We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 25

[ total of 374 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]
[26]  arXiv:2206.02156 [pdf, other]
Title: Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter
Comments: 18 pages, 5 figures, submitted to Computers & Security
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2206.02248 [pdf, other]
Title: LNGate$^2$: Secure Bidirectional IoT Micro-payments using Bitcoin's Lightning Network and Threshold Cryptography
Comments: Journal extension of this https URL arXiv admin note: substantial text overlap with arXiv:2105.08902
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2206.02285 [pdf, other]
Title: Story Beyond the Eye: Glyph Positions Break PDF Text Redaction
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2206.02384 [pdf, other]
Title: Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2206.02443 [pdf]
Title: Spam Detection Using BERT
Comments: 6 pages, 8 figures and 2 tabels
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2206.02541 [pdf]
Title: PCPT and ACPT: Copyright Protection and Traceability Scheme for DNN Model
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[32]  arXiv:2206.02602 [pdf, other]
Title: LIN-MM: Multiplexed Message Authentication Code for Local Interconnect Network message authentication in road vehicles
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2206.02603 [pdf, other]
Title: CAN-MM: Multiplexed Message Authentication Code for Controller Area Network message authentication in road vehicles
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2206.02658 [pdf, other]
Title: Longitudinal Analysis of Privacy Labels in the Apple App Store
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2206.02733 [pdf, other]
Title: Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review
Journal-ref: International Conference On Secure Knowledge Management In Artificial Intelligence Era. Springer, Cham, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[36]  arXiv:2206.02760 [pdf]
Title: Blockchain for the Cybersecurity of Smart City Applications
Comments: 65 pages, 6 figures, 37 tables
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2206.02852 [pdf, other]
Title: CompartOS: CHERI Compartmentalization for Embedded Systems
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2206.02894 [pdf, other]
Title: ASAP: Reconciling Asynchronous Real-Time Operations and Proofs of Execution in Simple Embedded Systems
Comments: 2022 59th ACM/IEEE Design Automation Conference (DAC)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[39]  arXiv:2206.03079 [pdf, other]
Title: An Empirical Study of IoT Security Aspects at Sentence-Level in Developer Textual Discussions
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[40]  arXiv:2206.03265 [pdf, other]
Title: Marvolo: Programmatic Data Augmentation for Practical ML-Driven Malware Detection
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41]  arXiv:2206.03391 [pdf]
Title: Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[42]  arXiv:2206.03419 [pdf, other]
Title: A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain
Journal-ref: IEEE Transactions on Industrial Informatics 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[43]  arXiv:2206.03445 [pdf, other]
Title: Timed automata as a formalism for expressing security: A survey on theory and practice
Comments: This is the author version of the manuscript of the same name published in ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[44]  arXiv:2206.03481 [pdf, other]
Title: Topos: A Secure, Trustless, and Decentralized Interoperability Protocol
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[45]  arXiv:2206.03488 [pdf, other]
Title: Towards Practical Differential Privacy in Data Analysis: Understanding the Effect of Epsilon on Utility in Private ERM
Comments: 16 pages,4 figures,2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[46]  arXiv:2206.03492 [pdf, other]
Title: A Privacy-Preserving Subgraph-Level Federated Graph Neural Network via Differential Privacy
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[47]  arXiv:2206.03581 [pdf, other]
Title: Compromised account detection using authorship verification: a novel approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[48]  arXiv:2206.03582 [pdf, other]
Title: Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption
Comments: This is the extended version of a paper to appear at CAV 2022
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[49]  arXiv:2206.03583 [pdf, other]
Title: Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[50]  arXiv:2206.03584 [pdf]
Title: White-box Membership Attack Against Machine Learning Based Retinopathy Classification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[ total of 374 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2211, contact, help  (Access key information)