We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Aug 2022

[ total of 443 entries: 1-443 ]
[ showing 443 entries per page: fewer | more ]
[1]  arXiv:2208.00042 [pdf, other]
Title: The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
Journal-ref: Future Generation Computer Systems, Volume 144, 2023, Pages 74-89
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2208.00110 [pdf, other]
Title: L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing
Comments: Updated version (2022.07.30)
Journal-ref: 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2208.00205 [pdf, other]
Title: BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
Comments: The paper was accepted by ISOC NDSS 2023
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2208.00235 [pdf, ps, other]
Title: 'PeriHack': Designing a Serious Game for Cybersecurity Awareness
Comments: 5 pages, 6 figures, 2 tables. For associated files see this https URL
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2208.00258 [pdf, ps, other]
Title: Developers Struggle with Authentication in Blazor WebAssembly
Comments: ICSME 2022: 38th IEEE International Conference on Software Maintenance and Evolution
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[6]  arXiv:2208.00283 [pdf, other]
Title: Recurring Contingent Service Payment
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2208.00343 [pdf, other]
Title: Electromagnetic Signal Injection Attacks on Differential Signaling
Comments: 14 pages, 15 figures
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[8]  arXiv:2208.00371 [pdf, other]
Title: Nested Cover-Free Families for Unbounded Fault-Tolerant Aggregate Signatures
Comments: 30 pages
Journal-ref: Theoretical Computer Science 854 (2021) 116-130
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[9]  arXiv:2208.00373 [pdf, ps, other]
Title: Modification tolerant signature schemes: location and correction
Comments: 22 pages
Journal-ref: In: Progress in Cryptology - INDOCRYPT 2019. Lecture Notes in Computer Science, vol 11898. Springer, Cham (2019)
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2208.00388 [pdf, other]
Title: Secure Email Transmission Protocols -- A New Architecture Design
Comments: 8 pages, 5 figures, SANS Institute
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[11]  arXiv:2208.00498 [pdf, other]
Title: DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[12]  arXiv:2208.00543 [pdf, other]
Title: ERC-20R and ERC-721R: Reversible Transactions on Ethereum
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2208.00563 [pdf, other]
Title: Deep Fidelity in DNN Watermarking: A Study of Backdoor Watermarking for Classification Models
Comments: Published in Pattern Recognition
Journal-ref: Pattern Recognition, Vol. 144, Dec. 2023
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2208.00710 [pdf, other]
Title: The Hitchhiker's Guide to Facebook Web Tracking with Invisible Pixels and Click IDs
Journal-ref: In Proceedings of the ACM Web Conference 2023 (WWW '23)
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2208.00901 [pdf, ps, other]
Title: PSAA: Provable Secure and Anti-Quantum Authentication Based on Randomized RLWE for Space Information Network
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2208.00940 [pdf, other]
Title: Maximal Extractable Value (MEV) Protection on a DAG
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[17]  arXiv:2208.01113 [pdf, other]
Title: On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Comments: 15 pages, 20 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2208.01242 [pdf, ps, other]
Title: Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management
Comments: 14 pages, currently under review
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[19]  arXiv:2208.01263 [pdf, ps, other]
Title: A ZK-SNARK based Proof of Assets Protocol for Bitcoin Exchanges
Authors: B Swaroopa Reddy
Comments: 9 pages, 2 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2208.01277 [pdf, other]
Title: Security Requirement Analysis of Blockchain-based E-Voting Systems
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2208.01356 [pdf, other]
Title: SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2208.01411 [pdf, other]
Title: Locating modifications in signed data for partial data integrity
Comments: 14 pages
Journal-ref: Information Processing Letters 115 (2015) 731-737
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2208.01442 [pdf, ps, other]
Title: Improvement of algebraic attacks for solving superdetermined MinRank instances
Authors: Magali Bardet, Manon Bertin (LITIS)
Journal-ref: PQCrypto 2022, Sep 2022, virtual, France
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Symbolic Computation (cs.SC)
[24]  arXiv:2208.01524 [pdf, other]
Title: A replication of a controlled experiment with two STRIDE variants
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[25]  arXiv:2208.01548 [pdf, other]
Title: A Turning Point for Verified Spectre Sandboxing
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2208.01634 [pdf, ps, other]
Title: Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 4
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2208.01635 [pdf, ps, other]
Title: Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Comments: CYBERNETICS AND INFORMATION TECHNOLOGIES, Volume 21, No 2
Journal-ref: CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, Volume 21, No 2, pages 71-88
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2208.01636 [pdf, ps, other]
Title: A Roadmap for Greater Public Use of Privacy-Sensitive Government Data: Workshop Report
Comments: 23 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (cs.LG)
[29]  arXiv:2208.01639 [pdf, ps, other]
Title: Sharpening Your Tools: Updating bulk_extractor for the 2020s
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2208.01700 [pdf, other]
Title: Differentially Private Vertical Federated Clustering
Journal-ref: PVLDB, 16(6): 1277 - 1290, 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2208.01703 [pdf, other]
Title: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[32]  arXiv:2208.01826 [pdf, ps, other]
Title: A New Implementation of Federated Learning for Privacy and Security Enhancement
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33]  arXiv:2208.01886 [pdf, other]
Title: Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2208.01908 [pdf, other]
Title: Mass Exit Attacks on the Lightning Network
Journal-ref: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[35]  arXiv:2208.01919 [pdf, other]
Title: Spectrum Focused Frequency Adversarial Attacks for Automatic Modulation Classification
Authors: Sicheng Zhang (1), Jiarun Yu (1), Zhida Bao (1), Shiwen Mao (2), Yun Lin (1) ((1) College of Information and Communication Engineering, Harbin Engineering University, Harbin, (2) Department of Electrical & Computer Engineering, Auburn University, Auburn)
Comments: 6 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[36]  arXiv:2208.01968 [pdf, other]
Title: Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[37]  arXiv:2208.02093 [pdf, other]
Title: Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2208.02094 [pdf, ps, other]
Title: A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[39]  arXiv:2208.02125 [pdf, other]
Title: Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Comments: Submitted to IEEE TIFS and currently under review
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2208.02159 [pdf, other]
Title: CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[41]  arXiv:2208.02160 [pdf, ps, other]
Title: Scrypt Mining with ASICs
Authors: David Watkins
Comments: Published in 2014
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2208.02201 [pdf, other]
Title: Statistical Decoding 2.0: Reducing Decoding to LPN
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2208.02244 [pdf, other]
Title: Contrasting global approaches for identifying and managing cybersecurity risks in supply chains
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[44]  arXiv:2208.02310 [pdf, other]
Title: Design of secure and robust cognitive system for malware detection
Authors: Sanket Shukla
Comments: arXiv admin note: substantial text overlap with arXiv:2104.06652
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[45]  arXiv:2208.02500 [pdf, other]
Title: "Yeah, it does have a...Windows `98 Vibe'': Usability Study of Security Features in Programmable Logic Controllers
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC); Systems and Control (eess.SY)
[46]  arXiv:2208.02592 [pdf, other]
Title: Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[47]  arXiv:2208.02615 [pdf, other]
Title: SROS2: Usable Cyber Security Tools for ROS 2
Comments: Accepted, IROS 2022, 7 pages, 2 figures, 5 code listings, 5 sections plus references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Robotics (cs.RO); Software Engineering (cs.SE)
[48]  arXiv:2208.02672 [pdf, other]
Title: Information Flow Control-by-Construction for an Object-Oriented Language Using Type Modifiers
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2208.02699 [pdf, other]
Title: Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Comments: Extended version of a paper accepted at ESORICS 2022
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[50]  arXiv:2208.02733 [pdf, other]
Title: On False Data Injection Attack against Building Automation Systems
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2208.02820 [pdf, other]
Title: MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Comments: 15 pages. The journal extension of our conference paper in AAAI 2022 (this https URL). arXiv admin note: substantial text overlap with arXiv:2112.03476
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[52]  arXiv:2208.02857 [pdf, other]
Title: Identity-Based Authentication for On-Demand Charging of Electric Vehicles
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2208.02858 [pdf, other]
Title: An Empirical Study on Ethereum Private Transactions and the Security Implications
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2208.02877 [pdf, other]
Title: A Forward-secure Efficient Two-factor Authentication Protocol
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2208.02883 [pdf, other]
Title: Beware of Discarding Used SRAMs: Information is Stored Permanently
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[56]  arXiv:2208.02906 [pdf, other]
Title: Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions
Comments: 8 pages, 7 figures and Supporting Information
Subjects: Cryptography and Security (cs.CR); Applied Physics (physics.app-ph); Optics (physics.optics)
[57]  arXiv:2208.02917 [pdf, ps, other]
Title: Padding-only defenses add delay in Tor
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2208.02999 [pdf, other]
Title: Cryptoeconomic Security for Data Availability Committees
Comments: In Financial Cryptography and Data Security 2023
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2208.03169 [pdf, other]
Title: FBI: Fingerprinting models with Benign Inputs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2208.03276 [pdf, other]
Title: Modeling Self-Propagating Malware with Epidemiological Models
Subjects: Cryptography and Security (cs.CR); Dynamical Systems (math.DS); Applications (stat.AP)
[61]  arXiv:2208.03399 [pdf, other]
Title: LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles
Comments: Accepted and to appear in IEEE GlobeCom 2022; Code is available at Github link: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[62]  arXiv:2208.03412 [pdf, other]
Title: OpenSSF Scorecard: On the Path Toward Ecosystem-wide Automated Security Metrics
Comments: 10 pages, 2 figures and 2 tables
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2208.03445 [pdf, ps, other]
Title: Detecting Algorithmically Generated Domains Using a GCNN-LSTM Hybrid Neural Network
Authors: Zheng Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2208.03484 [pdf, other]
Title: Towards Interdependent Safety Security Assessments using Bowties
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[65]  arXiv:2208.03505 [pdf, other]
Title: "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers
Comments: Accepted to appear at USENIX Security Symposium 2023 (32nd USENIX Security Symposium, 2023)
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2208.03528 [pdf, other]
Title: MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2208.03541 [pdf, ps, other]
Title: Strong authentication on smart wireless devices
Journal-ref: Second International Conference on Future Generation Communication Technologies (FGCT 2013), pp. 137-142,
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2208.03607 [pdf, ps, other]
Title: Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry
Comments: This is a preprint version of a manuscript accepted in the Journal of Information Warfare. Please cite this paper as: G. Grispos and W.R. Mahoney (2022). Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry. Journal of Information Warfare, Vol. 21 (3), pp. 59-73
Journal-ref: Journal of Information Warfare, Vol. 21 (3), pp. 59-73 (2022)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[69]  arXiv:2208.03631 [pdf, other]
Title: An Enclave-based TEE for SE-in-SoC in RISC-V Industry
Comments: Invited paper of Embedded World 2020
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[70]  arXiv:2208.03781 [pdf, other]
Title: IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures
Comments: Updated as a whole. 25 pages
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2208.03784 [pdf, other]
Title: CoVault: A Secure Analytics Platform
Comments: 13 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72]  arXiv:2208.03806 [pdf, other]
Title: HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2208.03822 [pdf, other]
Title: Garbled EDA: Privacy Preserving Electronic Design Automation
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2208.03837 [pdf, other]
Title: Automatic Security Assessment of GitHub Actions Workflows
Journal-ref: Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2208.03862 [pdf, other]
Title: DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic
Authors: Zhi Liu
Comments: visit DeepTLS at this https URL
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2208.03884 [pdf, ps, other]
Title: Differential biases, $c$-differential uniformity, and their relation to differential attacks
Comments: 14 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[77]  arXiv:2208.03909 [pdf, other]
Title: Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2208.03944 [pdf, other]
Title: Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering
Comments: this https URL&hl=en
Journal-ref: IEEE Transactions on Dependable and Secure Computing (Final version at IEEE, 2024)
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2208.03951 [pdf, ps, other]
Title: Simplifying Electronic Document Digital Signatures
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2208.04591 [pdf, other]
Title: Stronger Privacy Amplification by Shuffling for Rényi and Approximate Differential Privacy
Comments: Errata added. 14 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[81]  arXiv:2208.04624 [pdf, other]
Title: Bottom-up Trust Registry in Self Sovereign Identity
Comments: 10 pages, published in Blockchain Congress Conference 2022
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2208.04676 [pdf, ps, other]
Title: DeepHider: A Covert NLP Watermarking Framework Based on Multi-task Learning
Comments: 16 pages,10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[83]  arXiv:2208.04719 [pdf, other]
Title: STELLA: Sparse Taint Analysis for Enclave Leakage Detection
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[84]  arXiv:2208.04734 [pdf, other]
Title: Weak Equivalents for Nonlinear Filtering Functions
Journal-ref: International Conference on Computational Science and Its Applications, pp. 592-602, 2014
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2208.04838 [pdf, ps, other]
Title: Robust Machine Learning for Malware Detection over Time
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2208.04891 [pdf, other]
Title: Online Malware Classification with System-Wide System Calls in Cloud IaaS
Comments: Accepted at the IEEE 23rd International Conference on Information Reuse and Integration for Data Science
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.04991 [pdf, other]
Title: Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Networking and Internet Architecture (cs.NI)
[88]  arXiv:2208.04999 [pdf, other]
Title: Measuring the Availability and Response Times of Public Encrypted DNS Resolvers
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2208.05073 [pdf, ps, other]
Title: Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 2 Figures, 4 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[90]  arXiv:2208.05085 [pdf, ps, other]
Title: Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 3 figures 4 tables
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2208.05089 [pdf, ps, other]
Title: Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, g figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2208.05101 [pdf, ps, other]
Title: Machine Learning with DBOS
Comments: AIDB@VLDB 2022
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[93]  arXiv:2208.05109 [pdf, other]
Title: Tamperproof IoT with Blockchain
Comments: 3 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2208.05125 [pdf, other]
Title: Cross-chain between a Parent Chain and Multiple Side Chains
Comments: 14 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2208.05168 [pdf, other]
Title: TokenPatronus: A Decentralized NFT Anti-theft Mechanism
Comments: submitted to CESC 2022 as a work-in-progress paper
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2208.05285 [pdf, other]
Title: Explaining Machine Learning DGA Detectors from DNS Traffic Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2208.05343 [pdf, ps, other]
Title: Using query frequencies in tree-based revocation for certificateless authentication in VANETs
Journal-ref: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), pp. 268-273, 2014
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2208.05345 [pdf, ps, other]
Title: RFID authentication protocol based on a novel EPC Gen2 PRNG
Journal-ref: International Information Institute (Tokyo). Information 17 (4), 1587, 2014
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2208.05346 [pdf, ps, other]
Title: Analysis of lightweight cryptographic solutions for authentication in IoT
Journal-ref: International Conference on Computer Aided Systems Theory, 373-380, 2013
Subjects: Cryptography and Security (cs.CR)
[100]  arXiv:2208.05408 [pdf, other]
Title: Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot
Comments: To appear at ConsensusDay 22 (ACM CCS 2022 Workshop)
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2208.05425 [pdf, other]
Title: Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
Comments: This paper is an extended version of a paper accepted to ACM Advances in Financial Techologies - AFT 2022
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2208.05471 [pdf, ps, other]
Title: Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2208.05475 [pdf, ps, other]
Title: Poster: Revocation in VANETs Based on k-ary Huffman Trees
Journal-ref: Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, pp. 25-26, 2015
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2208.05476 [pdf, other]
Title: Sequence Feature Extraction for Malware Family Analysis via Graph Neural Network
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[105]  arXiv:2208.05477 [pdf, other]
Title: Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Comments: 11 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[106]  arXiv:2208.05514 [pdf, ps, other]
Title: Are Gradients on Graph Structure Reliable in Gray-box Attacks?
Comments: Preprint of a full paper accepted by CIKM 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[107]  arXiv:2208.05586 [pdf, other]
Title: Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management
Authors: Vivek Nair, Dawn Song
Comments: To appear in USENIX Security '23
Journal-ref: 32nd USENIX Security Symposium (2023) 2097-2114
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2208.05604 [pdf, other]
Title: Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR
Comments: Learn more at this https URL
Journal-ref: 36th Annual ACM Symposium on User Interface Software and Technology (2023)
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2208.05612 [pdf, other]
Title: SSLEM: A Simplifier for MBA Expressions based on Semi-linear MBA Expressions and Program Synthesis
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[110]  arXiv:2208.05680 [pdf, other]
Title: A Trust-Based Malicious RSU Detection Mechanism in Edge-Enabled Vehicular Ad Hoc Networks
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2208.05707 [pdf, other]
Title: Improving Tourist Experience Through an IoT Application Based on FatBeacons
Journal-ref: International Conference on Ubiquitous Computing and Ambient Intelligence, pp. 149-160, 2017
Subjects: Cryptography and Security (cs.CR)
[112]  arXiv:2208.05734 [pdf, other]
Title: Secure ambient intelligence prototype for airports
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2208.05748 [pdf, other]
Title: Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work Mining
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2208.05750 [pdf, other]
Title: A Survey of MulVAL Extensions and Their Attack Scenarios Coverage
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2208.05865 [pdf, ps, other]
Title: Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms
Comments: 12 pages, 13 eps figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[116]  arXiv:2208.05895 [pdf, other]
Title: Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone
Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2208.05922 [pdf, other]
Title: Privacy Preservation Among Honest-but-Curious Edge Nodes: A Survey
Comments: 12 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[118]  arXiv:2208.06002 [pdf, other]
Title: A review of cryptosystems based on multi layer chaotic mappings
Comments: 10 pages, 1 figure, 3 tables
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2208.06003 [pdf, ps, other]
Title: Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
Comments: IEEE Access, early published by July 14, 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[120]  arXiv:2208.06075 [pdf, other]
Title: Testing SOAR Tools in Use
Journal-ref: Computers & Security 2023
Subjects: Cryptography and Security (cs.CR)
[121]  arXiv:2208.06092 [pdf, other]
Title: On deceiving malware classification with section injection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[122]  arXiv:2208.06130 [pdf, ps, other]
Title: Analysis, Detection, and Classification of Android Malware using System Calls
Comments: 18 pages, 7 table , 3 figures
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2208.06136 [pdf, ps, other]
Title: How far are German companies in improving security through static program analysis tools?
Comments: IEEE Secure Development Conference 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[124]  arXiv:2208.06147 [pdf, ps, other]
Title: Software implementation of the SNOW 3G Generator on iOS and Android platforms
Journal-ref: Logic Journal of IGPL 24 (1), 29-41, 2016
Subjects: Cryptography and Security (cs.CR)
[125]  arXiv:2208.06153 [pdf, ps, other]
Title: How to build vehicular ad-hoc networks on smartphones
Journal-ref: Journal of Systems Architecture 59 (10), 996-1004, 2013
Subjects: Cryptography and Security (cs.CR)
[126]  arXiv:2208.06165 [pdf, other]
Title: Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots
Authors: Chintan Patel
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[127]  arXiv:2208.06223 [pdf, ps, other]
Title: Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Comments: 56 pages, 11 figures. arXiv admin note: text overlap with arXiv:2201.12194
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[128]  arXiv:2208.06231 [pdf, other]
Title: Mutual authentication in self-organized VANETs
Journal-ref: Computer Standards & Interfaces 36 (4), 704-710, 2014
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2208.06481 [pdf, other]
Title: PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data
Comments: Accepted for IEEE Symposium on Visualization in Cyber Security, 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[130]  arXiv:2208.06568 [pdf, other]
Title: On the Limitations of Continual Learning for Malware Classification
Comments: 19 pages, 11 figures, and 2 tables, Accepted at the Conference on Lifelong Learning Agents - CoLLAs 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[131]  arXiv:2208.06592 [pdf, other]
Title: Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[132]  arXiv:2208.06593 [pdf, ps, other]
Title: Analysis and implementation of the SNOW 3G generator used in 4G/LTE systems
Comments: arXiv admin note: substantial text overlap with arXiv:2208.06147
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 499-508, 2014
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2208.06594 [pdf, ps, other]
Title: Using identity-based cryptography in mobile applications
Comments: arXiv admin note: substantial text overlap with arXiv:2208.03541
Journal-ref: International Joint Conference SOCO CISIS ICEUTE, 527-536, 2014
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2208.06628 [pdf, other]
Title: CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks
Subjects: Cryptography and Security (cs.CR)
[135]  arXiv:2208.06692 [pdf, other]
Title: BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[136]  arXiv:2208.06722 [pdf, ps, other]
Title: A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2208.06774 [pdf, other]
Title: Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2208.06943 [pdf, other]
Title: GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing
Comments: 9 pages, 8 tables, 3 figures
Journal-ref: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2022, pp. 10-18
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[139]  arXiv:2208.07049 [pdf, other]
Title: Self-Supervised Vision Transformers for Malware Detection
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[140]  arXiv:2208.07060 [pdf, ps, other]
Title: A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2208.07127 [pdf, other]
Title: Deception for Cyber Defence: Challenges and Opportunities
Journal-ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[142]  arXiv:2208.07189 [pdf, other]
Title: DHSA: Efficient Doubly Homomorphic Secure Aggregation for Cross-silo Federated Learning
Comments: 34 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2208.07310 [pdf, other]
Title: Placement Laundering and the Complexities of Attribution in Online Advertising
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[144]  arXiv:2208.07476 [pdf, other]
Title: CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[145]  arXiv:2208.07489 [pdf, other]
Title: Single Round-trip Hierarchical ORAM via Succinct Indices
Comments: 22 pages, 3 Figures, 5 Tables
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2208.07556 [pdf, other]
Title: pyCANON: A Python library to check the level of anonymity of a dataset
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[147]  arXiv:2208.07570 [pdf, other]
Title: Inhale: Enabling High-Performance and Energy-Efficient In-SRAM Cryptographic Hash for IoT
Comments: 9 pages, ICCAD 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[148]  arXiv:2208.07604 [pdf, ps, other]
Title: Achieve Fully Decentralized End to End Encryption Meeting via Blockchain
Authors: Yang, Tan
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:2208.07700 [pdf, other]
Title: Secure system based on UAV and BLE for improving SAR missions
Journal-ref: Journal of Ambient Intelligence and Humanized Computing 11(8) pp. 3109-3120. 2020
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2208.07701 [pdf, other]
Title: Using blockchain in the follow-up of emergency situations related to events
Journal-ref: Software: Practice and Experience 51(10) pp. 2000-2014. 2021
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2208.07702 [pdf, other]
Title: Priority and collision avoidance system for traffic lights
Journal-ref: Ad Hoc Networks 94(2):101931. 2019
Subjects: Cryptography and Security (cs.CR)
[152]  arXiv:2208.07801 [pdf, other]
Title: Designing an Artificial Immune System inspired Intrusion Detection System
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[153]  arXiv:2208.07825 [pdf, other]
Title: An Adaptive Image Encryption Scheme Guided by Fuzzy Models
Comments: Iranian Journal of Fuzzy Systems (2023)
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[154]  arXiv:2208.07833 [pdf, other]
Title: What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation (Extended Version)
Comments: Wei Zhou and Lan Zhang contributed equally to this work
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2208.07965 [pdf, ps, other]
Title: Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation
Authors: Uchenna D Ani (Keele University), Jeremy D McK Watson (University College London), Nilufer Tuptuk (University College London), Steve Hailes (University College London), Madeline Carr (University College London), Carsten Maple (University of Warwick)
Comments: 7 pages, 5 Figures, Policy Briefing
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2208.07999 [pdf, other]
Title: Evaluating the Feasibility of a Provably Secure Privacy-Preserving Entity Resolution Adaptation of PPJoin using Homomorphic Encryption
Comments: 17 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[157]  arXiv:2208.08009 [pdf, ps, other]
Title: Resource Allocation in Quantum Key Distribution (QKD) for Space-Air-Ground Integrated Networks
Comments: 6 pages, 9 figures, conference paper
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2208.08025 [pdf, other]
Title: AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[159]  arXiv:2208.08071 [pdf, ps, other]
Title: An Efficient Multi-Step Framework for Malware Packing Identification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[160]  arXiv:2208.08093 [pdf, other]
Title: Near Threshold Computation of Partitioned Ring Learning With Error (RLWE) Post Quantum Cryptography on Reconfigurable Architecture
Comments: Manuscript (yet to be published)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[161]  arXiv:2208.08114 [pdf, other]
Title: An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models
Comments: Accepted by CIKM 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[162]  arXiv:2208.08125 [pdf, other]
Title: A Tutorial Introduction to Lattice-based Cryptography and Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[163]  arXiv:2208.08173 [pdf, other]
Title: An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
Comments: ACM Transactions on Software Engineering and Methodology, Association for Computing Machinery, 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[164]  arXiv:2208.08255 [pdf, other]
Title: On the Elements of Datasets for Cyber Physical Systems Security
Authors: Ashraf Tantawy
Comments: Submitted for peer review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Systems and Control (eess.SY)
[165]  arXiv:2208.08433 [pdf, other]
Title: Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System
Comments: Submitted to IEEE SSCI 2022 Conference
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Signal Processing (eess.SP)
[166]  arXiv:2208.08524 [pdf, other]
Title: DF-Captcha: A Deepfake Captcha for Preventing Fake Calls
Authors: Yisroel Mirsky
Comments: A draft academic paper based on and protected by the provisional patent submitted January 1st 2022 under provisional Number 63/302,086. arXiv admin note: text overlap with arXiv:2004.11138
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[167]  arXiv:2208.08540 [pdf, other]
Title: Necessary Conditions in Multi-Server Differential Privacy
Authors: Albert Cheu, Chao Yan
Comments: 22 pages
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2208.08554 [pdf, other]
Title: Embracing Graph Neural Networks for Hardware Security (Invited Paper)
Comments: To appear at ICCAD 2022
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2208.08569 [pdf, other]
Title: ObfuNAS: A Neural Architecture Search-based DNN Obfuscation Approach
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[170]  arXiv:2208.08662 [pdf, other]
Title: Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
Comments: This paper has been accepted for publication at IEEE S&P 2023. Please cite this paper as "Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han. Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. In Proceedings of The 44th IEEE Symposium on Security and Privacy, San Francisco, May 22-26, 2023."
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[171]  arXiv:2208.08689 [pdf, other]
Title: Reverse Engineering of Integrated Circuits: Tools and Techniques
Authors: Abhijitt Dhavlle
Subjects: Cryptography and Security (cs.CR)
[172]  arXiv:2208.08745 [pdf, other]
Title: Profiler: Profile-Based Model to Detect Phishing Emails
Comments: 12 pages
Journal-ref: 42nd IEEE International Conference on Distributed Computing Systems 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[173]  arXiv:2208.08751 [pdf, other]
Title: MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols
Comments: Accepted as a full paper at USENIX Security '21
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2208.08760 [pdf, ps, other]
Title: Blockchain based digital vaccine passport
Subjects: Cryptography and Security (cs.CR)
[175]  arXiv:2208.08820 [pdf, ps, other]
Title: LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Subjects: Cryptography and Security (cs.CR)
[176]  arXiv:2208.08846 [pdf, ps, other]
Title: Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS
Comments: Preprint; submitted to CANS 2022; accepted at CANS 2022 and published in Springer LNCS vol 13641
Journal-ref: In: Beresford, A.R., Patra, A., Bellini, E. (eds) Cryptology and Network Security. CANS 2022. Lecture Notes in Computer Science, vol 13641. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[177]  arXiv:2208.08946 [pdf, other]
Title: Aggregation and probabilistic verification for data authentication in VANETs
Journal-ref: Information Sciences 262, 172-189, 2014
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2208.09011 [pdf, other]
Title: Verifiable Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[179]  arXiv:2208.09030 [pdf, other]
Title: A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[180]  arXiv:2208.09061 [pdf, ps, other]
Title: Mouse Dynamics Behavioral Biometrics: A Survey
Comments: 33, 10 figures, ACM
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2208.09140 [pdf, other]
Title: Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[182]  arXiv:2208.09235 [pdf, ps, other]
Title: A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts
Comments: 9 pages, 6 figures, 3 tables, to be published in ICCAD 2022
Subjects: Cryptography and Security (cs.CR)
[183]  arXiv:2208.09245 [pdf, other]
Title: Deep Joint Source-Channel and Encryption Coding: Secure Semantic Communications
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[184]  arXiv:2208.09281 [pdf, other]
Title: Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API
Journal-ref: Proceedings of ACM International Conference on Embedded Wireless Systems and Networks 2022
Subjects: Cryptography and Security (cs.CR)
[185]  arXiv:2208.09482 [pdf, ps, other]
Title: A New Outlook on the Profitability of Rogue Mining Strategies in the Bitcoin Network
Comments: 21 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[186]  arXiv:2208.09525 [pdf, ps, other]
Title: Glass-Vault: A Generic Transparent Privacy-preserving Exposure Notification Analytics Platform
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[187]  arXiv:2208.09595 [pdf, ps, other]
Title: The Saddle-Point Accountant for Differential Privacy
Comments: 31 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Statistics Theory (math.ST)
[188]  arXiv:2208.09711 [pdf, other]
Title: Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[189]  arXiv:2208.09716 [pdf, other]
Title: zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs
Comments: 8 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[190]  arXiv:2208.09727 [pdf, other]
Title: Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants
Comments: Accepted for publication in USENIX'23. For associated dataset see this https URL 18 pages, 12 figures. G. Sandoval and H. Pearce contributed equally to this work
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2208.09741 [pdf, other]
Title: Sensor Security: Current Progress, Research Challenges, and Future Roadmap
Subjects: Cryptography and Security (cs.CR)
[192]  arXiv:2208.09764 [pdf, other]
Title: GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes
Authors: Mordechai Guri
Journal-ref: 2021 18th International Conference on Privacy, Security and Trust (PST)
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2208.09776 [pdf, other]
Title: Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices
Comments: Extension of arXiv:2201.09338
Subjects: Cryptography and Security (cs.CR)
[194]  arXiv:2208.09852 [pdf, other]
Title: Efficient Multiparty Protocols Using Generalized Parseval's Identity and the Theta Algebra
Comments: 17 pages and 10 Figures
Subjects: Cryptography and Security (cs.CR)
[195]  arXiv:2208.09967 [pdf, other]
Title: Inferring Sensitive Attributes from Model Explanations
Comments: ACM CIKM 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[196]  arXiv:2208.09975 [pdf, other]
Title: ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs
Authors: Mordechai Guri
Subjects: Cryptography and Security (cs.CR)
[197]  arXiv:2208.10134 [pdf, other]
Title: Machine Learning with Confidential Computing: A Systematization of Knowledge
Comments: Survey paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[198]  arXiv:2208.10161 [pdf, other]
Title: MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-Preserving Byzantine-Robust Clustering
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[199]  arXiv:2208.10224 [pdf, other]
Title: Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks
Comments: Code available at: this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[200]  arXiv:2208.10253 [pdf, other]
Title: The Economics of Privacy and Utility: Investment Strategies
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT)
[201]  arXiv:2208.10271 [pdf, other]
Title: Agent-based Model of Initial Token Allocations: Evaluating Wealth Concentration in Fair Launches
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[202]  arXiv:2208.10273 [pdf, other]
Title: Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning
Comments: European Symposium on Research in Computer Security (ESORICS) 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[203]  arXiv:2208.10276 [pdf, other]
Title: An Input-Aware Mimic Defense Theory and its Practice
Subjects: Cryptography and Security (cs.CR)
[204]  arXiv:2208.10278 [pdf, other]
Title: Practical Vertical Federated Learning with Unsupervised Representation Learning
Journal-ref: IEEE Transactions on Big Data (2022) 1-1
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[205]  arXiv:2208.10279 [pdf, other]
Title: Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Comments: 13 Pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[206]  arXiv:2208.10413 [pdf, other]
Title: On Deep Learning in Password Guessing, a Survey
Authors: Fangyi Yu
Comments: 8 pages, 4 figures, 3 tables. arXiv admin note: substantial text overlap with arXiv:2208.06943
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[207]  arXiv:2208.10445 [pdf, other]
Title: Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[208]  arXiv:2208.10602 [pdf, other]
Title: ABL: An original active blacklist based on a modification of the SMTP
Comments: 18 pages, 6 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[209]  arXiv:2208.10605 [pdf, other]
Title: SoK: Explainable Machine Learning for Computer Security Applications
Comments: 13 pages. Accepted at Euro S&P
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[210]  arXiv:2208.10608 [pdf, other]
Title: RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
Comments: Code is available at this https URL
Journal-ref: European Conference on Computer Vision (ECCV 2022)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[211]  arXiv:2208.10618 [pdf, other]
Title: Optimal Bootstrapping of PoW Blockchains
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[212]  arXiv:2208.10629 [pdf, other]
Title: Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[213]  arXiv:2208.10644 [pdf, other]
Title: Machine Learning-Enabled Cyber Attack Prediction and Mitigation for EV Charging Stations
Comments: 5 pages, 4 figures, 11 mathematical equations
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[214]  arXiv:2208.10651 [pdf, other]
Title: ECU Identification using Neural Network Classification and Hyperparameter Tuning
Comments: 6 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[215]  arXiv:2208.10868 [pdf, other]
Title: AppGNN: Approximation-Aware Functional Reverse Engineering using Graph Neural Networks
Comments: To appear at the 2022 International Conference On Computer-Aided Design (ICCAD)
Subjects: Cryptography and Security (cs.CR)
[216]  arXiv:2208.10919 [pdf, other]
Title: Cluster Based Secure Multi-Party Computation in Federated Learning for Histopathology Images
Comments: Accepted at MICCAI 2022 Workshop on Distributed, Collaborative and Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[217]  arXiv:2208.10940 [pdf, other]
Title: Evaluating Out-of-Distribution Detectors Through Adversarial Generation of Outliers
Comments: Code release can be found at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[218]  arXiv:2208.10941 [pdf, other]
Title: A Review of Federated Learning in Energy Systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[219]  arXiv:2208.10943 [pdf, other]
Title: Challenges and Complexities in Machine Learning based Credit Card Fraud Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[220]  arXiv:2208.11062 [pdf, ps, other]
Title: Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System
Comments: Accepted for presentation at ISCISC 2022, Iran
Subjects: Cryptography and Security (cs.CR)
[221]  arXiv:2208.11088 [pdf, other]
Title: Evaluating Synthetic Bugs
Comments: 15 pages
Journal-ref: ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, 716-730
Subjects: Cryptography and Security (cs.CR)
[222]  arXiv:2208.11147 [src]
Title: SoK: Content Moderation Schemes in End-to-End Encrypted Systems
Comments: Inaccuracies and inconsistencies in paper
Subjects: Cryptography and Security (cs.CR)
[223]  arXiv:2208.11149 [src]
Title: Analyzing Trends in Tor
Comments: Inaccuracies and inconsistencies in the paper
Subjects: Cryptography and Security (cs.CR)
[224]  arXiv:2208.11180 [pdf, other]
Title: Auditing Membership Leakages of Multi-Exit Networks
Comments: Accepted by CCS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[225]  arXiv:2208.11202 [pdf, ps, other]
Title: Blockchain Simulators: A Systematic Mapping Study
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[226]  arXiv:2208.11207 [pdf, ps, other]
Title: Investigating the Requirements for Building a Blockchain Simulator for IoT Applications
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[227]  arXiv:2208.11268 [pdf, other]
Title: Reconstruction of the distribution of sensitive data under free-will privacy
Subjects: Cryptography and Security (cs.CR)
[228]  arXiv:2208.11270 [pdf, ps, other]
Title: Adaptive Resource Allocation in Quantum Key Distribution (QKD) for Federated Learning
Comments: 6 pages, 6 figures, and a conference. arXiv admin note: text overlap with arXiv:2208.08009
Subjects: Cryptography and Security (cs.CR)
[229]  arXiv:2208.11304 [pdf, ps, other]
Title: On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols
Comments: 11 pages
Journal-ref: Fundamenta Informaticae, Volume 188, Issue 2 (March 7, 2023) fi:9967
Subjects: Cryptography and Security (cs.CR)
[230]  arXiv:2208.11319 [pdf, other]
Title: Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming (Updated and Extended Version)
Comments: This is the updated and extended version of the work published in 19th Annual International Conference on Privacy, Security and Trust (PST2022), August 22-24, 2022, Fredericton, Canada / Virtual Conference, this https URL
Subjects: Cryptography and Security (cs.CR)
[231]  arXiv:2208.11367 [pdf, other]
Title: Combining AI and AM - Improving Approximate Matching through Transformer Networks
Comments: Published at DFRWS USA 2023 as a conference paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[232]  arXiv:2208.11370 [pdf, other]
Title: Appraisal of a Random Bit Generator Utilizing Smartphone Sensors as Entropy Source
Comments: Submitted to (IEEE) International Conference on Electrical, Computer, Communications and Mechatronics Engineering - ICECCME'22; 16-18 November 2022, Maldives
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[233]  arXiv:2208.11443 [pdf, ps, other]
Title: A Plural Decentralized Identity Frontier: Abstraction v. Composability Tradeoffs in Web3
Comments: 15 pages, 7 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[234]  arXiv:2208.11581 [pdf, other]
Title: "Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine
Comments: 18 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[235]  arXiv:2208.11667 [pdf, other]
Title: Black-box Attacks Against Neural Binary Function Detection
Comments: 16 pages
Journal-ref: The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023), October 16-18, 2023
Subjects: Cryptography and Security (cs.CR)
[236]  arXiv:2208.11693 [pdf, other]
Title: DP2-Pub: Differentially Private High-Dimensional Data Publication with Invariant Post Randomization
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[237]  arXiv:2208.11848 [pdf, other]
Title: On Differential Privacy for Federated Learning in Wireless Systems with Multiple Base Stations
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[238]  arXiv:2208.12003 [pdf, other]
Title: XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Comments: 31th USENIX Security Symposium (USENIX Security 22), 2022
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[239]  arXiv:2208.12031 [pdf, other]
Title: A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[240]  arXiv:2208.12044 [pdf, other]
Title: Fed-FSNet: Mitigating Non-I.I.D. Federated Learning via Fuzzy Synthesizing Network
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[241]  arXiv:2208.12046 [pdf, other]
Title: A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains
Comments: Accepted by IEEE Journal on Selected Areas in Communications
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[242]  arXiv:2208.12144 [pdf, other]
Title: Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study
Comments: 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[243]  arXiv:2208.12216 [pdf, other]
Title: Passive Triangulation Attack on ORide
Subjects: Cryptography and Security (cs.CR)
[244]  arXiv:2208.12248 [pdf, other]
Title: Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations
Authors: Dmitrijs Trizna
Comments: 10 pages, 4 figures, 4 tables. Pre-print, final version may change after peer review
Journal-ref: AISec'22: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, November 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[245]  arXiv:2208.12370 [pdf, other]
Title: COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies
Subjects: Cryptography and Security (cs.CR)
[246]  arXiv:2208.12449 [pdf, other]
Title: Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns
Comments: arXiv admin note: text overlap with arXiv:2108.12726
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[247]  arXiv:2208.12497 [pdf, other]
Title: Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores
Subjects: Cryptography and Security (cs.CR)
[248]  arXiv:2208.12553 [pdf, other]
Title: I still know it's you! On Challenges in Anonymizing Source Code
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL); Software Engineering (cs.SE)
[249]  arXiv:2208.12700 [pdf, other]
Title: Epistemic Parity: Reproducibility as an Evaluation Metric for Differential Privacy
Comments: Preprint. 14 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[250]  arXiv:2208.12729 [pdf, other]
Title: Automated False Positive Filtering for esNetwork Alerts
Authors: Guangyi Zhu (School of Computer Science, University of Guelph, Ontario, Canada)
Subjects: Cryptography and Security (cs.CR)
[251]  arXiv:2208.12836 [pdf, other]
Title: Living-off-the-Land Abuse Detection Using Natural Language Processing and Supervised Learning
Authors: Ryan Stamp (School of Computer Science, University of Guelph, Ontario, Canada)
Subjects: Cryptography and Security (cs.CR)
[252]  arXiv:2208.12875 [pdf, ps, other]
Title: Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[253]  arXiv:2208.12884 [pdf, ps, other]
Title: A Note on Copy-Protection from Random Oracles
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[254]  arXiv:2208.12897 [pdf, other]
Title: ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
Comments: To Appear in 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[255]  arXiv:2208.12900 [pdf, other]
Title: Fat Pointers for Temporal Memory Safety of C
Subjects: Cryptography and Security (cs.CR)
[256]  arXiv:2208.12911 [pdf, other]
Title: Network-Level Adversaries in Federated Learning
Comments: 12 pages. Appearing at IEEE CNS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[257]  arXiv:2208.12938 [pdf, other]
Title: TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
Comments: 13 pages, 9 figures. arXiv admin note: text overlap with arXiv:2104.08767
Subjects: Cryptography and Security (cs.CR)
[258]  arXiv:2208.12960 [pdf, other]
Title: An Automated Analyzer for Financial Security of Ethereum Smart Contracts
Journal-ref: In 32nd USENIX Security Symposium (USENIX Security 2023) (pp. 3367-3383)
Subjects: Cryptography and Security (cs.CR)
[259]  arXiv:2208.13035 [pdf, other]
Title: SoK: Decentralized Finance (DeFi) Attacks
Subjects: Cryptography and Security (cs.CR)
[260]  arXiv:2208.13087 [pdf, ps, other]
Title: Information Security Management in High Quality IS Journals: A Review and Research Agenda
Subjects: Cryptography and Security (cs.CR)
[261]  arXiv:2208.13232 [pdf, other]
Title: Categorical composable cryptography: extended version
Comments: Extended version of arXiv:2105.05949 which appeared in FoSSaCS 2022
Journal-ref: Logical Methods in Computer Science, Volume 19, Issue 4 (December 18, 2023) lmcs:9979
Subjects: Cryptography and Security (cs.CR); Category Theory (math.CT)
[262]  arXiv:2208.13249 [pdf, ps, other]
Title: DP-PSI: Private and Secure Set Intersection
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[263]  arXiv:2208.13278 [pdf, other]
Title: Shedding Light on the Targeted Victim Profiles of Malicious Downloaders
Comments: Published in the proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22)
Subjects: Cryptography and Security (cs.CR)
[264]  arXiv:2208.13343 [pdf, other]
Title: IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks
Authors: Steve Kerrison
Comments: Submitted and accepted into 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress. Submitted version: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[265]  arXiv:2208.13361 [pdf, other]
Title: NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Comments: 37 pages
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[266]  arXiv:2208.13524 [pdf, other]
Title: Lateral Movement Detection Using User Behavioral Analysis
Comments: Contains 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[267]  arXiv:2208.13583 [pdf, other]
Title: MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[268]  arXiv:2208.13720 [pdf, other]
Title: Demystifying Arch-hints for Model Extraction: An Attack in Unified Memory System
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[269]  arXiv:2208.13884 [pdf, other]
Title: Toward a Mathematical Vulnerability Propagation and Defense Model in Smart Grid Networks
Comments: 7 pages, 20 figures
Subjects: Cryptography and Security (cs.CR)
[270]  arXiv:2208.13885 [pdf, ps, other]
Title: Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges
Comments: To Appear in 2022 19th International SoC Conference (ISOCC 2022), October 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[271]  arXiv:2208.13893 [pdf, ps, other]
Title: Data Isotopes for Data Provenance in DNNs
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[272]  arXiv:2208.14062 [pdf, ps, other]
Title: Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations
Subjects: Cryptography and Security (cs.CR)
[273]  arXiv:2208.14127 [pdf, other]
Title: Solving the Capsulation Attack against Backdoor-based Deep Neural Network Watermarks by Reversing Triggers
Subjects: Cryptography and Security (cs.CR)
[274]  arXiv:2208.14174 [pdf, other]
Title: Semantics and Non-Fungible Tokens for Copyright Management on the Metaverse and Beyond
Comments: 16 pages, 6 figures, 2 listings
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Multimedia (cs.MM)
[275]  arXiv:2208.14191 [pdf, other]
Title: FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[276]  arXiv:2208.14194 [pdf, ps, other]
Title: Survey on Architectural Attacks: A Unified Classification and Attack Model
Subjects: Cryptography and Security (cs.CR)
[277]  arXiv:2208.14205 [pdf, ps, other]
Title: One Year of DDoS Attacks Against a Cloud Provider: an Overview
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[278]  arXiv:2208.14221 [pdf, other]
Title: AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method
Subjects: Cryptography and Security (cs.CR)
[279]  arXiv:2208.14225 [pdf, ps, other]
Title: Cyberattacks on Energy Infrastructures: Modern War Weapons
Subjects: Cryptography and Security (cs.CR)
[280]  arXiv:2208.14270 [pdf, other]
Title: Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography
Comments: 6 pages, accepted by 35th IEEE Int. Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[281]  arXiv:2208.14367 [pdf, other]
Title: Software Update Practices on Smart Home IoT Devices
Comments: 12 pages, 14 figures, 4 tables. Submitted to ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '22)
Subjects: Cryptography and Security (cs.CR)
[282]  arXiv:2208.14414 [pdf, other]
Title: On the (Im)Possibility of Estimating Various Notions of Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[283]  arXiv:2208.14510 [pdf, ps, other]
Title: Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism
Subjects: Cryptography and Security (cs.CR)
[284]  arXiv:2208.14530 [pdf, other]
Title: $MC^2$: Rigorous and Efficient Directed Greybox Fuzzing
Comments: To Appear in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22)
Subjects: Cryptography and Security (cs.CR)
[285]  arXiv:2208.14616 [pdf, other]
Title: PBAG: A Privacy-Preserving Blockchain-based Authentication Protocol with Global-updated Commitment in IoV
Subjects: Cryptography and Security (cs.CR)
[286]  arXiv:2208.14627 [pdf, ps, other]
Title: Application of Data Encryption in Chinese Named Entity Recognition
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[287]  arXiv:2208.14674 [pdf, other]
Title: A Survey of Security and Privacy Issues in V2X Communication Systems
Journal-ref: ACM Computing Surveys, August 2022
Subjects: Cryptography and Security (cs.CR)
[288]  arXiv:2208.14727 [pdf, other]
Title: A Finite-Automaton Based Stream Cipher As a Quasigroup Based Cipher
Authors: Pál Dömösi (Debrecen University & Nyíregyháza University), Adama Diene (United Arab Emirates University)
Comments: In Proceedings NCMA 2022, arXiv:2208.13015
Journal-ref: EPTCS 367, 2022, pp. 81-87
Subjects: Cryptography and Security (cs.CR)
[289]  arXiv:2208.14933 [pdf, other]
Title: Membership Inference Attacks by Exploiting Loss Trajectory
Comments: Accepted by CCS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[290]  arXiv:2208.14937 [pdf, ps, other]
Title: Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
Comments: Accepted by IEEE Access
Journal-ref: IEEE Access 2022
Subjects: Cryptography and Security (cs.CR)
[291]  arXiv:2208.14942 [pdf, other]
Title: Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications
Journal-ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[292]  arXiv:2208.14971 [pdf, other]
Title: Zero-day DDoS Attack Detection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[293]  arXiv:2208.00081 (cross-list from cs.LG) [pdf, other]
Title: Sampling Attacks on Meta Reinforcement Learning: A Minimax Formulation and Complexity Analysis
Comments: updates: github repo posted
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[294]  arXiv:2208.00094 (cross-list from cs.LG) [pdf, other]
Title: Robust Trajectory Prediction against Adversarial Attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[295]  arXiv:2208.00218 (cross-list from cs.IT) [pdf, other]
Title: Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key Generation
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[296]  arXiv:2208.00539 (cross-list from cs.CV) [pdf, other]
Title: Is current research on adversarial robustness addressing the right problem?
Authors: Ali Borji
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[297]  arXiv:2208.00862 (cross-list from cs.LG) [pdf, other]
Title: Attacking Adversarial Defences by Smoothing the Loss Landscape
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[298]  arXiv:2208.01595 (cross-list from cs.SE) [pdf, other]
Title: Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[299]  arXiv:2208.01693 (cross-list from cs.CL) [pdf, other]
Title: Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Journal-ref: Workshop on Machine Learning for Cybersecurity, 2022 International Conference on Machine Learning
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[300]  arXiv:2208.01819 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Camouflage for Node Injection Attack on Graphs
Comments: Published in Information Sciences. Code: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[301]  arXiv:2208.01946 (cross-list from cs.DC) [pdf, other]
Title: Mixed Fault Tolerance Protocols with Trusted Execution Environment
Authors: Mingyuan Gao (1), Hung Dang (2), Ee-Chien Chang (1), Jialin Li (1) ((1) National University of Singapore, Singapore (2) FPT Blockchain Lab, Vietnam)
Comments: 12 pages, 3 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[302]  arXiv:2208.02177 (cross-list from cs.NI) [pdf, other]
Title: On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives
Comments: 42 pages, 14 figures, to be published in Journal of Network and Systems Management - Special Issue on Blockchains and Distributed Ledgers in Network and Service Management
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[303]  arXiv:2208.02250 (cross-list from cs.SD) [pdf, ps, other]
Title: Adversarial Attacks on ASR Systems: An Overview
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[304]  arXiv:2208.02304 (cross-list from cs.LG) [pdf, other]
Title: How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[305]  arXiv:2208.02369 (cross-list from cs.AI) [pdf, other]
Title: Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework
Comments: 12 pages, 3 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[306]  arXiv:2208.02482 (cross-list from cs.CV) [pdf, other]
Title: Privacy Safe Representation Learning via Frequency Filtering Encoder
Comments: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety (AISafety 2022)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[307]  arXiv:2208.02556 (cross-list from cs.CV) [pdf, other]
Title: Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Comments: arXiv admin note: text overlap with arXiv:2205.12041
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[308]  arXiv:2208.02587 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption
Comments: 26 pages; 1 Figure; 7 Tables. arXiv admin note: text overlap with arXiv:2205.13265
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[309]  arXiv:2208.02759 (cross-list from cs.HC) [pdf, other]
Title: New Differential Privacy Communication Pipeline and Design Framework
Comments: poster
Journal-ref: The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[310]  arXiv:2208.02868 (cross-list from cs.LG) [pdf, other]
Title: GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation
Comments: This article will be presented in the International Conference on Compilers, Architectures, and Synthesis for Embedded Systems (CASES) 2022 and will appear as part of the ESWEEK-TCAD special issue
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[311]  arXiv:2208.02878 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Counterfactuals via Functional Mechanism
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[312]  arXiv:2208.02905 (cross-list from cs.CY) [pdf, other]
Title: Can the Government Compel Decryption? Don't Trust -- Verify
Comments: 16 pages. This is the full version of a forthcoming publication in Proceedings of the 2022 Symposium on Computer Science and Law (DOI: 10.1145/3511265.3550441)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[313]  arXiv:2208.03111 (cross-list from cs.LG) [pdf, other]
Title: Data-free Backdoor Removal based on Channel Lipschitzness
Comments: Accepted to ECCV 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[314]  arXiv:2208.03309 (cross-list from cs.LG) [pdf, other]
Title: Lethal Dose Conjecture on Data Poisoning
Comments: 36th Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[315]  arXiv:2208.03392 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions
Comments: Accepted at IEEE Internet of Things Journal
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[316]  arXiv:2208.03409 (cross-list from cs.LG) [pdf, other]
Title: DP$^2$-VAE: Differentially Private Pre-trained Variational Autoencoders
Comments: The privacy analysis in the first version is incorrect
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[317]  arXiv:2208.03466 (cross-list from cs.CY) [pdf, ps, other]
Title: Preventing or Mitigating Adversarial Supply Chain Attacks; a legal analysis
Comments: 23 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[318]  arXiv:2208.03567 (cross-list from cs.LG) [pdf, other]
Title: Proof-of-Learning is Currently More Broken Than You Think
Comments: Published in IEEE EuroS&P 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[319]  arXiv:2208.03948 (cross-list from cs.CV) [pdf, other]
Title: AWEncoder: Adversarial Watermarking Pre-trained Encoders in Contrastive Learning
Comments: this https URL&hl=en
Journal-ref: Applied Sciences (2023)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[320]  arXiv:2208.04061 (cross-list from cs.IT) [pdf, ps, other]
Title: Efficient Description of some Classes of Codes using Group Algebras
Comments: A shortened version was submitted to MTNS 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[321]  arXiv:2208.04135 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Attacks on Image Generation With Made-Up Words
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[322]  arXiv:2208.04692 (cross-list from cs.SE) [pdf, other]
Title: A Tutorial on the Interoperability of Self-sovereign Identities
Comments: Submitted to IEEE Communications Surveys & Tutorials
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[323]  arXiv:2208.04733 (cross-list from cs.NI) [pdf, ps, other]
Title: Secure Implementation of a Vehicular Application for the Symbian Platform
Journal-ref: International Journal on Information Technologies & Security 4(2), 2012
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[324]  arXiv:2208.04767 (cross-list from cs.LG) [pdf, other]
Title: Combining Variational Modeling with Partial Gradient Perturbation to Prevent Deep Gradient Leakage
Comments: 21 pages, 14 figures, 6 tables (supplementary material included). This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[325]  arXiv:2208.04836 (cross-list from cs.NI) [pdf, ps, other]
Title: Non-Fungible Tokens in Business and Management -- A Review
Comments: This is an author version of our paper submitted to a journal
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[326]  arXiv:2208.04903 (cross-list from cs.SI) [pdf, other]
Title: Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings
Journal-ref: 2023 32nd International Conference on Computer Communications and Networks (ICCCN)
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[327]  arXiv:2208.04943 (cross-list from cs.LG) [pdf, other]
Title: PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[328]  arXiv:2208.04946 (cross-list from cs.LG) [pdf, other]
Title: Attention Hijacking in Trojan Transformers
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[329]  arXiv:2208.05009 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Aware Adversarial Network in Human Mobility Prediction
Comments: 15 pages, PoPETs'23, July 10--14, 2023, Lausanne, Switzerland. arXiv admin note: substantial text overlap with arXiv:2201.07519
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[330]  arXiv:2208.05083 (cross-list from cs.LG) [pdf, other]
Title: Reducing Exploitability with Population Based Training
Comments: Presented at New Frontiers in Adversarial Machine Learning Workshop, ICML 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[331]  arXiv:2208.05264 (cross-list from cs.DS) [pdf, other]
Title: Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure
Comments: Version 2 14 pages, Accepted in IEEE Transactions on Data and Knowledge Engineering, 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[332]  arXiv:2208.05339 (cross-list from cs.DC) [pdf, other]
Title: Distributed Attestation Revocation in Self-Sovereign Identity
Comments: 8 pages, accepted at Local Computer Networks 2022, LCN 2022
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[333]  arXiv:2208.05740 (cross-list from cs.LG) [pdf, other]
Title: General Cutting Planes for Bound-Propagation-Based Neural Network Verification
Comments: Accepted by NeurIPS 2022. GCP-CROWN is part of the alpha-beta-CROWN verifier, the VNN-COMP 2022 winner
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Optimization and Control (math.OC); Machine Learning (stat.ML)
[334]  arXiv:2208.05907 (cross-list from cs.IT) [pdf, other]
Title: Absolute Security in High-Frequency Wireless Links
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[335]  arXiv:2208.05969 (cross-list from cs.LG) [pdf, other]
Title: Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment
Comments: Accepted by ASE2022. Camera-ready Version
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[336]  arXiv:2208.06093 (cross-list from cs.LG) [pdf, other]
Title: Scalable and Sparsity-Aware Privacy-Preserving K-means Clustering with Application to Fraud Detection
Comments: 10 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[337]  arXiv:2208.06095 (cross-list from cs.LG) [pdf, other]
Title: A Fast Blockchain-based Federated Learning Framework with Compressed Communications
Comments: To appear in IEEE Journal on Selected Areas in Communications (JSAC)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[338]  arXiv:2208.06135 (cross-list from cs.LG) [pdf, other]
Title: Private Domain Adaptation from a Public Source
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[339]  arXiv:2208.06163 (cross-list from cs.LG) [pdf, other]
Title: Dropout is NOT All You Need to Prevent Gradient Leakage
Comments: 25 pages, 17 figures, 9 tables (supplementary material included)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[340]  arXiv:2208.06176 (cross-list from cs.LG) [pdf, other]
Title: A Knowledge Distillation-Based Backdoor Attack in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[341]  arXiv:2208.06265 (cross-list from cs.IR) [pdf, other]
Title: Trustworthy Recommender Systems
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[342]  arXiv:2208.06405 (cross-list from cs.LG) [pdf, other]
Title: Collective Obfuscation and Crowdsourcing
Comments: 9 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[343]  arXiv:2208.06432 (cross-list from cs.DC) [pdf, other]
Title: Hybrid On/Off Blockchain Approach for Vehicle Data Management, Processing and Visualization Exemplified by the ADAPT Platform
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[344]  arXiv:2208.06537 (cross-list from cs.LG) [pdf, other]
Title: Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[345]  arXiv:2208.06538 (cross-list from cs.LG) [pdf, other]
Title: MaskBlock: Transferable Adversarial Examples with Bayes Approach
Comments: Under Review
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[346]  arXiv:2208.06651 (cross-list from cs.SI) [pdf, other]
Title: Revisiting Adversarial Attacks on Graph Neural Networks for Graph Classification
Comments: 13 pages, 7 figures
Journal-ref: IEEE Transactions on Knowledge and Data Engineering 2023 (IEEE TKDE 2023)
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[347]  arXiv:2208.06767 (cross-list from cs.NI) [pdf, other]
Title: IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation
Comments: Accepted to S&P '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[348]  arXiv:2208.06946 (cross-list from cs.AI) [pdf, other]
Title: Targeted Honeyword Generation with Language Models
Comments: 8 pages, 7 tables, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[349]  arXiv:2208.06963 (cross-list from cs.IT) [pdf, ps, other]
Title: Privacy-Preserving Decentralized Inference with Graph Neural Networks in Wireless Networks
Comments: This paper has been accepted by TWC
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[350]  arXiv:2208.07119 (cross-list from cs.SE) [pdf, other]
Title: Xscope: Hunting for Cross-Chain Bridge Attacks
Comments: To appear at the Tool Demonstration Track of ASE'22. Please cite the conference version
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[351]  arXiv:2208.07241 (cross-list from cs.CV) [pdf, other]
Title: HEFT: Homomorphically Encrypted Fusion of Biometric Templates
Comments: IJCB 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[352]  arXiv:2208.07272 (cross-list from cs.LG) [pdf, other]
Title: Training-Time Attacks against k-Nearest Neighbors
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[353]  arXiv:2208.07316 (cross-list from cs.CL) [pdf, other]
Title: MENLI: Robust Evaluation Metrics from Natural Language Inference
Comments: TACL 2023 Camera-ready version; updated after proofreading by the journal
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[354]  arXiv:2208.07353 (cross-list from cs.LG) [pdf, other]
Title: Easy Differentially Private Linear Regression
Comments: This version corresponds to the camera-ready at ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[355]  arXiv:2208.07410 (cross-list from cs.DS) [pdf, ps, other]
Title: Private Query Release via the Johnson-Lindenstrauss Transform
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[356]  arXiv:2208.07922 (cross-list from cs.LG) [pdf, other]
Title: FedPerm: Private and Robust Federated Learning by Parameter Permutation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[357]  arXiv:2208.07978 (cross-list from cs.DC) [pdf, other]
Title: Enhancing Heterogeneous Federated Learning with Knowledge Extraction and Multi-Model Fusion
Comments: Accept at the 4th workshop on Artificial Intelligence and Machine Learning for Scientific Applications (AI4S), SC 23
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[358]  arXiv:2208.07984 (cross-list from cs.LG) [pdf, other]
Title: Private Estimation with Public Data
Comments: 55 pages; updated funding acknowledgement + simulation results from NeurIPS 2022 camera-ready
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[359]  arXiv:2208.07993 (cross-list from cs.DC) [pdf, other]
Title: Recent Advances of Blockchain and its Applications
Authors: Xiao Li, Weili Wu
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[360]  arXiv:2208.08052 (cross-list from cs.CV) [pdf, other]
Title: Imperceptible and Robust Backdoor Attack in 3D Point Cloud
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[361]  arXiv:2208.08085 (cross-list from cs.LG) [pdf, other]
Title: Detection and Mitigation of Byzantine Attacks in Distributed Training
Comments: 21 pages, 17 figures, 6 tables. The material in this work appeared in part at arXiv:2108.02416 which has been published at the 2022 IEEE International Symposium on Information Theory
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[362]  arXiv:2208.08193 (cross-list from cs.HC) [pdf, other]
Title: A Survey of User Perspectives on Security and Privacy in a Home Networking Environment
Comments: 35 pages, Published in ACM Computing Surveys
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[363]  arXiv:2208.08270 (cross-list from cs.LG) [pdf, other]
Title: On the Privacy Effect of Data Enhancement via the Lens of Memorization
Comments: Accepted by IEEE TIFS, 17 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[364]  arXiv:2208.08677 (cross-list from cs.CV) [pdf, other]
Title: Enhancing Targeted Attack Transferability via Diversified Weight Pruning
Comments: 8 pages + Appendix
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[365]  arXiv:2208.08697 (cross-list from cs.LG) [pdf, other]
Title: Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[366]  arXiv:2208.09070 (cross-list from cs.AR) [pdf, ps, other]
Title: Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[367]  arXiv:2208.09195 (cross-list from cs.CV) [pdf, other]
Title: Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[368]  arXiv:2208.09365 (cross-list from cs.DS) [src]
Title: A Simple Differentially Private Algorithm for Global Minimum Cut
Authors: George Z. Li
Comments: There is an error in the privacy argument. The algorithm only outputs t such that the minimum s-t cut (S_t,V-S_t) gives an O(log n/eps) approximation. There is currently no way to privately compute min s-t cut, so this doesn't do anything
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[369]  arXiv:2208.09744 (cross-list from cs.DB) [pdf, other]
Title: A Neural Approach to Spatio-Temporal Data Release with User-Level Differential Privacy
Comments: SIGMOD 2023
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[370]  arXiv:2208.09800 (cross-list from cs.AR) [pdf, other]
Title: Zeno: A Scalable Capability-Based Secure Architecture
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[371]  arXiv:2208.09801 (cross-list from cs.CV) [pdf, other]
Title: PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[372]  arXiv:2208.09872 (cross-list from cs.LG) [pdf, other]
Title: Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks
Comments: Accepted at ASE 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[373]  arXiv:2208.09894 (cross-list from cs.LG) [pdf, ps, other]
Title: Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning
Comments: IEEE Transactions on Information Forensics and Security 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[374]  arXiv:2208.09937 (cross-list from cs.GT) [pdf, other]
Title: An Incentive-Compatible Mechanism for Decentralized Storage Network
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[375]  arXiv:2208.10120 (cross-list from cs.DC) [pdf, ps, other]
Title: A Survey of Distributed Ledger Technology for IoT Verticals
Comments: Preprint submitted to ACM Computing Surveys
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Databases (cs.DB); Networking and Internet Architecture (cs.NI)
[376]  arXiv:2208.10231 (cross-list from cs.CV) [pdf, other]
Title: An anomaly detection approach for backdoored neural networks: face recognition as a case study
Comments: Accepted at Biosig 2022, 8 pages, 4 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[377]  arXiv:2208.10269 (cross-list from cs.GT) [pdf, ps, other]
Title: To EVM or Not to EVM: Blockchain Compatibility and Network Effects
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[378]  arXiv:2208.10400 (cross-list from cs.CL) [pdf, other]
Title: DP-Rewrite: Towards Reproducibility and Transparency in Differentially Private Text Rewriting
Comments: Accepted at COLING 2022
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[379]  arXiv:2208.10478 (cross-list from cs.IT) [pdf, other]
Title: Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
Comments: A shorter version of this work is accepted to be presented at ITW 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[380]  arXiv:2208.10481 (cross-list from cs.LG) [pdf, other]
Title: BARReL: Bottleneck Attention for Adversarial Robustness in Vision-Based Reinforcement Learning
Comments: 5 pages, 2 figures, 3 tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Robotics (cs.RO)
[381]  arXiv:2208.10497 (cross-list from cs.SD) [pdf, other]
Title: Are disentangled representations all you need to build speaker anonymization systems?
Authors: Pierre Champion (MULTISPEECH, LIUM), Denis Jouvet (MULTISPEECH), Anthony Larcher (LIUM)
Journal-ref: INTERSPEECH 2022 - Human and Humanizing Speech Technology, Sep 2022, incheon, South Korea
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[382]  arXiv:2208.10553 (cross-list from cs.CV) [pdf, ps, other]
Title: Split-U-Net: Preventing Data Leakage in Split Learning for Collaborative Multi-Modal Brain Tumor Segmentation
Comments: Accepted to DeCaF 2022 held in conjunction with MICCAI 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[383]  arXiv:2208.10674 (cross-list from cs.LG) [pdf, other]
Title: Decentralized Collaborative Learning with Probabilistic Data Protection
Comments: Tsuyoshi Id\'e and Rudy Raymond, "Decentralized Collaborative Learning with Probabilistic Data Protection," In Proceedings of the 2021 IEEE International Conference on Smart Data Services (SMDS 21, September 5-10, 2021, virtual), pp.234-243
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[384]  arXiv:2208.10773 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Vulnerability of Temporal Feature Networks for Object Detection
Comments: Accepted for publication at ECCV 2022 SAIAD workshop
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[385]  arXiv:2208.10820 (cross-list from cs.HC) [pdf, other]
Title: "Am I Private and If So, how Many?" - Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats
Authors: Daniel Franzen (1), Saskia Nuñez von Voigt (2), Peter Sörries (1), Florian Tschorsch (2), Claudia Müller-Birn (1) ((1) Freie Universität Berlin, (2) Technische Universität Berlin)
Comments: Accepted to ACM CCS 2022. arXiv admin note: substantial text overlap with arXiv:2204.04061
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[386]  arXiv:2208.10878 (cross-list from cs.LG) [pdf, other]
Title: Transferability Ranking of Adversarial Examples
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[387]  arXiv:2208.10888 (cross-list from cs.LG) [pdf, other]
Title: Joint Privacy Enhancement and Quantization in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[388]  arXiv:2208.10973 (cross-list from cs.CV) [pdf, other]
Title: Robust and Large-Payload DNN Watermarking via Fixed, Distribution-Optimized, Weights
Comments: 14 pages, 8 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[389]  arXiv:2208.11231 (cross-list from cs.LG) [pdf, other]
Title: Exact Penalty Method for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[390]  arXiv:2208.11264 (cross-list from cs.LG) [pdf, other]
Title: Towards an Awareness of Time Series Anomaly Detection Models' Adversarial Vulnerability
Comments: Part of Proceedings of the 31st ACM International Conference on Information and Knowledge Management (CIKM '22)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[391]  arXiv:2208.11278 (cross-list from cs.LG) [pdf, other]
Title: Federated Self-Supervised Contrastive Learning and Masked Autoencoder for Dermatological Disease Diagnosis
Comments: arXiv admin note: substantial text overlap with arXiv:2202.07470
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[392]  arXiv:2208.11280 (cross-list from cs.SE) [pdf, other]
Title: What are the Practices for Secret Management in Software Artifacts?
Comments: 8 pages, 2 figures. This paper is to be published in IEEE Secure Development Conference, 2022
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[393]  arXiv:2208.11290 (cross-list from cs.LG) [pdf, other]
Title: ADMoE: Anomaly Detection with Mixture-of-Experts from Noisy Labels
Comments: AAAI 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[394]  arXiv:2208.11311 (cross-list from cs.LG) [pdf, other]
Title: Federated Learning via Decentralized Dataset Distillation in Resource-Constrained Edge Environments
Comments: Accepted at IJCNN 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[395]  arXiv:2208.11342 (cross-list from cs.CV) [pdf, other]
Title: Discovering Transferable Forensic Features for CNN-generated Images Detection
Comments: ECCV 2022 Oral; 35 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[396]  arXiv:2208.11582 (cross-list from cs.SI) [pdf, other]
Title: Graphical Models of False Information and Fact Checking Ecosystems
Subjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[397]  arXiv:2208.11669 (cross-list from cs.LG) [pdf, other]
Title: Towards Sparsified Federated Neuroimaging Models via Weight Pruning
Comments: Accepted to 3rd MICCAI Workshop on Distributed, Collaborative and Federated Learning (DeCaF, 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV); Quantitative Methods (q-bio.QM)
[398]  arXiv:2208.11898 (cross-list from cs.HC) [pdf, other]
Title: Embedding Privacy Into Design Through Software Developers: Challenges & Solutions
Comments: To be published in "IEEE Security & Privacy: Special Issue on Usable Security for Security Workers" 11 pages, 4 figures
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[399]  arXiv:2208.11900 (cross-list from cs.LG) [pdf, other]
Title: Credit card fraud detection - Classifier selection strategy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[400]  arXiv:2208.11904 (cross-list from cs.LG) [pdf, other]
Title: Empirical study of Machine Learning Classifier Evaluation Metrics behavior in Massively Imbalanced and Noisy data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[401]  arXiv:2208.12230 (cross-list from cs.LG) [pdf, other]
Title: Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm
Comments: 8 pages conference paper, accepted for publication in IEEE GLOBECOM 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[402]  arXiv:2208.12268 (cross-list from cs.LG) [pdf, other]
Title: FedPrompt: Communication-Efficient and Privacy Preserving Prompt Tuning in Federated Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[403]  arXiv:2208.12294 (cross-list from cs.LG) [pdf, other]
Title: DPAUC: Differentially Private AUC Computation in Federated Learning
Comments: The Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Track on Safe and Robust AI. arXiv admin note: substantial text overlap with arXiv:2205.12412
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[404]  arXiv:2208.12348 (cross-list from cs.LG) [pdf, other]
Title: SNAP: Efficient Extraction of Private Properties with Poisoning
Comments: 28 pages, 16 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[405]  arXiv:2208.12392 (cross-list from cs.AR) [pdf, other]
Title: DiVa: An Accelerator for Differentially Private Machine Learning
Comments: Accepted for publication at the 55th IEEE/ACM International Symposium on Microarchitecture (MICRO-55), 2022
Subjects: Hardware Architecture (cs.AR); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[406]  arXiv:2208.12612 (cross-list from cs.CY) [pdf, ps, other]
Title: Evaluating virtual laboratory platforms for supporting on-line information security courses
Authors: Monther Aldwairi
Journal-ref: Global Journal of Engineering Education,Volume 24, Number 2, 2022
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[407]  arXiv:2208.12708 (cross-list from cs.LG) [pdf, other]
Title: Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits
Comments: 8 pages, 5 figures, 3 tables, preprint version, currently under review
Subjects: Machine Learning (cs.LG); Computational Engineering, Finance, and Science (cs.CE); Cryptography and Security (cs.CR)
[408]  arXiv:2208.12878 (cross-list from cs.LG) [pdf, other]
Title: DETERRENT: Detecting Trojans using Reinforcement Learning
Comments: Published in 2022 Design Automation Conference (DAC)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[409]  arXiv:2208.13032 (cross-list from cs.LG) [pdf, other]
Title: RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency IoT systems
Comments: Published in IEEE Transactions on Network Science and Engineering
Journal-ref: Volume: 9, Issue: 4, 01 July-Aug. 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[410]  arXiv:2208.13049 (cross-list from cs.LG) [pdf, other]
Title: TrojViT: Trojan Insertion in Vision Transformers
Comments: 10 pages, 4 figures, 11 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[411]  arXiv:2208.13058 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Comments: The first two authors contributed equally. To appear in the proceedings of NDSS 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[412]  arXiv:2208.13066 (cross-list from cs.SD) [src]
Title: SA: Sliding attack for synthetic speech detection with resistance to clipping and self-splicing
Comments: Updated description and formula
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[413]  arXiv:2208.13135 (cross-list from cs.CV) [pdf, other]
Title: An Access Control Method with Secret Key for Semantic Segmentation Models
Comments: To appear in the International Conference on Machine Learning and Cybernetics 2022 (ICMLC 2022)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[414]  arXiv:2208.13182 (cross-list from cs.LG) [pdf, other]
Title: Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
Comments: To appear in CIKM 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[415]  arXiv:2208.13325 (cross-list from cs.IT) [pdf, other]
Title: Lattice Codes for Lattice-Based PKE
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[416]  arXiv:2208.13560 (cross-list from cs.PL) [pdf, ps, other]
Title: From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[417]  arXiv:2208.13617 (cross-list from cs.DC) [pdf, other]
Title: Simple Rigs Hold Fast
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[418]  arXiv:2208.13663 (cross-list from cs.LG) [pdf, ps, other]
Title: Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning
Comments: Accepted at International Joint Conferences on Artificial Intelligence (IJCAI) 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[419]  arXiv:2208.13685 (cross-list from cs.LG) [pdf, other]
Title: FedEgo: Privacy-preserving Personalized Federated Graph Learning with Ego-graphs
Comments: 25 pages, submitted to ACM Transactions on Knowledge Discovery from Data (TKDD)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[420]  arXiv:2208.13838 (cross-list from cs.LG) [pdf, other]
Title: Towards Adversarial Purification using Denoising AutoEncoders
Comments: Submitted to AAAI 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[421]  arXiv:2208.13904 (cross-list from cs.LG) [pdf, other]
Title: Reducing Certified Regression to Certified Classification for General Poisoning Attacks
Comments: Accepted at the 1st IEEE conference on Secure and Trustworthy Machine Learning (SaTML'23)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[422]  arXiv:2208.14302 (cross-list from cs.CV) [pdf, other]
Title: A Black-Box Attack on Optical Character Recognition Systems
Comments: 11 Pages, CVMI-2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[423]  arXiv:2208.14417 (cross-list from cs.LG) [pdf, other]
Title: Fraud Dataset Benchmark and Applications
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[424]  arXiv:2208.14611 (cross-list from cs.LG) [pdf, other]
Title: Non-readily identifiable data collaboration analysis for multiple datasets including personal information
Comments: 19 pages, 3 figures, 7 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[425]  arXiv:2208.14892 (cross-list from cs.NI) [pdf, other]
Title: Protecting Critical Inter-Domain Communication through Flyover Reservations
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[426]  arXiv:2208.14920 (cross-list from cs.NI) [pdf, other]
Title: An Anonymous Overlay Routing Protocol for Uplink-Intensive Applications
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[427]  arXiv:2208.14947 (cross-list from cs.DC) [pdf, ps, other]
Title: Secure and Distributed Assessment of Privacy-Preserving Releases of GWAS
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[428]  arXiv:2208.14964 (cross-list from cs.LG) [pdf, other]
Title: Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[429]  arXiv:2208.01847 (cross-list from quant-ph) [pdf, ps, other]
Title: Advance sharing of quantum shares for classical secrets
Comments: 11 pages, 1 figure, 1 table. Publisher's open access PDF. Results unchanged. This research was in part presented at QCrypt 2022, Taipei City, Taiwan, August 29-September 2, 2022
Journal-ref: IEEE Access, vol.10, pp. 94458-94468, Sept. 2022
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[430]  arXiv:2208.02468 (cross-list from math.GR) [pdf, ps, other]
Title: On Compression Functions over Small Groups with Applications to Cryptography
Authors: Koji Nuida
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[431]  arXiv:2208.02724 (cross-list from eess.SP) [pdf, other]
Title: Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[432]  arXiv:2208.04845 (cross-list from math.OC) [pdf, ps, other]
Title: Quantization enabled Privacy Protection in Decentralized Stochastic Optimization
Comments: Accepted to IEEE Transactions on Automatic Control as a full paper. arXiv admin note: text overlap with arXiv:2205.03884
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[433]  arXiv:2208.06228 (cross-list from stat.ML) [pdf, other]
Title: Unifying Gradients to Improve Real-world Robustness for Deep Networks
Journal-ref: ACM Transactions on Intelligent Systems and Technology (TIST), 2023
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[434]  arXiv:2208.06236 (cross-list from stat.ME) [pdf, other]
Title: Differentially Private Kolmogorov-Smirnov-Type Tests
Authors: Jordan Awan, Yue Wang
Comments: 19 pages before appendix and references. 3 Figures
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[435]  arXiv:2208.07438 (cross-list from math.ST) [pdf, other]
Title: Archimedes Meets Privacy: On Privately Estimating Quantiles in High Dimensions Under Minimal Assumptions
Comments: 38 pages, 1 figure
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Metric Geometry (math.MG)
[436]  arXiv:2208.07919 (cross-list from math.OC) [pdf, other]
Title: Dynamic Pricing for Non-fungible Resources: Designing Multidimensional Blockchain Fee Markets
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[437]  arXiv:2208.08361 (cross-list from q-bio.GN) [pdf, ps, other]
Title: I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
Subjects: Genomics (q-bio.GN); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR)
[438]  arXiv:2208.11092 (cross-list from math.NT) [pdf, ps, other]
Title: A New Bound for the Orthogonality Defect of HKZ Reduced Lattices
Comments: 9 pages
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[439]  arXiv:2208.11493 (cross-list from eess.SP) [pdf, ps, other]
Title: Performance Analysis of Quantum Key Distribution in Underwater Channels
Comments: Master's thesis. arXiv admin note: text overlap with arXiv:2206.06514
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[440]  arXiv:2208.11935 (cross-list from quant-ph) [pdf, other]
Title: A universal whitening algorithm for commercial random number generators
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[441]  arXiv:2208.12154 (cross-list from quant-ph) [pdf, other]
Title: Composable Security of Generalized BB84 Protocols Against General Attacks
Comments: 51 pages; 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[442]  arXiv:2208.12390 (cross-list from quant-ph) [pdf, ps, other]
Title: Proofs of Quantumness from Trapdoor Permutations
Comments: 20 pages
Journal-ref: ITCS 2023
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[443]  arXiv:2208.13754 (cross-list from quant-ph) [pdf, other]
Title: Simple and Rigorous Proof Method for the Security of Practical Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements
Comments: 25 pages
Journal-ref: Quantum Reports 2023, 5(1), 52-77
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 443 entries: 1-443 ]
[ showing 443 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)