We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2022

[ total of 435 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 401-435 ]
[ showing 50 entries per page: fewer | more | all ]
[1]  arXiv:2210.00008 [pdf, other]
Title: Adversarial Attacks on Transformers-Based Malware Detectors
Comments: Accepted to the 2022 NeurIPS ML Safety Workshop. Code available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[2]  arXiv:2210.00058 [pdf, other]
Title: Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[3]  arXiv:2210.00175 [pdf, ps, other]
Title: Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[4]  arXiv:2210.00262 [pdf, other]
Title: Frequency Estimation of Evolving Data Under Local Differential Privacy
Comments: Accepted at EDBT 2023. Updated structure and correcting privacy loss of dBitFlipPM
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2210.00264 [pdf, other]
Title: zkBridge: Trustless Cross-chain Bridges Made Practical
Comments: An extended version of the paper to appear in ACM CCS 2022
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2210.00270 [pdf, ps, other]
Title: ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2210.00325 [pdf, other]
Title: Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[8]  arXiv:2210.00486 [pdf, other]
Title: pMPL: A Robust Multi-Party Learning Framework with a Privileged Party
Comments: This paper is the full version of a paper to appear in CCS 2022
Journal-ref: 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS'22)
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2210.00581 [pdf, other]
Title: PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model
Comments: To Appear in 2023 USENIX Security Symposium, August 9-11, 2023. Please cite our USENIX Security version
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2210.00584 [pdf, other]
Title: FLCert: Provably Secure Federated Learning against Poisoning Attacks
Comments: To appear in Transactions on Information Forensics and Security. arXiv admin note: text overlap with arXiv:2102.01854
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[11]  arXiv:2210.00597 [pdf, other]
Title: Composition of Differential Privacy & Privacy Amplification by Subsampling
Authors: Thomas Steinke
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[12]  arXiv:2210.00615 [pdf, other]
Title: iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Comments: 9 pages, 5 figures, IEEE International Joint Conference on Biometrics (IJCB 2022)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[13]  arXiv:2210.00649 [pdf, other]
Title: Automated Security Analysis of Exposure Notification Systems
Comments: 23 pages, Full version of the corresponding USENIX Security '23 paper
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2210.00856 [pdf, other]
Title: A forensic analysis of the Google Home: repairing compressed data without error correction
Comments: 28 pages, modified version of paper that appeared originally at Forensic Science International: Digital Investigation
Journal-ref: Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[15]  arXiv:2210.00875 [pdf, other]
Title: Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection
Comments: This work is accepted by the NeurIPS 2022 (Oral, TOP 2%). The first two authors contributed equally to this work. 25 pages. We have fixed some typos in the previous version
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[16]  arXiv:2210.00957 [pdf, other]
Title: UnGANable: Defending Against GAN-based Face Manipulation
Comments: Accepted by USENIX Security 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[17]  arXiv:2210.00968 [pdf, other]
Title: Membership Inference Attacks Against Text-to-image Generation Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2210.01075 [pdf, other]
Title: Decompiling x86 Deep Neural Network Executables
Comments: The extended version of a paper to appear in the Proceedings of the 32nd USENIX Security Symposium, 2023, (USENIX Security '23), 25 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[19]  arXiv:2210.01111 [pdf, other]
Title: MultiGuard: Provably Robust Multi-label Classification against Adversarial Examples
Comments: Accepted by NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2210.01260 [pdf, other]
Title: Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Comments: 13 pages; to appear in WISA 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2210.01297 [pdf, other]
Title: Privacy-Preserving Link Prediction
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2210.01594 [pdf, other]
Title: GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
Comments: 11 pages, 7 figures, 2 tables, 3 algorithms, in IEEE TBIOM 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[23]  arXiv:2210.01632 [pdf, other]
Title: Backdoor Attacks in the Supply Chain of Masked Image Modeling
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2210.01688 [pdf, other]
Title: Blockchain-Based Decentralized Knowledge Marketplace Using Active Inference
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[25]  arXiv:2210.01739 [pdf, ps, other]
Title: Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[26]  arXiv:2210.01749 [pdf, other]
Title: Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device
Comments: arXiv admin note: text overlap with arXiv:2206.01314
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2210.01778 [pdf, other]
Title: Semantics-based Privacy by Design for Internet of Things Applications
Journal-ref: Future Generation Computer Systems, Volume 138, January 2023, Pages 280-295
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[28]  arXiv:2210.01853 [pdf, other]
Title: Privacy-Patterns for IoT Application Developers
Comments: In Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp/ISWC '22)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29]  arXiv:2210.01988 [pdf, ps, other]
Title: Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning
Comments: Accepted at 44th IEEE Symposium on Security and Privacy (S&P 2023)
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2210.02143 [pdf, other]
Title: Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31]  arXiv:2210.02161 [pdf, ps, other]
Title: Security and Privacy Concerns in Cloud-based Scientific and Business Workflows: A Systematic Review
Comments: 16 pages, 8 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[32]  arXiv:2210.02234 [pdf, other]
Title: Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input
Comments: arXiv admin note: substantial text overlap with arXiv:1806.10189
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[33]  arXiv:2210.02257 [pdf, other]
Title: Hiding Images in Deep Probabilistic Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Multimedia (cs.MM)
[34]  arXiv:2210.02337 [pdf, other]
Title: When Physical Layer Key Generation Meets RIS: Opportunities, Challenges, and Road Ahead
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2210.02360 [pdf, other]
Title: DiPPS: Differentially Private Propensity Scores for Bias Correction
Comments: 11 pages, 2 figures. Current version: conference version
Journal-ref: Proceedings of the Seventeenth International AAAI Conference on Web and Social Media (2023) 114-125
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2210.02601 [pdf, other]
Title: From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2210.02650 [pdf, other]
Title: PrivacyCube: A Tangible Device for Improving Privacy Awareness in IoT
Comments: In Proceedings of the 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI) 2022
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2210.02678 [pdf, ps, other]
Title: Effective Metaheuristic Based Classifiers for Multiclass Intrusion Detection
Comments: 17 single column pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2210.02760 [pdf, ps, other]
Title: Cyber-Resilient Privacy Preservation and Secure Billing Approach for Smart Energy Metering Devices
Comments: Journal article
Journal-ref: Volume 70 Issue 9, 337-345, September 2022
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR); Networking and Internet Architecture (cs.NI)
[40]  arXiv:2210.02821 [pdf, ps, other]
Title: Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV
Comments: 29 pages, 17 figures, 1 table, In Proceedings of the ADFSL 2022, USA
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[41]  arXiv:2210.02826 [pdf, ps, other]
Title: Single-Use Delegatable Signatures Based on Smart Contracts
Comments: The 16th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2021)
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2210.02840 [pdf, other]
Title: Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43]  arXiv:2210.02841 [pdf, other]
Title: Detecting Irregular Network Activity with Adversarial Learning and Expert Feedback
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44]  arXiv:2210.02853 [pdf, other]
Title: NeuDep: Neural Binary Memory Dependence Analysis
Comments: ESEC/FSE 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL); Software Engineering (cs.SE)
[45]  arXiv:2210.02873 [pdf, other]
Title: Blockchain-based Monitoring for Poison Attack Detection in Decentralized Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[46]  arXiv:2210.02910 [pdf, other]
Title: Federated Boosted Decision Trees with Differential Privacy
Comments: Full version of a paper to appear at ACM CCS'22
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2210.03014 [pdf, other]
Title: EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2210.03020 [pdf, other]
Title: Model-Driven Engineering for Formal Verification and Security Testing of Authentication Protocols
Comments: Editor: Ib\'eria Medeiros. 18th European Dependable Computing Conference (EDCC 2022), September 12-15, 2022, Zaragoza, Spain. Student Forum Proceedings - EDCC 2022
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2210.03205 [pdf, other]
Title: Synthetic Dataset Generation for Privacy-Preserving Machine Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[50]  arXiv:2210.03207 [pdf, other]
Title: Threat Repair with Optimization Modulo Theories
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[ total of 435 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 401-435 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2404, contact, help  (Access key information)