We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 50

[ total of 374 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]
[51]  arXiv:2206.03585 [pdf, other]
Title: XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions
Comments: Submitted to peer review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[52]  arXiv:2206.03623 [pdf, other]
Title: Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2206.03745 [pdf, other]
Title: Probing for Passwords -- Privacy Implications of SSIDs in Probe Requests
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2206.03776 [pdf, ps, other]
Title: Communication Efficient Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority
Comments: 7 pages
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2206.03780 [pdf, other]
Title: Attestation Mechanisms for Trusted Execution Environments Demystified
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197. arXiv admin note: substantial text overlap with arXiv:2204.06790
Journal-ref: DAIS'22: Proceedings of the 22nd IFIP International Conference on Distributed Applications and Interoperable Systems, June 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[56]  arXiv:2206.03838 [pdf, other]
Title: Efficient reversible data hiding via two layers of double-peak embedding
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2206.03867 [pdf]
Title: Blockchain-enabled supply chain: An experimental study
Comments: 13 pages, 15 figures, 10 tables
Journal-ref: Computers and Industrial Engineering, 136 (2019), 57-69
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2206.03905 [pdf, other]
Title: To remove or not remove Mobile Apps? A data-driven predictive model approach
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[59]  arXiv:2206.03930 [pdf, other]
Title: "You Just Assume It Is In There, I Guess": UK Families' Application And Knowledge Of Smart Home Cyber Security
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[60]  arXiv:2206.04049 [pdf, other]
Title: Hypersyn: A Peer-to-Peer System for Mutual Credit
Authors: Lum Ramabaja
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2206.04055 [pdf, other]
Title: Gradient Obfuscation Gives a False Sense of Security in Federated Learning
Comments: Accepted by USENIX Security 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[62]  arXiv:2206.04123 [pdf, ps, other]
Title: A Framework for Building Secure, Scalable, Networked Enclaves
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2206.04141 [pdf]
Title: Role of Blockchain in Revolutionizing Online Transactional Security
Authors: Rishav Kumar
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2206.04185 [pdf, other]
Title: A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools
Comments: 14 pages, ACM IMC 2022
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2206.04236 [pdf, other]
Title: Analytical Composition of Differential Privacy via the Edgeworth Accountant
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[66]  arXiv:2206.04489 [pdf, ps, other]
Title: Holistic Verification of Blockchain Consensus
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Formal Languages and Automata Theory (cs.FL)
[67]  arXiv:2206.04507 [pdf, other]
Title: Software Mitigation of RISC-V Spectre Attacks
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[68]  arXiv:2206.04572 [pdf, other]
Title: Log-Concave and Multivariate Canonical Noise Distributions for Differential Privacy
Comments: 10 pages before references, 1 Figure
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[69]  arXiv:2206.04621 [pdf, ps, other]
Title: A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning
Comments: ACM Computing Surveys (to appear)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2206.04677 [pdf, other]
Title: Can Backdoor Attacks Survive Time-Varying Models?
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[71]  arXiv:2206.04754 [pdf, other]
Title: AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking
Comments: arXiv admin note: text overlap with arXiv:2007.10512
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2206.04793 [pdf]
Title: Securing AI-based Healthcare Systems using Blockchain Technology: A State-of-the-Art Systematic Literature Review and Future Research Directions
Comments: 44 Pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[73]  arXiv:2206.04803 [pdf, other]
Title: Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application of Machine Learning-based Forensics
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[74]  arXiv:2206.04823 [pdf, other]
Title: Membership Inference via Backdooring
Comments: This paper has been accepted by IJCAI-22
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2206.04881 [pdf, other]
Title: Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 374 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 351-374 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2211, contact, help  (Access key information)