We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 175

[ total of 375 entries: 1-50 | 26-75 | 76-125 | 126-175 | 176-225 | 226-275 | 276-325 | 326-375 ]
[ showing 50 entries per page: fewer | more | all ]
[176]  arXiv:2206.12770 [pdf, ps, other]
Title: Malware Detection and Prevention using Artificial Intelligence Techniques
Journal-ref: 2021 IEEE International Conference on Big Data (Big Data)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[177]  arXiv:2206.12790 [src]
Title: APPFLChain: A Privacy Protection Distributed Artificial-Intelligence Architecture Based on Federated Learning and Consortium Blockchain
Comments: We found that the simulation part in section V is not completed. We need to add more experiments to support it
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB); Machine Learning (cs.LG)
[178]  arXiv:2206.12864 [pdf, ps, other]
Title: A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications
Journal-ref: IEEE Internet of Things Journal, 2022
Subjects: Cryptography and Security (cs.CR)
[179]  arXiv:2206.12944 [pdf, other]
Title: Don't Look Up: Ubiquitous Data Exfiltration Pathways in Commercial Spaces
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2206.12970 [pdf, ps, other]
Title: Cost-Asymmetric Memory Hard Password Hashing
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2206.13046 [pdf, other]
Title: DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[182]  arXiv:2206.13050 [pdf, other]
Title: Libra: High-Utility Anonymization of Event Logs for Process Mining via Subsampling
Subjects: Cryptography and Security (cs.CR)
[183]  arXiv:2206.13055 [pdf, other]
Title: Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[184]  arXiv:2206.13104 [pdf, other]
Title: Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks
Subjects: Cryptography and Security (cs.CR)
[185]  arXiv:2206.13144 [pdf, ps, other]
Title: An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory
Subjects: Cryptography and Security (cs.CR)
[186]  arXiv:2206.13172 [pdf, ps, other]
Title: Comment on "Provably secure biometric-based client-server secure communication over unreliable networks"
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2206.13350 [pdf, ps, other]
Title: Intractable Group-theoretic Problems Around Zero-knowledge Proofs
Authors: Cansu Betin Onur
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[188]  arXiv:2206.13358 [pdf, other]
Title: FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks
Subjects: Cryptography and Security (cs.CR)
[189]  arXiv:2206.13594 [pdf, other]
Title: Cyber Network Resilience against Self-Propagating Malware Attacks
Comments: 20 pages
Subjects: Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Spectral Theory (math.SP); Applications (stat.AP)
[190]  arXiv:2206.13599 [pdf, other]
Title: Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2206.13614 [pdf, other]
Title: Measuring and Clustering Network Attackers using Medium-Interaction Honeypots
Comments: In Proceedings of the 7th IEEE EuroS&P Workshop on Traffic Measurements for Cybersecurity (WTMC 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[192]  arXiv:2206.13660 [pdf, other]
Title: DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2206.13889 [pdf, other]
Title: Parallel Instance Filtering for Malware Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[194]  arXiv:2206.14076 [pdf, other]
Title: Reasoning about Moving Target Defense in Attack Modeling Formalisms
Subjects: Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[195]  arXiv:2206.14107 [pdf, ps, other]
Title: Special subsets of addresses for blockchains using the secp256k1 curve
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[196]  arXiv:2206.14136 [pdf, other]
Title: Gender Bias in Password Managers
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[197]  arXiv:2206.14304 [pdf, other]
Title: Indistinguishability Obfuscation of Circuits and its Application in Security
Authors: Shilun Li, Zijing Di
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[198]  arXiv:2206.14317 [pdf, ps, other]
Title: Quantitative Verification of Opacity Properties in Security Systems
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2206.14341 [pdf, ps, other]
Title: CoAP-DoS: An IoT Network Intrusion Dataset
Comments: 6 pages, 8 figures, Publication Title: 2022 6th International Conference on Cryptography, Security and Privacy (CSP), eCF Paper Id: 1641864704381, accepted for publishing, not yet published
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[200]  arXiv:2206.14346 [pdf, other]
Title: A Deep Learning Approach to Create DNS Amplification Attacks
Comments: 12 pages, 6 figures, Conference: to 2022 4th International Conference on Management Science and Industrial Engineering (MSIE) (MSIE 2022), DOI: this https URL, accepted to conference above, not yet published
Subjects: Cryptography and Security (cs.CR)
[201]  arXiv:2206.14519 [pdf, other]
Title: Effect of Auditory Stimuli on Electroencephalography-based Authentication
Subjects: Cryptography and Security (cs.CR)
[202]  arXiv:2206.14539 [pdf, other]
Title: Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
Comments: The 17th International Conference on Availability, Reliability and Security (ARES 2022), 8 pages
Subjects: Cryptography and Security (cs.CR)
[203]  arXiv:2206.14547 [pdf, ps, other]
Title: A Novel Attack to the Permuted Kernel Problem
Subjects: Cryptography and Security (cs.CR)
[204]  arXiv:2206.14560 [pdf, ps, other]
Title: A note on a Code-Based Signature Scheme
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[205]  arXiv:2206.14567 [pdf, other]
Title: Contributions to Context-Aware Smart Healthcare: A Security and Privacy Perspective
Authors: Edgar Batista
Comments: Doctoral thesis
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[206]  arXiv:2206.14782 [pdf, ps, other]
Title: Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices
Subjects: Cryptography and Security (cs.CR)
[207]  arXiv:2206.14977 [pdf, other]
Title: Multiple Targets Directed Greybox Fuzzing
Comments: 14 pages, 5 figures, 10 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[208]  arXiv:2206.14980 [pdf, ps, other]
Title: On the image of an affine subspace under the inverse function within a finite field
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[209]  arXiv:2206.15055 [pdf, other]
Title: Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats
Comments: 23 pages, 3 figures. Presented at the 21st Workshop on the Economics of Information Security (WEIS), 2022, Tulsa, USA
Subjects: Cryptography and Security (cs.CR); Physics and Society (physics.soc-ph)
[210]  arXiv:2206.15068 [pdf, ps, other]
Title: Accountable Private Set Cardinality for Distributed Measurement
Comments: Includes additional appendix over version published in ACM TOPS. 37 pages, 11 figures
Journal-ref: ACM Transactions on Privacy and Security, Vol. 25, No. 4, Article 25. Publication date: May 2022
Subjects: Cryptography and Security (cs.CR)
[211]  arXiv:2206.15089 [pdf, other]
Title: Fairness and Cost Constrained Privacy-Aware Record Linkage
Subjects: Cryptography and Security (cs.CR)
[212]  arXiv:2206.15139 [pdf, other]
Title: Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service
Comments: 35 pages, 18 figures, 7 tables. Data set awarded with Open Data Impact Award 2022 by the German Stifterverband
Journal-ref: ACM Transactions on Privacy and Security, Vol. 26, No. 1 (February 2023). Article No. 6, pp 1-36
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[213]  arXiv:2206.00052 (cross-list from cs.CL) [pdf, other]
Title: CodeAttack: Code-Based Adversarial Attacks for Pre-trained Programming Language Models
Comments: AAAI Conference on Artificial Intelligence (AAAI) 2023
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[214]  arXiv:2206.00071 (cross-list from cs.LG) [pdf, other]
Title: Generative Models with Information-Theoretic Protection Against Membership Inference Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[215]  arXiv:2206.00169 (cross-list from cs.LG) [pdf, other]
Title: Discovering the Hidden Vocabulary of DALLE-2
Comments: 6 pages, 4 figures
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[216]  arXiv:2206.00363 (cross-list from cs.LG) [pdf, ps, other]
Title: Bring Your Own Algorithm for Optimal Differentially Private Stochastic Minimax Optimization
Comments: NeurIPS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[217]  arXiv:2206.00511 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Shapley Values for Data Evaluation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[218]  arXiv:2206.00513 (cross-list from cs.LG) [pdf, ps, other]
Title: The robust way to stack and bag: the local Lipschitz way
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[219]  arXiv:2206.00686 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data
Comments: To appear in CVPR2023 Workshop Federated Learning in Computer Vision
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[220]  arXiv:2206.00769 (cross-list from cs.LG) [pdf, other]
Title: Defense Against Gradient Leakage Attacks via Learning to Obscure Data
Comments: 13 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[221]  arXiv:2206.00772 (cross-list from cs.LG) [pdf, other]
Title: On the reversibility of adversarial attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[222]  arXiv:2206.00810 (cross-list from cs.LG) [pdf, other]
Title: Offline Reinforcement Learning with Differential Privacy
Comments: 55 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[223]  arXiv:2206.00846 (cross-list from cs.LG) [pdf, ps, other]
Title: Faster Rates of Convergence to Stationary Points in Differentially Private Optimization
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[224]  arXiv:2206.01102 (cross-list from cs.CV) [pdf, other]
Title: A temporal chrominance trigger for clean-label backdoor attack against anti-spoof rebroadcast detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[225]  arXiv:2206.01349 (cross-list from cs.LG) [pdf, other]
Title: On the Privacy Properties of GAN-generated Samples
Comments: AISTATS 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 375 entries: 1-50 | 26-75 | 76-125 | 126-175 | 176-225 | 226-275 | 276-325 | 326-375 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)