Cryptography and Security
Authors and titles for cs.CR in Jun 2022, skipping first 75
[ total of 375 entries: 1-100 | 76-175 | 176-275 | 276-375 ][ showing 100 entries per page: fewer | more | all ]
- [76] arXiv:2206.04911 [pdf, ps, other]
-
Title: NSSIA: A New Self-Sovereign Identity Scheme with AccountabilitySubjects: Cryptography and Security (cs.CR)
- [77] arXiv:2206.04947 [pdf, other]
-
Title: Semantic Technology based Usage Control for Decentralized SystemsAuthors: Ines AkaichiSubjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Logic in Computer Science (cs.LO); Systems and Control (eess.SY)
- [78] arXiv:2206.05091 [pdf, other]
-
Title: Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and AveragingSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
- [79] arXiv:2206.05276 [pdf, other]
-
Title: Game-Theoretic Neyman-Pearson Detection to Combat Strategic EvasionSubjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); Systems and Control (eess.SY)
- [80] arXiv:2206.05359 [pdf, other]
-
Title: Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated LearningSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [81] arXiv:2206.05438 [pdf, other]
-
Title: Guaranteeing Timed Opacity using Parametric Timed Model CheckingComments: This is the author version of the manuscript of the same name published in ACM Transactions on Software Engineering and Methodology (ToSEM). This work is partially supported by the ANR national research program PACS (ANR-14-CE28-0002), by the ANR-NRF research program ProMiS (ANR-19-CE25-0015), and by ERATO HASUO Metamathematics for Systems Design Project (No. JPMJER1603), JST. arXiv admin note: substantial text overlap with arXiv:1907.00537Journal-ref: ACM Transactions on Software Engineering and Methodology (ToSEM), Volume 31(4), 2022Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
- [82] arXiv:2206.05565 [pdf, other]
-
Title: NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference AttacksJournal-ref: Annual Computer Security Applications Conference (ACSAC '22), December 5--9, 2022, Austin, TX, USASubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [83] arXiv:2206.05679 [pdf, other]
-
Title: Exploration of Enterprise Server Data to Assess Ease of Modeling System BehaviorSubjects: Cryptography and Security (cs.CR)
- [84] arXiv:2206.05735 [pdf, other]
-
Title: Fusing Feature Engineering and Deep Learning: A Case Study for Malware ClassificationSubjects: Cryptography and Security (cs.CR)
- [85] arXiv:2206.05821 [pdf, other]
-
Title: RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack AnalysisComments: This extended abstract is 2 pages containing 2 Figures. This abstract was presented at the 2022 Non-Volatile Memories Workshop (NVMW'22) and the full paper was published at ASPLOS 2022Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [86] arXiv:2206.06010 [pdf, other]
-
Title: Constant-Round Linear-Broadcast Secure Computation with PenaltiesComments: 32 pagesSubjects: Cryptography and Security (cs.CR)
- [87] arXiv:2206.06019 [pdf, other]
-
Title: SBvote: Scalable Self-Tallying Blockchain-Based VotingSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [88] arXiv:2206.06027 [pdf, ps, other]
-
Title: Adversarial Models Towards Data Availability and Integrity of Distributed State Estimation for Industrial IoT-Based Smart GridComments: 11 pages (DC), Journal manuscriptSubjects: Cryptography and Security (cs.CR)
- [89] arXiv:2206.06256 [pdf, ps, other]
-
Title: On the impact of dataset size and class imbalance in evaluating machine-learning-based windows malware detection techniquesAuthors: David IllesComments: Project report for my MSc project at The Open University originally submitted to obtain an MSc in Cyber SecuritySubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [90] arXiv:2206.06261 [pdf, other]
-
Title: An Application of Nodal CurvesComments: arXiv admin note: substantial text overlap with arXiv:1904.03978Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Number Theory (math.NT)
- [91] arXiv:2206.06274 [pdf, other]
-
Title: Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at ScaleSubjects: Cryptography and Security (cs.CR)
- [92] arXiv:2206.06457 [pdf, ps, other]
-
Title: A Privacy Glossary for Cloud ComputingSubjects: Cryptography and Security (cs.CR)
- [93] arXiv:2206.06493 [pdf, other]
-
Title: A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case studyComments: 35 pagesSubjects: Cryptography and Security (cs.CR); Econometrics (econ.EM)
- [94] arXiv:2206.06669 [pdf, other]
-
Title: Walking Under the Ladder Logic: PLC-VBS, a PLC Control Logic Vulnerability Discovery ToolSubjects: Cryptography and Security (cs.CR)
- [95] arXiv:2206.06670 [pdf, ps, other]
-
Title: PROACT: Parallel Multi-Miner Proof of Accumulated Trust Protocol for Internet of DronesAuthors: Khaleel MershadComments: 45 pages, 9 Figures, 2 Tables, accepted for publication at Elsevier Vehicular Communications JournalSubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [96] arXiv:2206.06925 [pdf, ps, other]
-
Title: Towards a secured smart IoT using light weight blockchain: An aim to secure Pharmacy ProductsAuthors: Md. Faruk Abdullah Al Sohan (Department of Computer Science, American International University-Bangladesh), Samiur Rahman Khan (Department of Computer Science, American International University-Bangladesh), Nusrat Jahan Anannya (Department of Computer Science, American International University-Bangladesh), Md Taimur Ahad (Department of Computer Science, American International University-Bangladesh)Comments: 9 pages 3 figuresSubjects: Cryptography and Security (cs.CR)
- [97] arXiv:2206.06934 [pdf, other]
-
Title: A Layered Reference Model for Penetration Testing with Reinforcement Learning and Attack GraphsAuthors: Tyler CodySubjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
- [98] arXiv:2206.06938 [pdf, other]
-
Title: Cloud Property Graph: Connecting Cloud Security Assessments with Static Code AnalysisSubjects: Cryptography and Security (cs.CR)
- [99] arXiv:2206.07009 [pdf, other]
-
Title: Private Collection Matching ProtocolsSubjects: Cryptography and Security (cs.CR)
- [100] arXiv:2206.07012 [pdf, other]
-
Title: Frequency Throttling Side-Channel AttackJournal-ref: CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecuritySubjects: Cryptography and Security (cs.CR)
- [101] arXiv:2206.07019 [pdf, other]
-
Title: An Attack Resilient PUF-based Authentication Mechanism for Distributed SystemsSubjects: Cryptography and Security (cs.CR)
- [102] arXiv:2206.07164 [pdf, other]
-
Title: Edge Security: Challenges and IssuesComments: 21 pages. Survey paperSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [103] arXiv:2206.07215 [pdf, other]
-
Title: SPENDER: A Platform for Secure and Privacy-Preserving Decentralized P2P E-CommerceComments: 9 pages, 2 figures, preprintSubjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
- [104] arXiv:2206.07220 [pdf, other]
-
Title: Towards Verifiable Differentially-Private PollingSubjects: Cryptography and Security (cs.CR)
- [105] arXiv:2206.07248 [pdf, ps, other]
-
Title: Blockchain based Secure Energy Marketplace Scheme to Motivate P2P MicrogridsJournal-ref: International Journal of Informatics and Communication Technology 11, 177-184 (2022)Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [106] arXiv:2206.07321 [pdf, other]
-
Title: Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution DetectionComments: 13 pages, 6 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2108.13952Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [107] arXiv:2206.07323 [pdf, other]
-
Title: A Continuous Risk Assessment Methodology for Cloud InfrastructuresSubjects: Cryptography and Security (cs.CR)
- [108] arXiv:2206.07329 [pdf, ps, other]
-
Title: Application-Oriented Selection of Privacy Enhancing TechnologiesJournal-ref: Annual Privacy Forum. Springer, Cham, 2022. S. 75-87Subjects: Cryptography and Security (cs.CR)
- [109] arXiv:2206.07418 [pdf, other]
-
Title: Designing a Provenance Analysis for SGX EnclavesComments: 16 pages, 8 figuresSubjects: Cryptography and Security (cs.CR)
- [110] arXiv:2206.07429 [pdf, other]
-
Title: Collusion-Resistant Worker Set Selection for Transparent and Verifiable VotingComments: 34 pages, 5 figuresJournal-ref: SN COMPUT. SCI. 3, 334 (2022)Subjects: Cryptography and Security (cs.CR)
- [111] arXiv:2206.07507 [pdf, other]
-
Title: YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPCComments: This paper was published in the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria, ACMSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [112] arXiv:2206.07581 [pdf, ps, other]
-
Title: Learn to Adapt: Robust Drift Detection in Security DomainSubjects: Cryptography and Security (cs.CR)
- [113] arXiv:2206.07895 [pdf, other]
-
Title: Dual-channel Early Warning Framework for Ethereum Ponzi SchemesSubjects: Cryptography and Security (cs.CR)
- [114] arXiv:2206.07910 [pdf, ps, other]
-
Title: Introducing the Huber mechanism for differentially private low-rank matrix completionComments: 13 pagesSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [115] arXiv:2206.07998 [pdf, other]
-
Title: Differentially Private Multi-Party Data Release for Linear RegressionAuthors: Ruihan Wu, Xin Yang, Yuanshun Yao, Jiankai Sun, Tianyi Liu, Kilian Q. Weinberger, Chong WangComments: UAI 2022Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [116] arXiv:2206.08004 [pdf, other]
-
Title: When a RF Beats a CNN and GRU, Together -- A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic ClassificationSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [117] arXiv:2206.08132 [pdf, other]
-
Title: Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRFSubjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
- [118] arXiv:2206.08260 [pdf, other]
-
Title: From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly DetectionComments: arXiv admin note: substantial text overlap with arXiv:2106.09989Subjects: Cryptography and Security (cs.CR)
- [119] arXiv:2206.08396 [pdf, other]
-
Title: User Customizable and Robust Geo-Indistinguishability for Location PrivacyComments: Under reviewSubjects: Cryptography and Security (cs.CR)
- [120] arXiv:2206.08565 [pdf, other]
-
Title: Identifying Counterfeit Products using Blockchain Technology in Supply Chain SystemComments: 5 pages, 4 figures, 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)Journal-ref: 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), 2022, pp. 1-5Subjects: Cryptography and Security (cs.CR)
- [121] arXiv:2206.08722 [pdf, other]
-
Title: WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZoneComments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197Journal-ref: ICDCS'22: Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, July 2022Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
- [122] arXiv:2206.08821 [pdf, other]
-
Title: Exploring Web3 From the View of BlockchainComments: Tech Report 2022Subjects: Cryptography and Security (cs.CR)
- [123] arXiv:2206.09009 [pdf, other]
-
Title: Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and ChallengesAuthors: Dinh C. Nguyen, Van-Dinh Nguyen, Ming Ding, Symeon Chatzinotas, Pubudu N. Pathirana, Aruna Seneviratne, Octavia Dobre, Albert Y. ZomayaComments: Accepted at IEEE Network Magazine, 8 pages. arXiv admin note: substantial text overlap with arXiv:2109.14263Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
- [124] arXiv:2206.09011 [pdf, other]
-
Title: Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining NetworksComments: 12 pages, 12 figures, 13 equationsSubjects: Cryptography and Security (cs.CR)
- [125] arXiv:2206.09122 [pdf, other]
-
Title: Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated LearningComments: 15 pages, 7 figuresSubjects: Cryptography and Security (cs.CR)
- [126] arXiv:2206.09133 [pdf, other]
-
Title: Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS ReceiversComments: 10 pages,Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
- [127] arXiv:2206.09237 [pdf, other]
-
Title: Systematic Analysis and Comparison of Security Advice as DatasetsSubjects: Cryptography and Security (cs.CR)
- [128] arXiv:2206.09272 [pdf, other]
-
Title: DECK: Model Hardening for Defending Pervasive BackdoorsAuthors: Guanhong Tao, Yingqi Liu, Siyuan Cheng, Shengwei An, Zhuo Zhang, Qiuling Xu, Guangyu Shen, Xiangyu ZhangSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
- [129] arXiv:2206.09388 [pdf, other]
-
Title: Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of EigendecompositionComments: Accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE)Subjects: Cryptography and Security (cs.CR)
- [130] arXiv:2206.09424 [pdf, ps, other]
-
Title: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption AlgorithmsAuthors: Muhammad Fahad Khan, Khalid Saleem, Mohammed Alotaibi, Mohammad Mazyad Hazzazi, Eid Rehman, Aaqif Afzaal Abbasi, Muhammad Asif GondalComments: 15 pages, 3 figuers, Journal PaperJournal-ref: Computers, Materials & Continua, 2022Subjects: Cryptography and Security (cs.CR)
- [131] arXiv:2206.09428 [pdf, ps, other]
-
Title: Reputation, Risk, and Trust on User Adoption of Internet Search Engines: The Case of DuckDuckGoAuthors: Antonios Saravanos (1), Stavros Zervoudakis (1), Dongnanzi Zheng (1), Amarpreet Nanda (1), Georgios Shaheen (1), Charles Hornat (1), Jeremiah Konde Chaettle (1), Alassane Yoda (1), Hyeree Park (1), Will Ang (1) ((1) New York University)Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
- [132] arXiv:2206.09519 [pdf, other]
-
Title: Walking to Hide: Privacy Amplification via Random Message Exchanges in NetworkSubjects: Cryptography and Security (cs.CR)
- [133] arXiv:2206.09569 [pdf, other]
-
Title: Shuffle Gaussian Mechanism for Differential PrivacyComments: Fixed typos. The source code of our implementation is available at this http URL . arXiv admin note: text overlap with arXiv:2206.03151Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
- [134] arXiv:2206.09707 [pdf, other]
-
Title: The Role of Machine Learning in CybersecurityAuthors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di FrancoSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [135] arXiv:2206.09834 [pdf, ps, other]
-
Title: The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The CloudSubjects: Cryptography and Security (cs.CR)
- [136] arXiv:2206.09870 [pdf, other]
-
Title: Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile CommunicationSubjects: Cryptography and Security (cs.CR)
- [137] arXiv:2206.10050 [pdf, ps, other]
-
Title: Better Incentives for Proof-of-WorkSubjects: Cryptography and Security (cs.CR)
- [138] arXiv:2206.10112 [pdf, other]
-
Title: General Framework for Reversible Data Hiding in Texts Based on Masked Language ModelingComments: this https URL&hl=enJournal-ref: IEEE International Workshop on Multimedia Signal Processing (2022)Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
- [139] arXiv:2206.10272 [pdf, other]
-
Title: Identification of Attack Paths Using Kill Chain and Attack GraphsComments: IEEE/IFIP NOMS 2022 conference, 6 pagesSubjects: Cryptography and Security (cs.CR)
- [140] arXiv:2206.10334 [pdf, other]
-
Title: Defending Adversarial Examples by Negative Correlation EnsembleSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [141] arXiv:2206.10341 [pdf, other]
-
Title: Neurotoxin: Durable Backdoors in Federated LearningAuthors: Zhengming Zhang, Ashwinee Panda, Linyue Song, Yaoqing Yang, Michael W. Mahoney, Joseph E. Gonzalez, Kannan Ramchandran, Prateek MittalComments: Appears in ICML 2022Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [142] arXiv:2206.10368 [pdf, other]
-
Title: Real-Time Waveform Matching with a Digitizer at 10 GS/sSubjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
- [143] arXiv:2206.10379 [pdf, other]
-
Title: Can process mining help in anomaly-based intrusion detection?Subjects: Cryptography and Security (cs.CR)
- [144] arXiv:2206.10400 [pdf, other]
-
Title: Using EBGAN for Anomaly Intrusion DetectionSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [145] arXiv:2206.10413 [pdf, other]
-
Title: Multilayer Block Models for Exploratory Analysis of Computer Event LogsAuthors: Corentin LarrocheSubjects: Cryptography and Security (cs.CR); Applications (stat.AP)
- [146] arXiv:2206.10473 [pdf, ps, other]
-
Title: Securing the Future Internet of Things with Post-Quantum CryptographyComments: Accepted versionJournal-ref: Security and Privacy 5 (2), e20, 2022Subjects: Cryptography and Security (cs.CR)
- [147] arXiv:2206.10525 [pdf, other]
-
Title: PRIVIC: A privacy-preserving method for incremental collection of location dataSubjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR)
- [148] arXiv:2206.10685 [pdf, other]
-
Title: Differentially Private Maximal Information CoefficientsComments: 38 pages, to appear in ICML 2022Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Methodology (stat.ME)
- [149] arXiv:2206.10746 [pdf, ps, other]
-
Title: A Practical Methodology for ML-Based EM Side Channel DisassemblersComments: Accepted to the poster section of the 7th IEEE European Symposium on Security and Privacy 2022Subjects: Cryptography and Security (cs.CR)
- [150] arXiv:2206.10753 [pdf, other]
-
Title: Secure and Efficient Query Processing in Outsourced DatabasesAuthors: Dmytro BogatovComments: Ph.D. thesisSubjects: Cryptography and Security (cs.CR); Databases (cs.DB)
- [151] arXiv:2206.10835 [pdf, other]
-
Title: Interpreting Graph-based Sybil Detection Methods as Low-Pass FilteringSubjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
- [152] arXiv:2206.10898 [src]
-
Title: Q-rMinRank attack: The first quantum approach for key recovery attacks on RainbowComments: The paper has been withdrawn because the research work is still in progressSubjects: Cryptography and Security (cs.CR)
- [153] arXiv:2206.10927 [pdf, ps, other]
-
Title: Exploration of User Privacy in 802.11 Probe Requests with MAC Address Randomization Using Temporal Pattern AnalysisComments: 10 pages, 5 figures, submitted to LBS2022 conferenceSubjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
- [154] arXiv:2206.10963 [pdf, other]
-
Title: FLaaS: Cross-App On-device Federated Learning in Mobile EnvironmentsComments: 12 pages, 6 figures, 46 referencesSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [155] arXiv:2206.11024 [pdf, other]
-
Title: ROSE: A RObust and SEcure DNN WatermarkingSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
- [156] arXiv:2206.11133 [pdf, other]
-
Title: Multi-party Secure Broad Learning System for Privacy PreservingSubjects: Cryptography and Security (cs.CR)
- [157] arXiv:2206.11171 [pdf, other]
-
Title: Attack Techniques and Threat Identification for VulnerabilitiesAuthors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian NgwetaComments: 9 pagesSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [158] arXiv:2206.11175 [pdf, other]
-
Title: HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web TrafficComments: 6 pagesSubjects: Cryptography and Security (cs.CR)
- [159] arXiv:2206.11182 [pdf, other]
-
Title: Vulnerability Prioritization: An Offensive Security ApproachComments: 5 pagesSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
- [160] arXiv:2206.11402 [pdf, other]
-
Title: Optimal Local Bayesian Differential Privacy over Markov ChainsJournal-ref: In AAMAS (pp. 1563-1565) 2022Subjects: Cryptography and Security (cs.CR)
- [161] arXiv:2206.11411 [pdf, other]
-
Title: Linear recurrent cryptography: golden-like cryptography for higher order linear recurrencesComments: 27 pages, 1 figureJournal-ref: Discrete Mathematics, Algorithms and Applications, 2022Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Number Theory (math.NT); Spectral Theory (math.SP)
- [162] arXiv:2206.11519 [pdf, ps, other]
-
Title: Homomorphic Sortition -- Secret Leader Election for PoS BlockchainsAuthors: Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr KuznetsovSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [163] arXiv:2206.11586 [pdf, ps, other]
-
Title: MAGIC: A Method for Assessing Cyber Incidents OccurrenceComments: 16 pages, 9 figuresSubjects: Cryptography and Security (cs.CR)
- [164] arXiv:2206.11641 [pdf, other]
-
Title: Advancing Blockchain-based Federated Learning through Verifiable Off-chain ComputationsSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
- [165] arXiv:2206.11793 [pdf, other]
-
Title: Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised ApproachAuthors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava VoloshynovskiyComments: Paper accepted at the 29th IEEE International Conference on Image Processing (IEEE ICIP)Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
- [166] arXiv:2206.11821 [pdf, other]
-
Title: A Survey of DeFi Security: Challenges and OpportunitiesJournal-ref: Journal of King Saud University - Computer and Information Sciences, 2022Subjects: Cryptography and Security (cs.CR)
- [167] arXiv:2206.11840 [pdf, other]
-
Title: Design Exploration and Security Assessment of PUF-on-PUF ImplementationsSubjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
- [168] arXiv:2206.11961 [pdf, ps, other]
-
Title: LRPC codes with multiple syndromes: near ideal-size KEMs without idealsComments: 31 pagesSubjects: Cryptography and Security (cs.CR)
- [169] arXiv:2206.11974 [pdf, other]
-
Title: Keep Your Transactions On Short LeashesAuthors: Bennet YeeSubjects: Cryptography and Security (cs.CR)
- [170] arXiv:2206.12093 [pdf, ps, other]
-
Title: An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard ModelSubjects: Cryptography and Security (cs.CR)
- [171] arXiv:2206.12224 [pdf, other]
-
Title: MPClan: Protocol Suite for Privacy-Conscious ComputationsSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (cs.LG)
- [172] arXiv:2206.12227 [pdf, other]
-
Title: Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification PerspectiveSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
- [173] arXiv:2206.12236 [pdf, other]
-
Title: Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity ComparisonComments: Accepted by EAI SecureComm 2022, 20 pages, 3 figuresSubjects: Cryptography and Security (cs.CR)
- [174] arXiv:2206.12251 [pdf, other]
-
Title: Adversarial Zoom Lens: A Novel Physical-World Attack to DNNsSubjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
- [175] arXiv:2206.12447 [pdf, other]
-
Title: XMD: An Expansive Hardware-telemetry based Mobile Malware Detector to enhance Endpoint DetectionComments: Revised version based on peer review feedback. Manuscript to appear in IEEE Transactions on Information Forensics and SecuritySubjects: Cryptography and Security (cs.CR)
[ showing 100 entries per page: fewer | more | all ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, 2404, contact, help (Access key information)