We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 32

[ total of 93 entries: 1-25 | 8-32 | 33-57 | 58-82 | 83-93 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 11 Aug 2022 (continued, showing last 7 of 22 entries)

[33]  arXiv:2208.04991 [pdf, other]
Title: Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Networking and Internet Architecture (cs.NI)
[34]  arXiv:2208.05339 (cross-list from cs.DC) [pdf, other]
Title: Distributed Attestation Revocation in Self-Sovereign Identity
Comments: 8 pages, accepted at Local Computer Networks 2022, LCN 2022
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[35]  arXiv:2208.05264 (cross-list from cs.DS) [pdf, other]
Title: Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure
Comments: 14 pages, Accepted in IEEE Transactions on Data and Knowledge Engineering, 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[36]  arXiv:2208.05083 (cross-list from cs.LG) [pdf, other]
Title: Reducing Exploitability with Population Based Training
Comments: Presented at New Frontiers in Adversarial Machine Learning Workshop, ICML 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[37]  arXiv:2208.05009 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Aware Adversarial Network in Human Mobility Prediction
Comments: 15 pages, PoPETs'23, July 10--14, 2023, Lausanne, Switzerland. arXiv admin note: substantial text overlap with arXiv:2201.07519
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[38]  arXiv:2208.04946 (cross-list from cs.LG) [pdf, other]
Title: Attention Hijacking in Trojan Transformers
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[39]  arXiv:2208.04943 (cross-list from cs.LG) [pdf, other]
Title: PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)

Wed, 10 Aug 2022

[40]  arXiv:2208.04891 [pdf, other]
Title: Online Malware Classification with System-Wide System Calls in Cloud IaaS
Comments: Accepted at the IEEE 23rd International Conference on Information Reuse and Integration for Data Science
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2208.04838 [pdf, ps, other]
Title: Robust Machine Learning for Malware Detection over Time
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2208.04734 [pdf, other]
Title: Weak Equivalents for Nonlinear Filtering Functions
Journal-ref: International Conference on Computational Science and Its Applications, pp. 592-602, 2014
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2208.04719 [pdf, other]
Title: STELLA: Sparse Taint Analysis for Enclave Leakage Detection
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[44]  arXiv:2208.04676 [pdf]
Title: DeepHider: A Multi-module and Invisibility Watermarking Scheme for Language Model
Comments: 11 pages,7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2208.04624 [pdf, other]
Title: Bottom-up Trust Registry in Self Sovereign Identity
Comments: 10 pages, published in Blockchain Congress Conference 2022
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2208.04591 [pdf, other]
Title: Stronger Privacy Amplification by Shuffling for Rényi and Approximate Differential Privacy
Comments: 14 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[47]  arXiv:2208.04903 (cross-list from cs.SI) [pdf, other]
Title: Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[48]  arXiv:2208.04845 (cross-list from math.OC) [pdf, ps, other]
Title: Quantization enabled Privacy Protection in Decentralized Stochastic Optimization
Comments: Accepted to IEEE Transactions on Automatic Control as a full paper. arXiv admin note: text overlap with arXiv:2205.03884
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[49]  arXiv:2208.04836 (cross-list from cs.NI) [pdf]
Title: Non-Fungible Tokens in Business and Management -- A Review
Comments: This is an author version of our paper submitted to a journal
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[50]  arXiv:2208.04767 (cross-list from cs.LG) [pdf, other]
Title: Combining Variational Modeling with Partial Gradient Perturbation to Prevent Deep Gradient Leakage
Comments: 21 pages, 14 figures, 6 tables (supplementary material included). This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[51]  arXiv:2208.04733 (cross-list from cs.NI) [pdf]
Title: Secure Implementation of a Vehicular Application for the Symbian Platform
Journal-ref: International Journal on Information Technologies & Security 4(2), 2012
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[52]  arXiv:2208.04692 (cross-list from cs.SE) [pdf, other]
Title: A Tutorial on the Interoperability of Self-sovereign Identities
Comments: Submitted to IEEE Communications Surveys & Tutorials
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)

Tue, 9 Aug 2022 (showing first 5 of 26 entries)

[53]  arXiv:2208.03951 [pdf, ps, other]
Title: Simplifying Electronic Document Digital Signatures
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2208.03944 [pdf, other]
Title: Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering
Comments: this https URL&hl=en
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2208.03909 [pdf, other]
Title: Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2208.03884 [pdf, ps, other]
Title: Differential biases, $c$-differential uniformity, and their relation to differential attacks
Comments: 14 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[57]  arXiv:2208.03862 [pdf, other]
Title: DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic
Authors: Zhi Liu
Comments: visit DeepTLS at this https URL
Subjects: Cryptography and Security (cs.CR)
[ total of 93 entries: 1-25 | 8-32 | 33-57 | 58-82 | 83-93 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)