We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 100

[ total of 99 entries: 1-10 | ... | 60-69 | 70-79 | 80-89 | 90-99 ]
[ showing 10 entries per page: fewer | more | all ]

Fri, 12 Aug 2022 (continued, showing last 10 of 17 entries)

[90]  arXiv:2208.05680 [pdf, other]
Title: A Trust-Based Malicious RSU Detection Mechanism in Edge-Enabled Vehicular Ad Hoc Networks
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2208.05612 [pdf, other]
Title: SSLEM: A Simplifier for MBA Expressions based on Semi-linear MBA Expressions and Program Synthesis
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[92]  arXiv:2208.05604 [pdf, other]
Title: Going Incognito in the Metaverse
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2208.05586 [pdf, other]
Title: Multi-Factor Key Derivation Function (MFKDF)
Authors: Vivek Nair, Dawn Song
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2208.05514 [pdf, ps, other]
Title: Are Gradients on Graph Structure Reliable in Gray-box Attacks?
Comments: Preprint of a full paper accepted by CIKM 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[95]  arXiv:2208.05477 [pdf, other]
Title: Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Comments: 11 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[96]  arXiv:2208.05476 [pdf, other]
Title: Sequence Feature Extraction for Malware Family Analysis via Graph Neural Network
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[97]  arXiv:2208.05475 [pdf, ps, other]
Title: Poster: Revocation in VANETs Based on k-ary Huffman Trees
Journal-ref: Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, pp. 25-26, 2015
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2208.05907 (cross-list from cs.IT) [pdf, other]
Title: Absolute Security in High-Frequency Wireless Links
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[99]  arXiv:2208.05740 (cross-list from cs.LG) [pdf, other]
Title: General Cutting Planes for Bound-Propagation-Based Neural Network Verification
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Optimization and Control (math.OC); Machine Learning (stat.ML)
[ total of 99 entries: 1-10 | ... | 60-69 | 70-79 | 80-89 | 90-99 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)