We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2022, skipping first 75

[ total of 375 entries: 1-100 | 76-175 | 176-275 | 276-375 ]
[ showing 100 entries per page: fewer | more | all ]
[76]  arXiv:2206.04911 [pdf, ps, other]
Title: NSSIA: A New Self-Sovereign Identity Scheme with Accountability
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2206.04947 [pdf, other]
Title: Semantic Technology based Usage Control for Decentralized Systems
Authors: Ines Akaichi
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Logic in Computer Science (cs.LO); Systems and Control (eess.SY)
[78]  arXiv:2206.05091 [pdf, other]
Title: Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[79]  arXiv:2206.05276 [pdf, other]
Title: Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion
Authors: Yinan Hu, Quanyan Zhu
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); Systems and Control (eess.SY)
[80]  arXiv:2206.05359 [pdf, other]
Title: Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[81]  arXiv:2206.05438 [pdf, other]
Title: Guaranteeing Timed Opacity using Parametric Timed Model Checking
Comments: This is the author version of the manuscript of the same name published in ACM Transactions on Software Engineering and Methodology (ToSEM). This work is partially supported by the ANR national research program PACS (ANR-14-CE28-0002), by the ANR-NRF research program ProMiS (ANR-19-CE25-0015), and by ERATO HASUO Metamathematics for Systems Design Project (No. JPMJER1603), JST. arXiv admin note: substantial text overlap with arXiv:1907.00537
Journal-ref: ACM Transactions on Software Engineering and Methodology (ToSEM), Volume 31(4), 2022
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[82]  arXiv:2206.05565 [pdf, other]
Title: NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks
Journal-ref: Annual Computer Security Applications Conference (ACSAC '22), December 5--9, 2022, Austin, TX, USA
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[83]  arXiv:2206.05679 [pdf, other]
Title: Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2206.05735 [pdf, other]
Title: Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2206.05821 [pdf, other]
Title: RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis
Comments: This extended abstract is 2 pages containing 2 Figures. This abstract was presented at the 2022 Non-Volatile Memories Workshop (NVMW'22) and the full paper was published at ASPLOS 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[86]  arXiv:2206.06010 [pdf, other]
Title: Constant-Round Linear-Broadcast Secure Computation with Penalties
Comments: 32 pages
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2206.06019 [pdf, other]
Title: SBvote: Scalable Self-Tallying Blockchain-Based Voting
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[88]  arXiv:2206.06027 [pdf, ps, other]
Title: Adversarial Models Towards Data Availability and Integrity of Distributed State Estimation for Industrial IoT-Based Smart Grid
Comments: 11 pages (DC), Journal manuscript
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2206.06256 [pdf, ps, other]
Title: On the impact of dataset size and class imbalance in evaluating machine-learning-based windows malware detection techniques
Authors: David Illes
Comments: Project report for my MSc project at The Open University originally submitted to obtain an MSc in Cyber Security
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[90]  arXiv:2206.06261 [pdf, other]
Title: An Application of Nodal Curves
Comments: arXiv admin note: substantial text overlap with arXiv:1904.03978
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Number Theory (math.NT)
[91]  arXiv:2206.06274 [pdf, other]
Title: Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2206.06457 [pdf, ps, other]
Title: A Privacy Glossary for Cloud Computing
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2206.06493 [pdf, other]
Title: A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study
Comments: 35 pages
Subjects: Cryptography and Security (cs.CR); Econometrics (econ.EM)
[94]  arXiv:2206.06669 [pdf, other]
Title: Walking Under the Ladder Logic: PLC-VBS, a PLC Control Logic Vulnerability Discovery Tool
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2206.06670 [pdf, ps, other]
Title: PROACT: Parallel Multi-Miner Proof of Accumulated Trust Protocol for Internet of Drones
Authors: Khaleel Mershad
Comments: 45 pages, 9 Figures, 2 Tables, accepted for publication at Elsevier Vehicular Communications Journal
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[96]  arXiv:2206.06925 [pdf, ps, other]
Title: Towards a secured smart IoT using light weight blockchain: An aim to secure Pharmacy Products
Authors: Md. Faruk Abdullah Al Sohan (Department of Computer Science, American International University-Bangladesh), Samiur Rahman Khan (Department of Computer Science, American International University-Bangladesh), Nusrat Jahan Anannya (Department of Computer Science, American International University-Bangladesh), Md Taimur Ahad (Department of Computer Science, American International University-Bangladesh)
Comments: 9 pages 3 figures
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:2206.06934 [pdf, other]
Title: A Layered Reference Model for Penetration Testing with Reinforcement Learning and Attack Graphs
Authors: Tyler Cody
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[98]  arXiv:2206.06938 [pdf, other]
Title: Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2206.07009 [pdf, other]
Title: Private Collection Matching Protocols
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2206.07012 [pdf, other]
Title: Frequency Throttling Side-Channel Attack
Journal-ref: CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2206.07019 [pdf, other]
Title: An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2206.07164 [pdf, other]
Title: Edge Security: Challenges and Issues
Comments: 21 pages. Survey paper
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[103]  arXiv:2206.07215 [pdf, other]
Title: SPENDER: A Platform for Secure and Privacy-Preserving Decentralized P2P E-Commerce
Comments: 9 pages, 2 figures, preprint
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[104]  arXiv:2206.07220 [pdf, other]
Title: Towards Verifiable Differentially-Private Polling
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2206.07248 [pdf, ps, other]
Title: Blockchain based Secure Energy Marketplace Scheme to Motivate P2P Microgrids
Journal-ref: International Journal of Informatics and Communication Technology 11, 177-184 (2022)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[106]  arXiv:2206.07321 [pdf, other]
Title: Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Comments: 13 pages, 6 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2108.13952
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107]  arXiv:2206.07323 [pdf, other]
Title: A Continuous Risk Assessment Methodology for Cloud Infrastructures
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2206.07329 [pdf, ps, other]
Title: Application-Oriented Selection of Privacy Enhancing Technologies
Journal-ref: Annual Privacy Forum. Springer, Cham, 2022. S. 75-87
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2206.07418 [pdf, other]
Title: Designing a Provenance Analysis for SGX Enclaves
Comments: 16 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2206.07429 [pdf, other]
Title: Collusion-Resistant Worker Set Selection for Transparent and Verifiable Voting
Comments: 34 pages, 5 figures
Journal-ref: SN COMPUT. SCI. 3, 334 (2022)
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2206.07507 [pdf, other]
Title: YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
Comments: This paper was published in the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria, ACM
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[112]  arXiv:2206.07581 [pdf, ps, other]
Title: Learn to Adapt: Robust Drift Detection in Security Domain
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2206.07895 [pdf, other]
Title: Dual-channel Early Warning Framework for Ethereum Ponzi Schemes
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2206.07910 [pdf, ps, other]
Title: Introducing the Huber mechanism for differentially private low-rank matrix completion
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[115]  arXiv:2206.07998 [pdf, other]
Title: Differentially Private Multi-Party Data Release for Linear Regression
Comments: UAI 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116]  arXiv:2206.08004 [pdf, other]
Title: When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[117]  arXiv:2206.08132 [pdf, other]
Title: Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[118]  arXiv:2206.08260 [pdf, other]
Title: From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection
Comments: arXiv admin note: substantial text overlap with arXiv:2106.09989
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2206.08396 [pdf, other]
Title: User Customizable and Robust Geo-Indistinguishability for Location Privacy
Comments: Under review
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2206.08565 [pdf, other]
Title: Identifying Counterfeit Products using Blockchain Technology in Supply Chain System
Comments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)
Journal-ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2206.08722 [pdf, other]
Title: WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Journal-ref: ICDCS'22: Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, July 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[122]  arXiv:2206.08821 [pdf, other]
Title: Exploring Web3 From the View of Blockchain
Comments: Tech Report 2022
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2206.09009 [pdf, other]
Title: Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Comments: Accepted at IEEE Network Magazine, 8 pages. arXiv admin note: substantial text overlap with arXiv:2109.14263
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[124]  arXiv:2206.09011 [pdf, other]
Title: Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks
Comments: 12 pages, 12 figures, 13 equations
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2206.09122 [pdf, other]
Title: Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2206.09133 [pdf, other]
Title: Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers
Comments: 10 pages,
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[127]  arXiv:2206.09237 [pdf, other]
Title: Systematic Analysis and Comparison of Security Advice as Datasets
Subjects: Cryptography and Security (cs.CR)
[128]  arXiv:2206.09272 [pdf, other]
Title: DECK: Model Hardening for Defending Pervasive Backdoors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[129]  arXiv:2206.09388 [pdf, other]
Title: Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition
Comments: Accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE)
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2206.09424 [pdf, ps, other]
Title: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Comments: 15 pages, 3 figuers, Journal Paper
Journal-ref: Computers, Materials & Continua, 2022
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2206.09428 [pdf, ps, other]
Title: Reputation, Risk, and Trust on User Adoption of Internet Search Engines: The Case of DuckDuckGo
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[132]  arXiv:2206.09519 [pdf, other]
Title: Walking to Hide: Privacy Amplification via Random Message Exchanges in Network
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2206.09569 [pdf, other]
Title: Shuffle Gaussian Mechanism for Differential Privacy
Comments: Fixed typos. The source code of our implementation is available at this http URL . arXiv admin note: text overlap with arXiv:2206.03151
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[134]  arXiv:2206.09707 [pdf, other]
Title: The Role of Machine Learning in Cybersecurity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2206.09834 [pdf, ps, other]
Title: The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2206.09870 [pdf, other]
Title: Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2206.10050 [pdf, ps, other]
Title: Better Incentives for Proof-of-Work
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2206.10112 [pdf, other]
Title: General Framework for Reversible Data Hiding in Texts Based on Masked Language Modeling
Comments: this https URL&hl=en
Journal-ref: IEEE International Workshop on Multimedia Signal Processing (2022)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[139]  arXiv:2206.10272 [pdf, other]
Title: Identification of Attack Paths Using Kill Chain and Attack Graphs
Comments: IEEE/IFIP NOMS 2022 conference, 6 pages
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2206.10334 [pdf, other]
Title: Defending Adversarial Examples by Negative Correlation Ensemble
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[141]  arXiv:2206.10341 [pdf, other]
Title: Neurotoxin: Durable Backdoors in Federated Learning
Comments: Appears in ICML 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[142]  arXiv:2206.10368 [pdf, other]
Title: Real-Time Waveform Matching with a Digitizer at 10 GS/s
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[143]  arXiv:2206.10379 [pdf, other]
Title: Can process mining help in anomaly-based intrusion detection?
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2206.10400 [pdf, other]
Title: Using EBGAN for Anomaly Intrusion Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[145]  arXiv:2206.10413 [pdf, other]
Title: Multilayer Block Models for Exploratory Analysis of Computer Event Logs
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[146]  arXiv:2206.10473 [pdf, ps, other]
Title: Securing the Future Internet of Things with Post-Quantum Cryptography
Comments: Accepted version
Journal-ref: Security and Privacy 5 (2), e20, 2022
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2206.10525 [pdf, other]
Title: PRIVIC: A privacy-preserving method for incremental collection of location data
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR)
[148]  arXiv:2206.10685 [pdf, other]
Title: Differentially Private Maximal Information Coefficients
Comments: 38 pages, to appear in ICML 2022
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Methodology (stat.ME)
[149]  arXiv:2206.10746 [pdf, ps, other]
Title: A Practical Methodology for ML-Based EM Side Channel Disassemblers
Comments: Accepted to the poster section of the 7th IEEE European Symposium on Security and Privacy 2022
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2206.10753 [pdf, other]
Title: Secure and Efficient Query Processing in Outsourced Databases
Authors: Dmytro Bogatov
Comments: Ph.D. thesis
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[151]  arXiv:2206.10835 [pdf, other]
Title: Interpreting Graph-based Sybil Detection Methods as Low-Pass Filtering
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[152]  arXiv:2206.10898 [src]
Title: Q-rMinRank attack: The first quantum approach for key recovery attacks on Rainbow
Comments: The paper has been withdrawn because the research work is still in progress
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2206.10927 [pdf, ps, other]
Title: Exploration of User Privacy in 802.11 Probe Requests with MAC Address Randomization Using Temporal Pattern Analysis
Comments: 10 pages, 5 figures, submitted to LBS2022 conference
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[154]  arXiv:2206.10963 [pdf, other]
Title: FLaaS: Cross-App On-device Federated Learning in Mobile Environments
Comments: 12 pages, 6 figures, 46 references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[155]  arXiv:2206.11024 [pdf, other]
Title: ROSE: A RObust and SEcure DNN Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[156]  arXiv:2206.11133 [pdf, other]
Title: Multi-party Secure Broad Learning System for Privacy Preserving
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2206.11171 [pdf, other]
Title: Attack Techniques and Threat Identification for Vulnerabilities
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[158]  arXiv:2206.11175 [pdf, other]
Title: HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2206.11182 [pdf, other]
Title: Vulnerability Prioritization: An Offensive Security Approach
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[160]  arXiv:2206.11402 [pdf, other]
Title: Optimal Local Bayesian Differential Privacy over Markov Chains
Journal-ref: In AAMAS (pp. 1563-1565) 2022
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2206.11411 [pdf, other]
Title: Linear recurrent cryptography: golden-like cryptography for higher order linear recurrences
Comments: 27 pages, 1 figure
Journal-ref: Discrete Mathematics, Algorithms and Applications, 2022
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Number Theory (math.NT); Spectral Theory (math.SP)
[162]  arXiv:2206.11519 [pdf, ps, other]
Title: Homomorphic Sortition -- Secret Leader Election for PoS Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[163]  arXiv:2206.11586 [pdf, ps, other]
Title: MAGIC: A Method for Assessing Cyber Incidents Occurrence
Comments: 16 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2206.11641 [pdf, other]
Title: Advancing Blockchain-based Federated Learning through Verifiable Off-chain Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[165]  arXiv:2206.11793 [pdf, other]
Title: Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach
Comments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[166]  arXiv:2206.11821 [pdf, other]
Title: A Survey of DeFi Security: Challenges and Opportunities
Journal-ref: Journal of King Saud University - Computer and Information Sciences, 2022
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2206.11840 [pdf, other]
Title: Design Exploration and Security Assessment of PUF-on-PUF Implementations
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[168]  arXiv:2206.11961 [pdf, ps, other]
Title: LRPC codes with multiple syndromes: near ideal-size KEMs without ideals
Comments: 31 pages
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2206.11974 [pdf, other]
Title: Keep Your Transactions On Short Leashes
Authors: Bennet Yee
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2206.12093 [pdf, ps, other]
Title: An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2206.12224 [pdf, other]
Title: MPClan: Protocol Suite for Privacy-Conscious Computations
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (cs.LG)
[172]  arXiv:2206.12227 [pdf, other]
Title: Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[173]  arXiv:2206.12236 [pdf, other]
Title: Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison
Comments: Accepted by EAI SecureComm 2022, 20 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2206.12251 [pdf, other]
Title: Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[175]  arXiv:2206.12447 [pdf, other]
Title: XMD: An Expansive Hardware-telemetry based Mobile Malware Detector to enhance Endpoint Detection
Comments: Revised version based on peer review feedback. Manuscript to appear in IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR)
[ total of 375 entries: 1-100 | 76-175 | 176-275 | 276-375 ]
[ showing 100 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)