We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 103 entries: 1-87 | 88-103 ]
[ showing 87 entries per page: fewer | more | all ]

Fri, 2 Dec 2022

[1]  arXiv:2212.00727 [pdf, ps, other]
Title: Adversarial Artifact Detection in EEG-Based Brain-Computer Interfaces
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG); Signal Processing (eess.SP)
[2]  arXiv:2212.00427 [pdf, other]
Title: What Physical Layer Security Can Do for 6G Security
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2212.00381 [pdf, other]
Title: SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems
Comments: 15 pages
Journal-ref: IEEE Access, vol. 10, pp. 106400-106414, 2022
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2212.00325 [pdf, other]
Title: All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[5]  arXiv:2212.00321 [pdf, other]
Title: Security and Privacy-Preservation of IoT Data in Cloud-Fog Computing Environment
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2212.00250 [pdf, other]
Title: Split Learning without Local Weight Sharing to Enhance Client-side Data Privacy
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[7]  arXiv:2212.00135 [pdf, other]
Title: Answering Private Linear Queries Adaptively using the Common Mechanism
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[8]  arXiv:2212.00128 [pdf, ps, other]
Title: An Optimized Privacy-Utility Trade-off Framework for Differentially Private Data Sharing in Blockchain-based Internet of Things
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2212.00068 [pdf, ps, other]
Title: Differentially Private Enhanced Permissioned Blockchain for Private Data Sharing in Industrial IoT
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2212.00726 (cross-list from cs.CY) [pdf, other]
Title: Predicting Digital Asset Prices using Natural Language Processing: a survey
Authors: Trang Tran
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[11]  arXiv:2212.00612 (cross-list from cs.LG) [pdf, other]
Title: Purifier: Defending Data Inference Attacks via Transforming Confidence Scores
Comments: accepted by AAAI 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[12]  arXiv:2212.00573 (cross-list from cs.CY) [pdf, other]
Title: A perspective on the use of health digital twins in computational pathology
Authors: Manuel Cossio
Comments: 6 pages, 3 figures
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[13]  arXiv:2212.00484 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Data Synthetisation for Secure Information Sharing
Comments: 10 pages, 7 figures and 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[14]  arXiv:2212.00328 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Learning with Per-Sample Adaptive Clipping
Comments: To appear in AAAI 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[15]  arXiv:2212.00322 (cross-list from cs.LG) [pdf, other]
Title: Hijack Vertical Federated Learning Models with Adversarial Embedding
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[16]  arXiv:2212.00309 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Adaptive Optimization with Delayed Preconditioners
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2212.00306 (cross-list from cs.LG) [pdf, other]
Title: Decentralized Matrix Factorization with Heterogeneous Differential Privacy
Authors: Wentao Hu, Hui Fang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[18]  arXiv:2212.00292 (cross-list from econ.GN) [pdf, other]
Title: Economics of NFTs: The Value of Creator Royalties
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA); Trading and Market Microstructure (q-fin.TR)

Thu, 1 Dec 2022

[19]  arXiv:2211.17230 [pdf, other]
Title: The Bounded Gaussian Mechanism for Differential Privacy
Authors: Bo Chen, Matthew Hale
Comments: 27 pages, submitted to Journal of Privacy and Confidentiality
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2211.17073 [pdf, other]
Title: Risks to Zero Trust in a Federated Mission Partner Environment
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2211.17019 [pdf, other]
Title: Real time QKD Post Processing based on Reconfigurable Hardware Acceleration
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2211.16993 [pdf, other]
Title: Post-Quantum $κ$-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets
Authors: Xingyu Yan (1), Licheng Wang (2), Weiqiang Wen (3), Ziyi Li (4), Jingwen Suo (1), Lize Gu (1) ((1) State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China. (2) School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, 100081, China. (3) LTCI, Telecom Paris, Institut Polytechnique de Paris, Paris, France. (4) State Key Laboratory of Information Security, Institute of Information Engineering, University of Chinese Academy of Sciences, Beijing, 100049, China.)
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Quantum Physics (quant-ph)
[23]  arXiv:2211.16987 [pdf, other]
Title: Secure Software Development Methodologies: A Multivocal Literature Review
Comments: 27 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2211.16942 [pdf]
Title: ALARM: Active LeArning of Rowhammer Mitigations
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[25]  arXiv:2211.16891 [pdf, ps, other]
Title: Quantitative Information Flow for Hardware: Advancing the Attack Landscape
Comments: 4 pages, accepted at IEEE Latin American Symposium on Circuits and Systems (LASCAS), 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[26]  arXiv:2211.16735 [pdf, other]
Title: Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities
Authors: Aditya Basu (1), John Sampson (1), Zhiyun Qian (2), Trent Jaeger (1) ((1) The Pennsylvania State University, (2) University of California, Riverside)
Comments: 15 pages, 1 appendix, 2 tables, 12 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[27]  arXiv:2211.16626 [pdf, ps, other]
Title: Sludge for Good: Slowing and Imposing Costs on Cyber Attackers
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2211.17104 (cross-list from cs.MA) [pdf, other]
Title: Agent-Cells with $DNA$ Programming: A Dynamic Decentralized System
Authors: Arash Vaezi
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[29]  arXiv:2211.17070 (cross-list from cs.SI) [pdf, other]
Title: Differentially Private ADMM-Based Distributed Discrete Optimal Transport for Resource Allocation
Comments: 6 pages, 4 images, 1 algorithm, IEEE GLOBECOMM 2022
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[30]  arXiv:2211.16808 (cross-list from cs.LG) [pdf, other]
Title: Efficient Adversarial Input Generation via Neural Net Patching
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[31]  arXiv:2211.16669 (cross-list from cs.LG) [pdf, other]
Title: FedGPO: Heterogeneity-Aware Global Parameter Optimization for Efficient Federated Learning
Comments: 12 pages, 12 figures, IEEE International Symposium on Workload Characterization (IISWC)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

Wed, 30 Nov 2022

[32]  arXiv:2211.16304 [pdf, other]
Title: Analysis of Anomalous Behavior in Network Systems Using Deep Reinforcement Learning with CNN Architecture
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2211.16235 [pdf]
Title: DCDetector: An IoT terminal vulnerability mining system based on distributed deep ensemble learning under source code representation
Authors: Wen Zhou
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[34]  arXiv:2211.16212 [pdf, other]
Title: Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2211.16128 [pdf, ps, other]
Title: Trustless unknown-order groups
Comments: this https URL
Journal-ref: Mathematical Cryptology, 2022, 1 (2), pp.25-39
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[36]  arXiv:2211.16082 [pdf, other]
Title: Data Privacy Protection in DeFi Protocols
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[37]  arXiv:2211.15993 [pdf, other]
Title: An Empirical Study on Snapshot DAOs
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2211.15929 [pdf, other]
Title: Backdoor Vulnerabilities in Normally Trained Deep Learning Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2211.15926 [pdf, other]
Title: Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[40]  arXiv:2211.15918 [pdf, other]
Title: Similarity Distribution based Membership Inference Attack on Person Re-identification
Comments: 9 pages, 7 figures, Accepted by AAAI 2023
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2211.15804 [pdf, other]
Title: Towards faster settlement in HTLC-based Cross-Chain Atomic Swaps
Authors: Subhra Mazumdar
Comments: Invited Submission (Security and Privacy) to The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, 2022, 11 pages
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[42]  arXiv:2211.15784 [pdf, other]
Title: A Survey of Relevant Text Mining Technology
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2211.15732 [pdf, other]
Title: Cache Me If You Can: Accuracy-Aware Inference Engine for Differentially Private Data Exploration
Comments: To appear in VLDB'23
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[44]  arXiv:2211.16495 (cross-list from cs.LG) [pdf, other]
Title: Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs
Comments: to appear at ASPDAC'23
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[45]  arXiv:2211.16192 (cross-list from cs.CV) [pdf, other]
Title: Be Careful with Rotation: A Uniform Backdoor Pattern for 3D Shape
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[46]  arXiv:2211.16044 (cross-list from cs.SD) [pdf, other]
Title: Model Extraction Attack against Self-supervised Speech Models
Comments: Submitted to ICASSP 2023
Subjects: Sound (cs.SD); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[47]  arXiv:2211.15893 (cross-list from cs.LG) [pdf, other]
Title: Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[48]  arXiv:2211.15875 (cross-list from cs.LG) [pdf, other]
Title: Training Time Adversarial Attack Aiming the Vulnerability of Continual Learning
Comments: Accepted at NeurIPS 2022 ML Safety Workshop
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Tue, 29 Nov 2022

[49]  arXiv:2211.15417 [pdf, other]
Title: Proof-of-randomness protocol for blockchain consensus: the white paper version 1.0
Comments: 7 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[50]  arXiv:2211.15405 [pdf]
Title: Malware and Exploits on the Dark Web
Authors: Jonah Burgess
Comments: 5 pages, 0 figures
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2211.15404 [pdf]
Title: Modern DDoS Attacks and Defences -- Survey
Authors: Jonah Burgess
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2211.15323 [pdf, other]
Title: Security Analysis of the Consumer Remote SIM Provisioning Protocol
Comments: 33 pages, 8 figures, Associated ProVerif model files located at this https URL
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2211.15013 [pdf, other]
Title: Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks
Comments: 12 Pages 16 Figures 3 Tables
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2211.14985 [pdf, other]
Title: CoMMA Protocol: Towards Complete Mitigation of Maximal Extractable Value (MEV) Attacks
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[55]  arXiv:2211.14952 [pdf, other]
Title: Federated Learning Attacks and Defenses: A Survey
Comments: IEEE BigData. 10 pages, 2 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[56]  arXiv:2211.14948 [pdf, other]
Title: Metaverse Security and Privacy: An Overview
Comments: IEEE BigData 2022. 10 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[57]  arXiv:2211.14790 [pdf, other]
Title: Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
Comments: 10 pages, 5 figures, ICC 2023. arXiv admin note: text overlap with arXiv:2206.00385
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2211.14779 [pdf, other]
Title: Who is Gambling? Finding Cryptocurrency Gamblers Using Multi-modal Retrieval Methods
Journal-ref: International Journal of Multimedia Information Retrieval (2022): 1-13
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
[59]  arXiv:2211.14667 [pdf, other]
Title: Deep Fake Detection, Deterrence and Response: Challenges and Opportunities
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[60]  arXiv:2211.14647 [pdf, other]
Title: Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers
Comments: This paper is accepted at ASPLOS 2023
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[61]  arXiv:2211.14642 [pdf, other]
Title: SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical
Comments: IEEE Security and Privacy 2023
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2211.14582 [pdf, other]
Title: Demystifying Bitcoin Address Behavior via Graph Neural Networks
Comments: This paper has been accepted by IEEE International Conference on Data Engineering 2023 (Second Research Round)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[63]  arXiv:2211.14444 [pdf]
Title: MiftyCoin (MFT): A Cryptocurrency Mined with Proof of Human Work
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2211.14442 [pdf, other]
Title: Contract-Backed Digital Cash
Comments: Editor: Fritz Henglein. Authors: Fritz Henglein (Chapters 1, 2, 3, 5), Fritz Henglein and Christian Olesen (Chapter 4), Gert Sylvest (Chapter 6), S{\o}ren Debois (Chapter 7), Morten C. Nielsen and Christian Olesen (Chapter 8)
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2211.14440 [pdf, other]
Title: Don't Watch Me: A Spatio-Temporal Trojan Attack on Deep-Reinforcement-Learning-Augment Autonomous Driving
Authors: Yinbo Yu, Jiajia Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[66]  arXiv:2211.14437 [pdf, other]
Title: Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67]  arXiv:2211.15557 (cross-list from cs.LG) [pdf, other]
Title: Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies
Comments: NeurIPS 2022 Workshop: Reinforcement Learning for Real Life
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[68]  arXiv:2211.15410 (cross-list from cs.LG) [pdf, other]
Title: Private Multi-Winner Voting for Machine Learning
Comments: Accepted at PoPETS 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[69]  arXiv:2211.15363 (cross-list from cs.CL) [pdf, other]
Title: On the Security Vulnerabilities of Text-to-SQL Models
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG); Software Engineering (cs.SE)
[70]  arXiv:2211.15356 (cross-list from cs.DS) [pdf, other]
Title: A quantum algorithm to estimate the closeness to the Strict Avalanche criterion in Boolean functions
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[71]  arXiv:2211.14886 (cross-list from cs.CY) [pdf, other]
Title: Managing Controlled Unclassified Information in Research Institutions
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[72]  arXiv:2211.14769 (cross-list from cs.AI) [pdf, other]
Title: Navigation as the Attacker Wishes? Towards Building Byzantine-Robust Embodied Agents under Federated Learning
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73]  arXiv:2211.14428 (cross-list from cs.LG) [pdf, other]
Title: Utility Assessment of Synthetic Data Generation Methods
Comments: Published in Privacy in Statistical Databases Conference 2022 USB Proceedings
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 28 Nov 2022 (showing first 14 of 30 entries)

[74]  arXiv:2211.14233 [pdf, ps, other]
Title: strategFTO: Untimed control for timed opacity
Comments: This work is partially supported by the ANR-NRF French-Singaporean research program ProMiS (ANR-19-CE25-0015 / 2019 ANR NRF 0092) and the ANR research program BisoUS. Experiments presented in this paper were carried out using the Grid'5000 testbed, supported by a scientific interest group hosted by Inria and including CNRS, RENATER and several universities as well as other organizations
Journal-ref: Proceedings of the 8th International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS 2022)
Subjects: Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Logic in Computer Science (cs.LO)
[75]  arXiv:2211.14206 [pdf, ps, other]
Title: McEliece cryptosystem based on Plotkin construction with QC-MDPC and QC-LDPC codes
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2211.14196 [pdf, other]
Title: Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2211.14062 [pdf, other]
Title: M$^2$M: A general method to perform various data analysis tasks from a differentially private sketch
Comments: Published at the 18th International Workshop on Security and Trust Management (STM 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[78]  arXiv:2211.13964 [pdf, other]
Title: Generating 2D and 3D Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution
Comments: accepted for publication in IEEE Transactions on Biometrics, Behavior, and Identity Science (TBIOM). This paper extends arXiv:2108.01077 that was accepted to IEEE FG 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[79]  arXiv:2211.13958 [pdf, other]
Title: Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2211.13955 [pdf, other]
Title: MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81]  arXiv:2211.13907 [pdf, other]
Title: Blockchain based solution design for Energy Exchange Platform
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2211.13860 [pdf, other]
Title: Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning
Comments: Accepted for presentation and publication at the 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2211.13780 [pdf, other]
Title: CryptoLight: An Electro-Optical Accelerator for Fully Homomorphic Encryption
Comments: 6 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[84]  arXiv:2211.13737 [pdf, other]
Title: CycleGANWM: A CycleGAN watermarking method for ownership verification
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2211.13696 [pdf, other]
Title: FPT: a Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[86]  arXiv:2211.13670 [pdf, other]
Title: SmartIntentNN: Towards Smart Contract Intent Detection
Comments: 4 pages, 3 figures, conference tool track. arXiv admin note: substantial text overlap with arXiv:2211.10724
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[87]  arXiv:2211.13554 [pdf]
Title: Quality-Based Conditional Processing in Multi-Biometrics: Application to Sensor Interoperability
Comments: Published at IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[ total of 103 entries: 1-87 | 88-103 ]
[ showing 87 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2212, contact, help  (Access key information)