We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 120

[ total of 101 entries: 1-50 | 2-51 | 52-101 ]
[ showing 50 entries per page: fewer | more | all ]

Wed, 1 Feb 2023 (continued, showing last 13 of 18 entries)

[52]  arXiv:2301.13577 [pdf, other]
Title: DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2301.13513 [pdf, other]
Title: Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2301.13511 [pdf]
Title: Privacy-Preserving Online Sharing Charging Pile Scheme with Different Needs Matching
Authors: Zhiyu Huang
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2301.13421 [pdf, other]
Title: MOAT: Towards Safe BPF Kernel Extension
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[56]  arXiv:2301.13350 [pdf, other]
Title: A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
Comments: 21 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[57]  arXiv:2301.13347 [pdf, other]
Title: Tight Data Access Bounds for Private Top-$k$ Selection
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[58]  arXiv:2301.13346 [pdf, other]
Title: ICICLE: A Re-Designed Emulator for Grey-Box Firmware Fuzzing
Comments: To appear in the Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023)
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2301.13862 (cross-list from cs.LG) [pdf, other]
Title: Salient Conditional Diffusion for Defending Against Backdoor Attacks
Comments: 12 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[60]  arXiv:2301.13850 (cross-list from math.ST) [pdf, ps, other]
Title: Gaussian Noise is Nearly Instance Optimal for Private Unbiased Mean Estimation
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[61]  arXiv:2301.13712 (cross-list from eess.SY) [pdf, other]
Title: A Bi-Level Stochastic Game Model for PMU Placement in Power Grid with Cybersecurity Risks
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[62]  arXiv:2301.13336 (cross-list from cs.LG) [pdf, other]
Title: The Fair Value of Data Under Heterogeneous Privacy Constraints
Comments: 29 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[63]  arXiv:2301.13334 (cross-list from math.ST) [pdf, ps, other]
Title: A Bias-Variance-Privacy Trilemma for Statistical Estimation
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[64]  arXiv:2301.13273 (cross-list from cs.LG) [pdf, other]
Title: Near Optimal Private and Robust Linear Regression
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Statistics Theory (math.ST); Machine Learning (stat.ML)

Tue, 31 Jan 2023

[65]  arXiv:2301.13188 [pdf, other]
Title: Extracting Training Data from Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[66]  arXiv:2301.13122 [pdf]
Title: Towards Adversarial Realism and Robust Learning for IoT Intrusion Detection and Classification
Comments: 19 pages, 5 tables, 7 figures, Internet of Things journal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[67]  arXiv:2301.12818 [pdf, other]
Title: Dynamic, Private, Anonymous, Collateralizable Commitments vs. MEV
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2301.12800 [pdf, other]
Title: Behavioural Reports of Multi-Stage Malware
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69]  arXiv:2301.12772 [pdf]
Title: Threat Modelling in Virtual Assistant Hub Devices Compared With User Risk Perceptions (2021)
Authors: Beckett LeClair
Comments: Originally written 2021. Dissertation for MSc Computer Science
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[70]  arXiv:2301.12766 [pdf]
Title: GPS-Spoofing Attack Detection Mechanism for UAV Swarms
Comments: 8 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2301.12740 [pdf]
Title: Life cycle models and security threats to a microcircuit during its development and operation
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2301.12706 [pdf]
Title: Typing of data transfer processes in the information system within the framework of threat modeling
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2301.12680 [pdf, other]
Title: Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness
Comments: Accepted to AAAI 2023 conference
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2301.12496 [pdf, other]
Title: Unified Singular Protocol Flow for OAuth (USPFO) Ecosystem
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[75]  arXiv:2301.12487 [pdf]
Title: Mitigating Adversarial Effects of False Data Injection Attacks in Power Grid
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2301.12333 [pdf]
Title: Deep Learning model integrity checking mechanism using watermarking technique
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2301.12318 [pdf, other]
Title: Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[78]  arXiv:2301.12235 [pdf, other]
Title: Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing
Comments: 6 pages, 4 figures
Journal-ref: IEEE Consumer Electronics Magazine, 2023
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2301.12204 [pdf, other]
Title: Privacy and Bias Analysis of Disclosure Avoidance Systems
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[80]  arXiv:2301.12092 [pdf, other]
Title: The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2301.12060 [pdf, other]
Title: An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
Comments: NO
Subjects: Cryptography and Security (cs.CR); Rings and Algebras (math.RA)
[82]  arXiv:2301.12039 [pdf]
Title: Harnessing the Power of Decision Trees to Detect IoT Malware
Authors: Marwan Omar
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[83]  arXiv:2301.12013 [pdf, other]
Title: Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2301.11998 [pdf, other]
Title: Augmented Reality's Potential for Identifying and Mitigating Home Privacy Leaks
Journal-ref: Workshop on Usable Security and Privacy (USEC) 2023
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2301.11995 [pdf, other]
Title: A New Symmetric Homomorphic Functional Encryption over a Hidden Ring for Polynomial Public Key Encapsulations
Comments: 21 pages, 1 figure
Subjects: Cryptography and Security (cs.CR)
[86]  arXiv:2301.13104 (cross-list from cs.CV) [pdf, other]
Title: Equivariant Differentially Private Deep Learning
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[87]  arXiv:2301.13005 (cross-list from cs.DC) [pdf]
Title: Farm Environmental Data Analyzer using a Decentralised system and R
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[88]  arXiv:2301.12778 (cross-list from cs.LG) [pdf, other]
Title: A Comprehensive Investigation of Feature and Model Importance in Android Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[89]  arXiv:2301.12684 (cross-list from math.OC) [pdf, other]
Title: Attack Impact Evaluation for Stochastic Control Systems through Alarm Flag State Augmentation
Comments: 8 pages. arXiv admin note: substantial text overlap with arXiv:2203.16803
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[90]  arXiv:2301.12623 (cross-list from cs.DC) [pdf, other]
Title: FedPass: Privacy-Preserving Vertical Federated Deep Learning with Adaptive Obfuscation
Comments: 6 figures, 9 tables
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2301.12595 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Adversarial Bandits
Authors: Yuzhe Ma, Zhijin Zhou
Comments: Accepted by ICLR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[92]  arXiv:2301.12576 (cross-list from cs.LG) [pdf, other]
Title: Uncovering Adversarial Risks of Test-Time Adaptation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[93]  arXiv:2301.12554 (cross-list from cs.LG) [pdf, other]
Title: Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[94]  arXiv:2301.12535 (cross-list from cs.LG) [pdf, ps, other]
Title: Concurrent Shuffle Differential Privacy Under Continual Observation
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[95]  arXiv:2301.12532 (cross-list from cs.GT) [pdf, ps, other]
Title: Credible, Optimal Auctions via Blockchains
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[96]  arXiv:2301.12526 (cross-list from cs.IT) [pdf, other]
Title: The Secure CEO Problem With Physical Identifiers Under Logarithmic Loss and Quadratic Distortion Measures
Comments: A part of this paper was presented at SITA2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[97]  arXiv:2301.12377 (cross-list from cs.SE) [pdf, other]
Title: What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Comments: This paper is accepted at the International Conference on Software Engineering (ICSE) 2023
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[98]  arXiv:2301.12360 (cross-list from cs.LG) [pdf, other]
Title: ADL-ID: Adversarial Disentanglement Learning for Wireless Device Fingerprinting Temporal Domain Adaptation
Comments: The paper has been accepted at IEEE ICC'23 - MWN Symposium
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[99]  arXiv:2301.12348 (cross-list from cs.SE) [pdf, other]
Title: Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[100]  arXiv:2301.12195 (cross-list from cs.LG) [pdf, other]
Title: Does Federated Learning Really Need Backpropagation?
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[101]  arXiv:2301.11989 (cross-list from cs.LG) [pdf, other]
Title: Practical Differentially Private Hyperparameter Tuning with Subsampling
Comments: 30 pages, 7 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 101 entries: 1-50 | 2-51 | 52-101 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2302, contact, help  (Access key information)