We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 34

[ total of 104 entries: 1-25 | 10-34 | 35-59 | 60-84 | 85-104 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 22 Jun 2022 (continued, showing 25 of 42 entries)

[35]  arXiv:2206.10413 [pdf, other]
Title: Multilayer Block Models for Exploratory Analysis of Computer Event Logs
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[36]  arXiv:2206.10400 [pdf, other]
Title: Using EBGAN for Anomaly Intrusion Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[37]  arXiv:2206.10379 [pdf, other]
Title: Can process mining help in anomaly-based intrusion detection?
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2206.10368 [pdf, other]
Title: Real-Time Waveform Matching with a Digitizer at 10 GS/s
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[39]  arXiv:2206.10341 [pdf, other]
Title: Neurotoxin: Durable Backdoors in Federated Learning
Comments: Appears in ICML 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[40]  arXiv:2206.10334 [pdf, other]
Title: Defending Adversarial Examples by Negative Correlation Ensemble
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[41]  arXiv:2206.10272 [pdf, other]
Title: Identification of Attack Paths Using Kill Chain and Attack Graphs
Comments: IEEE/IFIP NOMS 2022 conference, 6 pages
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2206.10112 [pdf, other]
Title: General Framework for Reversible Data Hiding in Texts Based on Masked Language Modeling
Comments: this https URL&hl=en
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[43]  arXiv:2206.10050 [pdf, ps, other]
Title: Better Incentives for Proof-of-Work
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2206.09870 [pdf, other]
Title: Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2206.09834 [pdf]
Title: The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2206.09707 [pdf, other]
Title: The Role of Machine Learning in Cybersecurity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2206.09569 [pdf, other]
Title: Shuffle Gaussian Mechanism for Differential Privacy
Comments: The source code of our implementation is available at this http URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[48]  arXiv:2206.09519 [pdf, other]
Title: Walking to Hide: Privacy Amplification via Random Message Exchanges in Network
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2206.09428 [pdf]
Title: Reputation, Risk, and Trust on User Adoption of Internet Search Engines: The Case of DuckDuckGo
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[50]  arXiv:2206.09424 [pdf]
Title: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Comments: 15 pages, 3 figuers, Journal Paper
Journal-ref: Computers, Materials & Continua, 2022
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2206.09388 [pdf, other]
Title: Privacy-Preserving Analytics on Decentralized Social Graphs: The Case of Eigendecomposition
Comments: Accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE)
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2206.09272 [pdf, other]
Title: DECK: Model Hardening for Defending Pervasive Backdoors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[53]  arXiv:2206.09237 [pdf, other]
Title: Systematic Analysis and Comparison of Security Advice Datasets
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2206.09133 [pdf, other]
Title: Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers
Comments: 10 pages,
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[55]  arXiv:2206.09122 [pdf, other]
Title: Measuring Lower Bounds of Local Differential Privacy via Adversary Instantiations in Federated Learning
Comments: 15 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2206.09011 [pdf, other]
Title: Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks
Comments: 12 pages, 12 figures, 13 equations
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2206.09009 [pdf, other]
Title: Intelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Comments: Accepted at IEEE Network Magazine, 8 pages. arXiv admin note: substantial text overlap with arXiv:2109.14263
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[58]  arXiv:2206.10565 (cross-list from cs.LG) [pdf, other]
Title: sqSGD: Locally Private and Communication Efficient Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[59]  arXiv:2206.10550 (cross-list from cs.LG) [pdf, other]
Title: (Certified!!) Adversarial Robustness for Free!
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 104 entries: 1-25 | 10-34 | 35-59 | 60-84 | 85-104 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2206, contact, help  (Access key information)