We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 20

[ total of 100 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | ... | 91-100 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 16 Aug 2022 (continued, showing last 7 of 27 entries)

[21]  arXiv:2208.06963 (cross-list from cs.IT) [pdf, ps, other]
Title: Privacy-Preserving Decentralized Inference with Graph Neural Networks in Wireless Networks
Comments: This paper has been submitted to TWC
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2208.06946 (cross-list from cs.AI) [pdf, other]
Title: Targeted Honeyword Generation with Language Models
Comments: 8 pages, 7 tables, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[23]  arXiv:2208.06767 (cross-list from cs.NI) [pdf, other]
Title: IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation
Comments: Accepted to S&P '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[24]  arXiv:2208.06651 (cross-list from cs.SI) [pdf, other]
Title: Revisiting Adversarial Attacks on Graph Neural Networks for Graph Classification
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2208.06538 (cross-list from cs.LG) [pdf, other]
Title: MaskBlock: Transferable Adversarial Examples with Bayes Approach
Comments: Under Review
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[26]  arXiv:2208.06537 (cross-list from cs.LG) [pdf, other]
Title: Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[27]  arXiv:2208.06432 (cross-list from cs.DC) [pdf, other]
Title: Hybrid On/Off Blockchain Approach for Vehicle Data Management, Processing and Visualization Exemplified by the ADAPT Platform
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Mon, 15 Aug 2022 (showing first 3 of 21 entries)

[28]  arXiv:2208.06231 [pdf, other]
Title: Mutual authentication in self-organized VANETs
Journal-ref: Computer Standards & Interfaces 36 (4), 704-710, 2014
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2208.06223 [pdf, ps, other]
Title: Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Comments: 56 pages, 11 figures. arXiv admin note: text overlap with arXiv:2201.12194
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[30]  arXiv:2208.06165 [pdf, other]
Title: Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots
Authors: Chintan Patel
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[ total of 100 entries: 1-10 | 11-20 | 21-30 | 31-40 | 41-50 | 51-60 | ... | 91-100 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)