We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 19

[ total of 85 entries: 1-25 | 20-44 | 45-69 | 70-85 ]
[ showing 25 entries per page: fewer | more | all ]

Fri, 5 Aug 2022 (continued, showing last 12 of 16 entries)

[20]  arXiv:2208.02592 [pdf, other]
Title: Design Considerations and Architecture for a Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[21]  arXiv:2208.02500 [pdf, other]
Title: "Yeah, it does have a...Windows `98 Vibe'': Usability Study of Security Features in Programmable Logic Controllers
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC); Systems and Control (eess.SY)
[22]  arXiv:2208.02310 [pdf, other]
Title: Design of secure and robust cognitive system for malware detection
Authors: Sanket Shukla
Comments: arXiv admin note: substantial text overlap with arXiv:2104.06652
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[23]  arXiv:2208.02759 (cross-list from cs.HC) [pdf, other]
Title: New Differential Privacy Communication Pipeline and Design Framework
Comments: poster
Journal-ref: The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[24]  arXiv:2208.02724 (cross-list from eess.SP) [pdf, other]
Title: Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[25]  arXiv:2208.02587 (cross-list from cs.LG) [pdf]
Title: Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption
Comments: 26 pages; 1 Figure; 7 Tables. arXiv admin note: text overlap with arXiv:2205.13265
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[26]  arXiv:2208.02556 (cross-list from cs.CV) [pdf, other]
Title: Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Comments: arXiv admin note: text overlap with arXiv:2205.12041
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[27]  arXiv:2208.02482 (cross-list from cs.CV) [pdf, other]
Title: Privacy Safe Representation Learning via Frequency Filtering Encoder
Comments: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety (AISafety 2022)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[28]  arXiv:2208.02468 (cross-list from math.GR) [pdf, ps, other]
Title: On Compression Functions over Small Groups with Applications to Cryptography
Authors: Koji Nuida
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[29]  arXiv:2208.02369 (cross-list from cs.AI) [pdf, other]
Title: Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework
Comments: 12 pages, 3 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[30]  arXiv:2208.02304 (cross-list from cs.LG) [pdf, other]
Title: How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[31]  arXiv:2208.02250 (cross-list from cs.SD) [pdf]
Title: Adversarial Attacks on ASR Systems: An Overview
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)

Thu, 4 Aug 2022 (showing first 13 of 23 entries)

[32]  arXiv:2208.02244 [pdf, other]
Title: Contrasting global approaches for identifying and managing cybersecurity risks in supply chains
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[33]  arXiv:2208.02201 [pdf, other]
Title: Statistical Decoding 2.0: Reducing Decoding to LPN
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2208.02160 [pdf]
Title: Scrypt Mining with ASICs
Comments: Published in 2014
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2208.02159 [pdf, other]
Title: CCTV-Exposure: An open-source system for measuring user's privacy exposure to mapped CCTV cameras based on geo-location (Extended Version)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[36]  arXiv:2208.02125 [pdf, other]
Title: Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Comments: Submitted to IEEE TIFS and currently under review
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2208.02094 [pdf]
Title: A Novel Approach To Network Intrusion Detection System Using Deep Learning For Sdn: Futuristic Approach
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[38]  arXiv:2208.02093 [pdf, other]
Title: Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2208.01968 [pdf, other]
Title: Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[40]  arXiv:2208.01919 [pdf, other]
Title: Spectrum Focused Frequency Adversarial Attacks for Automatic Modulation Classification
Authors: Sicheng Zhang (1), Jiarun Yu (1), Zhida Bao (1), Shiwen Mao (2), Yun Lin (1) ((1) College of Information and Communication Engineering, Harbin Engineering University, Harbin, (2) Department of Electrical & Computer Engineering, Auburn University, Auburn)
Comments: 6 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[41]  arXiv:2208.01908 [pdf, other]
Title: Mass Exit Attacks on the Lightning Network
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[42]  arXiv:2208.01886 [pdf, other]
Title: Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2208.01826 [pdf, ps, other]
Title: A New Implementation of Federated Learning for Privacy and Security Enhancement
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44]  arXiv:2208.01703 [pdf, other]
Title: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
[ total of 85 entries: 1-25 | 20-44 | 45-69 | 70-85 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)