognizing Human Actions From Privacy-preserving Lens
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[256]  arXiv:2206.03985 (cross-list from cs.LG) [pdf, other]
Title: How unfair is private learning ?
Comments: Accepted as an Oral paper in UAI '2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[257]  arXiv:2206.04310 (cross-list from cs.LG) [pdf, other]
Title: GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[258]  arXiv:2206.04463 (cross-list from cs.LG) [pdf, other]
Title: Meet You Halfway: Explaining Deep Learning Mysteries
Authors: Oriel BenShmuel
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[259]  arXiv:2206.04472 (cross-list from cs.LG) [pdf, other]
Title: Early Transferability of Adversarial Examples in Deep Neural Networks
Authors: Oriel BenShmuel
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[260]  arXiv:2206.04500 (cross-list from cs.IR) [pdf, other]
Title: Unlearning Protected User Attributes in Recommendations with Adversarial Training
Comments: Accepted at SIGIR 2022
Subjects: Information Retrieval (cs.IR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[261]  arXiv:2206.04591 (cross-list from cs.CL) [pdf, other]
Title: Privacy Leakage in Text Classification: A Data Extraction Approach
Comments: 8 pages, 4 tables. Accepted at NAACL 2022 Workshop on Privacy in NLP (PrivateNLP)
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[262]  arXiv:2206.04731 (cross-list from cs.LG) [pdf, other]
Title: Leveraging Centric Data Federated Learning Using Blockchain For Integrity Assurance
Comments: Published at International Workshop on Trustable, Verifiable and Auditable Federated Learning in Conjunction with AAAI 2022 (FL-AAAI-22) this https URL
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[263]  arXiv:2206.04783 (cross-list from cs.CV) [pdf, other]
Title: ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[264]  arXiv:2206.04864 (cross-list from cs.LG) [pdf, other]
Title: Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[265]  arXiv:2206.04887 (cross-list from cs.LG) [pdf, other]
Title: Deep Leakage from Model in Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[266]  arXiv:2206.05199 (cross-list from cs.LG) [pdf, other]
Title: Bayesian Estimation of Differential Privacy
Authors: Santiago Zanella-Béguelin (Microsoft Research), Lukas Wutschitz (Microsoft), Shruti Tople (Microsoft Research), Ahmed Salem (Microsoft Research), Victor Rühle (Microsoft), Andrew Paverd (Microsoft Research), Mohammad Naseri (University College London), Boris Köpf (Microsoft Research), Daniel Jones (Microsoft)
Comments: 17 pages, 8 figures. Joint main authors: Santiago Zanella-B\'eguelin, Lukas Wutschitz, and Shruti Tople
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[267]  arXiv:2206.05209 (cross-list from cs.LG) [pdf, other]
Title: Hierarchical Federated Learning with Privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[268]  arXiv:2206.05406 (cross-list from cs.LG) [pdf, other]
Title: Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[269]  arXiv:2206.05751 (cross-list from cs.LG) [pdf, other]
Title: Consistent Attack: Universal Adversarial Perturbation on Embodied Vision Navigation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[270]  arXiv:2206.05772 (cross-list from cs.LG) [pdf, other]
Title: Distributed Differential Privacy in Multi-Armed Bandits
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[271]  arXiv:2206.05893 (cross-list from cs.LG) [pdf, other]
Title: Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations
Comments: To appear in the Proceedings of the 39 th International Conference on Machine Learning, Baltimore, Maryland, USA, PMLR 162, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[272]  arXiv:2206.06371 (cross-list from cs.LG) [pdf, other]
Title: Darknet Traffic Classification and Adversarial Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[273]  arXiv:2206.06510 (cross-list from cs.CV) [pdf, other]
Title: Generalizable Method for Face Anti-Spoofing with Semi-Supervised Learning
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[274]  arXiv:2206.06646 (cross-list from cs.NI) [pdf, other]
Title: Network-Controlled Physical-Layer Security: Enhancing Secrecy Through Friendly Jamming
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[275]  arXiv:2206.06650 (cross-list from cs.IT) [pdf, other]
Title: Semi-Private Computation of Data Similarity with Applications to Data Valuation and Pricing
Comments: 10 pages
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[276]  arXiv:2206.06737 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Vulnerability of Randomized Ensembles
Comments: Published as a conference paper in ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[277]  arXiv:2206.06814 (cross-list from cs.DB) [pdf]
Title: Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first
Comments: This paper is expected to be published in Research and Innovation Forum 2022, edited by Anna Visvizi, Orlando Troisi, Mara Grimaldi, 2022, Springer Nature Switzerland AG (Gewerbestrasse 11, 6330 Cham, Switzerland) reproduced with permission of Springer Nature Switzerland AG. Once the final authenticated version will become available online, this version will be substituted by it
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[278]  arXiv:2206.06854 (cross-list from cs.AI) [pdf, other]
Title: When adversarial attacks become interpretable counterfactual explanations
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Machine Learning (stat.ML)
[279]  arXiv:2206.07042 (cross-list from cs.DC) [pdf, ps, other]
Title: Cross-Chain State Machine Replication
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[280]  arXiv:2206.07125 (cross-list from cs.CV) [pdf, other]
Title: Self-Supervised Pretraining for Differentially Private Learning
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[281]  arXiv:2206.07136 (cross-list from cs.LG) [pdf, other]
Title: Automatic Clipping: Differentially Private Deep Learning Made Easier and Stronger
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[282]  arXiv:2206.07234 (cross-list from cs.LG) [pdf, other]
Title: Brownian Noise Reduction: Maximizing Privacy Subject to Accuracy Constraints
Comments: 18 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[283]  arXiv:2206.07314 (cross-list from cs.LG) [pdf, other]
Title: Fast and Reliable Evaluation of Adversarial Robustness with Minimum-Margin Attack
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[284]  arXiv:2206.07406 (cross-list from cs.LG) [pdf]
Title: Hardening DNNs against Transfer Attacks during Network Compression using Greedy Adversarial Pruning
Comments: 4 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2206.07737 (cross-list from cs.LG) [pdf, other]
Title: Disparate Impact in Differential Privacy from Gradient Misalignment
Comments: Accepted as a ICML workshop paper at TPDP 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[286]  arXiv:2206.07758 (cross-list from cs.LG) [pdf, other]
Title: Reconstructing Training Data from Trained Neural Networks
Comments: Project page: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[287]  arXiv:2206.07776 (cross-list from cs.LG) [pdf, other]
Title: Robust Attack Graph Generation
Comments: Appeared at LearnAut '22
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[288]  arXiv:2206.07840 (cross-list from cs.LG) [pdf, other]
Title: Architectural Backdoors in Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[289]  arXiv:2206.07902 (cross-list from cs.LG) [pdf, other]
Title: On Privacy and Personalization in Cross-Silo Federated Learning
Comments: NeurIPS 2022, 37 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[290]  arXiv:2206.07912 (cross-list from cs.LG) [pdf, other]
Title: Double Sampling Randomized Smoothing
Comments: ICML 2022; minor typos fixed
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[291]  arXiv:2206.07975 (cross-list from cs.LG) [pdf, other]
Title: BlindFL: Vertical Federated Machine Learning without Peeking into Your Data
Comments: SIGMOD 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[292]  arXiv:2206.08111 (cross-list from cs.LG) [pdf, other]
Title: On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits
Comments: This is the extended version of the paper appeared in the 39th International Conference on Machine Learning (ICML 2022): Optimal Private Streaming SCO in $\ell_p$-geometry with Applications in High Dimensional Online Decision Making
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[293]  arXiv:2206.08170 (cross-list from cs.SD) [pdf, other]
Title: Adversarial Privacy Protection on Speech Enhancement
Comments: 5 pages, 6 figures
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[294]  arXiv:2206.08304 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Patch Attacks and Defences in Vision-Based Tasks: A Survey
Comments: A. Sharma and Y. Bian share equal contribution
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[295]  arXiv:2206.08316 (cross-list from cs.LG) [pdf, other]
Title: Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge
Comments: 26 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[296]  arXiv:2206.08451 (cross-list from cs.LG) [pdf, other]
Title: I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences
Comments: Under review at ACM Computing Surveys
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[297]  arXiv:2206.08477 (cross-list from cs.CV) [pdf, other]
Title: Backdoor Attacks on Vision Transformers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[298]  arXiv:2206.08514 (cross-list from cs.LG) [pdf, other]
Title: A Unified Evaluation of Textual Backdoor Learning: Frameworks and Benchmarks
Comments: NeurIPS 2022 Datasets & Benchmarks; Toolkits avaliable at this https URL
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[299]  arXiv:2206.08575 (cross-list from cs.LG) [pdf, other]
Title: Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization
Comments: ICML 2022; Codes at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[300]  arXiv:2206.08646 (cross-list from cs.DS) [pdf, other]
Title: Scalable Differentially Private Clustering via Hierarchically Separated Trees
Comments: To appear at KDD'22
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[301]  arXiv:2206.08829 (cross-list from cs.LG) [pdf, other]
Title: FedNew: A Communication-Efficient and Privacy-Preserving Newton-Type Method for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[302]  arXiv:2206.09075 (cross-list from cs.LG) [pdf, ps, other]
Title: Comment on Transferability and Input Transformation with Additive Noise
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[303]  arXiv:2206.09097 (cross-list from cs.LG) [pdf, other]
Title: Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[304]  arXiv:2206.09458 (cross-list from cs.LG) [pdf, other]
Title: A Universal Adversarial Policy for Text Classifiers
Comments: Accepted for publication in Neural Networks (2022), see this https URL
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[305]  arXiv:2206.09465 (cross-list from cs.SI) [pdf]
Title: Cybersecurity Law: Legal Jurisdiction and Authority
Comments: This report is developed for partial fulfillment of the requirements for the degree of Juris Masters of Law at GMU's Antonin Scalia Law School
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[306]  arXiv:2206.09491 (cross-list from cs.LG) [pdf, other]
Title: On the Limitations of Stochastic Pre-processing Defenses
Comments: Accepted by Proceedings of the 36th Conference on Neural Information Processing Systems
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[307]  arXiv:2206.09628 (cross-list from cs.LG) [pdf, other]
Title: Diversified Adversarial Attacks based on Conjugate Gradient Method
Comments: Proceedings of the 39th International Conference on Machine Learning (ICML 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[308]  arXiv:2206.09734 (cross-list from cs.CY) [pdf]
Title: The Cost of the GDPR for Apps? Nearly Impossible to Study without Platform Data
Comments: Response to NBER preprint 'GDPR and the Lost Generation of Innovative Apps'
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[309]  arXiv:2206.09868 (cross-list from cs.LG) [pdf, other]
Title: Understanding Robust Learning through the Lens of Representation Similarities
Comments: 35 pages, 29 figures; Accepted to Neurips 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[310]  arXiv:2206.09999 (cross-list from cs.AR) [pdf, other]
Title: Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices
Comments: To appear in DSN 2022
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[311]  arXiv:2206.10257 (cross-list from cs.GL) [pdf]
Title: Satoshi Nakamoto and the Origins of Bitcoin -- The Profile of a 1-in-a-Billion Genius
Authors: Jens Ducrée
Comments: Main text: 84 pages Number of references: 1468 Appendix: 5 pages
Subjects: General Literature (cs.GL); Cryptography and Security (cs.CR)
[312]  arXiv:2206.10259 (cross-list from cs.LG) [pdf, ps, other]
Title: R2-AD2: Detecting Anomalies by Analysing the Raw Gradient
Comments: Accepted at ECML-PKDD 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[313]  arXiv:2206.10469 (cross-list from cs.LG) [pdf, other]
Title: The Privacy Onion Effect: Memorization is Relative
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[314]  arXiv:2206.10545 (cross-list from cs.CY) [pdf, other]
Title: The Impact of Visibility on the Right to Opt-out of Sale under CCPA
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[315]  arXiv:2206.10550 (cross-list from cs.LG) [pdf, other]
Title: (Certified!!) Adversarial Robustness for Free!
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[316]  arXiv:2206.10565 (cross-list from cs.LG) [pdf, other]
Title: sqSGD: Locally Private and Communication Efficient Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[317]  arXiv:2206.10673 (cross-list from cs.CV) [pdf, ps, other]
Title: Natural Backdoor Datasets
Comments: 18 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[318]  arXiv:2206.10858 (cross-list from cs.LG) [pdf, other]
Title: Robust Universal Adversarial Perturbations
Comments: 16 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[319]  arXiv:2206.10875 (cross-list from cs.LG) [pdf, other]
Title: Guided Diffusion Model for Adversarial Purification from Random Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[320]  arXiv:2206.10924 (cross-list from cs.CL) [pdf]
Title: Enhancing Networking Cipher Algorithms with Natural Language
Authors: John E. Ortega
Comments: 12 pages, David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022 pp. 43-54, 2022. CS & IT - CSCP 2022 DOI: 10.5121/csit.2022.121013
Journal-ref: David C. Wyld et al. (Eds): CONEDU, CSITA, MLCL, ISPR, NATAP, ARIN - 2022, pp. 43-54, 2022. CS & IT
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[321]  arXiv:2206.10989 (cross-list from cs.CV) [pdf, other]
Title: Identity Documents Authentication based on Forgery Detection of Guilloche Pattern
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[322]  arXiv:2206.11187 (cross-list from cs.AI) [pdf, other]
Title: Automated Compliance Blueprint Optimization with Artificial Intelligence
Comments: 5 pages
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[323]  arXiv:2206.11433 (cross-list from cs.IR) [pdf, other]
Title: Shilling Black-box Recommender Systems by Learning to Generate Fake User Profiles
Comments: Accepted by TNNLS. 15 pages, 8 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[324]  arXiv:2206.11480 (cross-list from cs.LG) [pdf, other]
Title: A Framework for Understanding Model Extraction Attack and Defense
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[325]  arXiv:2206.11743 (cross-list from cs.IR) [pdf, other]
Title: LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[326]  arXiv:2206.11787 (cross-list from cs.DB) [pdf]
Title: NoSQL security: can my data-driven decision-making be affected from outside?
Comments: Please cite this paper as: Nikiforova A., Daskevics A., Otmane A., "NoSQL security: can my data-driven decision-making be affected from outside?," In Big data & decision-making: how big data is relevant across fields and domains, Emerald Studies in Politics and Technology,2022.NoSQL security: can my data-driven decision-making be affected from outside?
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[327]  arXiv:2206.11866 (cross-list from cs.CL) [pdf]
Title: A Multi-Policy Framework for Deep Learning-Based Fake News Detection
Comments: 10 pages, 1 table, 3 figures, DCAI 2022 conference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[328]  arXiv:2206.12100 (cross-list from cs.LG) [pdf, other]
Title: zPROBE: Zero Peek Robustness Checks for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[329]  arXiv:2206.12183 (cross-list from cs.LG) [pdf, other]
Title: "You Can't Fix What You Can't Measure": Privately Measuring Demographic Performance Disparities in Federated Learning
Comments: 14 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[330]  arXiv:2206.12270 (cross-list from cs.LG) [pdf, other]
Title: Using Autoencoders on Differentially Private Federated Learning GANs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[331]  arXiv:2206.12395 (cross-list from cs.LG) [pdf, other]
Title: Data Leakage in Federated Averaging
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[332]  arXiv:2206.12401 (cross-list from cs.IR) [pdf, other]
Title: Debiasing Learning for Membership Inference Attacks Against Recommender Systems
Comments: Accepted by KDD 2022
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[333]  arXiv:2206.12654 (cross-list from cs.LG) [pdf, other]
Title: BackdoorBench: A Comprehensive Benchmark of Backdoor Learning
Comments: Accepted at NeurIPS 2022 Datasets and Benchmarks Track; 44 pages; 8 backdoor attacks; 9 backdoor defenses; 8,000 pairs of attack-defense evaluations; several analysis and 5 analysis tools
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[334]  arXiv:2206.12669 (cross-list from cs.IT) [pdf, other]
Title: Crypto Makes AI Evolve
Authors: Behrouz Zolfaghari (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Elnaz Rabieinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Abbas Yazdinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Reza M. Parizi (College of Computing and Software Engineering, Kennesaw State University, GA, USA), Ali Dehghantanha (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[335]  arXiv:2206.12685 (cross-list from cs.CV) [pdf]
Title: Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising
Journal-ref: IAES International Journal of Artificial Intelligence, Vol. 11, No. 3, September 2022, pp. 961~968, ISSN: 2252-8938
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[336]  arXiv:2206.12714 (cross-list from cs.CV) [pdf, other]
Title: Defending Multimodal Fusion Models against Single-Source Adversaries
Comments: CVPR 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[337]  arXiv:2206.12749 (cross-list from cs.LG) [pdf, ps, other]
Title: Design and Analysis of Robust Resilient Diffusion over Multi-Task Networks Against Byzantine Attacks
Comments: 16 pages, 22 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[338]  arXiv:2206.12766 (cross-list from cs.DB) [pdf]
Title: Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Journal-ref: 2021 IEEE International Conference on Digital Health (ICDH)
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[339]  arXiv:2206.12888 (cross-list from cs.DC) [pdf, other]
Title: WebAssembly as a Common Layer for the Cloud-edge Continuum
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: FRAME'22: Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, co-located with HPDC'22, July 2022, pp. 3-8
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[340]  arXiv:2206.13083 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Example Detection in Deployed Tree Ensembles
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[341]  arXiv:2206.13230 (cross-list from cs.NI) [pdf, other]
Title: Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale
Comments: this https URL
Journal-ref: Proc. Network Traffic Measurement and Analysis Conference (TMA) 2022
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[342]  arXiv:2206.13787 (cross-list from cs.LG) [pdf, other]
Title: Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[343]  arXiv:2206.13810 (cross-list from cs.IT) [pdf, ps, other]
Title: Gray Images of Cyclic Codes over $\mathbb{Z}_{p^2}$ and $\mathbb{Z}_p\mathbb{Z}_{p^2}
Authors: Minjia Shi, Xuan Wang
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[344]  arXiv:2206.13991 (cross-list from cs.LG) [pdf, other]
Title: Increasing Confidence in Adversarial Robustness Evaluations
Comments: Oral at CVPR 2022 Workshop (Art of Robustness). Project website this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[345]  arXiv:2206.14004 (cross-list from cs.LG) [pdf, other]
Title: On the amplification of security and privacy risks by post-hoc explanations in machine learning models
Comments: 9 pages, appendix: 2 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[346]  arXiv:2206.14157 (cross-list from cs.LG) [pdf, other]
Title: How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection
Comments: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[347]  arXiv:2206.14201 (cross-list from cs.IT) [pdf, ps, other]
Title: $\mathbb{Z}_p\mathbb{Z}_{p^2}$-additive cyclic codes: kernel and rank
Authors: Xuan Wang, Minjia Shi
Comments: arXiv admin note: text overlap with arXiv:2206.13810
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[348]  arXiv:2206.14356 (cross-list from cs.IT) [pdf, other]
Title: Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation
Comments: This paper is submitted to IEICE Trans. Fundamentals
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[349]  arXiv:2206.14439 (cross-list from cs.LG) [pdf, other]
Title: Approximate Data Deletion in Generative Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[350]  arXiv:2206.14477 (cross-list from cs.LG) [pdf, ps, other]
Title: Adversarial Ensemble Training by Jointly Learning Label Dependencies and Member Models
Authors: Lele Wang, Bin Liu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[351]  arXiv:2206.14527 (cross-list from cs.SE) [pdf, other]
Title: Challenges of mapping Vulnerabilities and Exposures to Open-Source Packages
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[352]  arXiv:2206.14724 (cross-list from cs.LG) [pdf, other]
Title: Private Graph Extraction via Feature Explanations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[353]  arXiv:2206.14772 (cross-list from cs.LG) [pdf, other]
Title: IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound
Comments: ICML 2022 Workshop on Formal Verification of Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[354]  arXiv:2206.00332 (cross-list from eess.SP) [pdf, other]
Title: Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[355]  arXiv:2206.00978 (cross-list from quant-ph) [pdf, other]
Title: First demonstration of a post-quantum key-exchange with a nanosatellite
Comments: 9 pages, 8 figures, to be published at 36th Annual Small Satellite Conference, August 6-11, 2022, Logan, UT, USA
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[356]  arXiv:2206.01164 (cross-list from quant-ph) [pdf, ps, other]
Title: Authentication of quantum key distribution with post-quantum cryptography and replay attacks
Comments: 7 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[357]  arXiv:2206.01501 (cross-list from quant-ph) [pdf, other]
Title: Key Agreement and Oblivious Transfer from Free-Energy Limitations
Comments: 31 pages, 3 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[358]  arXiv:2206.03182 (cross-list from quant-ph) [pdf, other]
Title: Anonymous voting scheme using quantum assisted blockchain
Comments: We propose an anonymous voting scheme based on quantum assisted blockchain by enhancing the advantages offered by blockchain with the quantum resources such as quantum random number generators and quantum key distribution
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[359]  arXiv:2206.03524 (cross-list from stat.AP) [pdf, ps, other]
Title: Confidentiality Protection in the 2020 US Census of Population and Housing
Comments: Annual Review of Statistics and Its Applications (2022) pre-print. Version 2 corrects a few transcription errors in Tables 2, 3 and 5
Subjects: Applications (stat.AP); Cryptography and Security (cs.CR); General Economics (econ.GN)
[360]  arXiv:2206.04078 (cross-list from quant-ph) [pdf, other]
Title: Quantum Advantage in Cryptography
Comments: 29 pages, 9 figures, 1 table
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[361]  arXiv:2206.05081 (cross-list from physics.soc-ph) [pdf, other]
Title: The Evolution Of Centralisation on Cryptocurrency Platforms
Subjects: Physics and Society (physics.soc-ph); Cryptography and Security (cs.CR); General Economics (econ.GN)
[362]  arXiv:2206.06448 (cross-list from eess.IV) [pdf]
Title: Assessing Privacy Leakage in Synthetic 3-D PET Imaging using Transversal GAN
Comments: arXiv admin note: text overlap with arXiv:2111.01866
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[363]  arXiv:2206.07944 (cross-list from math.OC) [pdf, ps, other]
Title: Distributed Online Learning Algorithm With Differential Privacy Strategy for Convex Nondecomposable Global Objectives
Comments: 16 pages, 6 figures
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[364]  arXiv:2206.08308 (cross-list from eess.IV) [pdf]
Title: Deepfake histological images for enhancing digital pathology
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[365]  arXiv:2206.08401 (cross-list from econ.GN) [pdf, other]
Title: Is decentralized finance actually decentralized? A social network analysis of the Aave protocol on the Ethereum blockchain
Comments: Accepted at 29th Annual Global Finance Conference featuring Professor Robert Engle, The 2003 Nobel Laureate in Economic Sciences
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Statistical Finance (q-fin.ST); Computation (stat.CO)
[366]  arXiv:2206.09103 (cross-list from eess.AS) [pdf, other]
Title: Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[367]  arXiv:2206.09159 (cross-list from quant-ph) [pdf, other]
Title: Beating the fault-tolerance bound and security loopholes for Byzantine agreement with a quantum solution
Comments: 20 pages, 10 figures. All comments are welcome
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[368]  arXiv:2206.11750 (cross-list from eess.AS) [pdf, other]
Title: Towards End-to-End Private Automatic Speaker Recognition
Comments: Accepted for publication at Interspeech 2022
Journal-ref: Proc. Interspeech 2022, 2798-2802
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR)
[369]  arXiv:2206.11973 (cross-list from q-fin.RM) [pdf]
Title: Liquidity Risks in Lending Protocols: Evidence from Aave Protocol
Subjects: Risk Management (q-fin.RM); Cryptography and Security (cs.CR); Computational Finance (q-fin.CP); Trading and Market Microstructure (q-fin.TR)
[370]  arXiv:2206.12527 (cross-list from eess.SP) [pdf, other]
Title: Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Comments: 5 pages, 5 figures
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[371]  arXiv:2206.13330 (cross-list from quant-ph) [pdf, other]
Title: Multi-agent blind quantum computation without universal cluster state
Authors: Shuxiang Cao
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[372]  arXiv:2206.14371 (cross-list from stat.ML) [pdf, other]
Title: Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Comments: A preprint work
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[373]  arXiv:2206.14449 (cross-list from math.ST) [pdf, other]
Title: Hypothesis Testing for Differentially Private Linear Regression
Comments: 62 pages, 18 figures
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR)
[374]  arXiv:2206.14929 (cross-list from quant-ph) [pdf, ps, other]
Title: Succinct Classical Verification of Quantum Computation
Comments: CRYPTO 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 374 entries: 1-374 ]
[ showing 374 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2212, contact, help  (Access key information)