We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 39

[ total of 76 entries: 1-25 | 15-39 | 40-64 | 65-76 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 22 Sep 2022 (continued, showing last 2 of 19 entries)

[40]  arXiv:2209.09996 (cross-list from cs.LG) [pdf, other]
Title: Audit and Improve Robustness of Private Neural Networks on Encrypted Data
Comments: 10 pages, 10 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[41]  arXiv:2209.09984 (cross-list from cs.LG) [pdf, other]
Title: Learning the Propagation of Worms in Wireless Sensor Networks
Comments: EAI WiCON 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Wed, 21 Sep 2022

[42]  arXiv:2209.09855 [pdf, other]
Title: Toward Identification and Characterization of IoT Software Update Practices
Comments: 11 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computational Engineering, Finance, and Science (cs.CE)
[43]  arXiv:2209.09835 [pdf, other]
Title: EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware
Comments: This is the authors' version of the article accepted for publication at IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE 2022)
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2209.09769 [pdf, other]
Title: Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling
Comments: 6 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[45]  arXiv:2209.09653 [pdf, other]
Title: A Framework for Preserving Privacy and Cybersecurity in Brain-Computer Interfacing Applications
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2209.09652 [pdf]
Title: Adversarial Color Projection: A Projector-Based Physical Attack to DNNs
Comments: arXiv admin note: substantial text overlap with arXiv:2209.02430
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[47]  arXiv:2209.09631 [pdf, other]
Title: De-Identification of French Unstructured Clinical Notes for Machine Learning Tasks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[48]  arXiv:2209.09630 [pdf]
Title: Detection of Malicious Websites Using Machine Learning Techniques
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[49]  arXiv:2209.09624 [pdf, other]
Title: Robust Online and Distributed Mean Estimation Under Adversarial Data Corruption
Comments: 8 pages, 5 figures, 61st IEEE Conference on Decision and Control (CDC)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multiagent Systems (cs.MA); Systems and Control (eess.SY)
[50]  arXiv:2209.09584 [pdf, other]
Title: Non-Disclosing Credential On-chaining for Blockchain-based Decentralized Applications
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2209.09577 [pdf, other]
Title: Understanding Real-world Threats to Deep Learning Models in Android Apps
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2209.09557 [pdf, other]
Title: CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks
Comments: To appear in CCS'22
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2209.09424 [pdf, other]
Title: PolyMPCNet: Towards ReLU-free Neural Architecture Search in Two-party Computation Based Private Inference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[54]  arXiv:2209.09388 [pdf]
Title: An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2209.09688 (cross-list from cs.LG) [pdf, other]
Title: Sparse Vicious Attacks on Graph Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[56]  arXiv:2209.09642 (cross-list from cs.LG) [pdf]
Title: A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique
Comments: 20 pages, 6 tables, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Tue, 20 Sep 2022 (showing first 8 of 20 entries)

[57]  arXiv:2209.09033 [pdf, other]
Title: A Transferable and Automatic Tuning of Deep Reinforcement Learning for Cost Effective Phishing Detection
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[58]  arXiv:2209.08936 [pdf, other]
Title: Automated Implementation of Windows-related Security-Configuration Guides
Journal-ref: Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE '20), September 21--25, 2020, Virtual Event, Australia
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[59]  arXiv:2209.08921 [pdf, other]
Title: Towards Standardized Mobility Reports with User-Level Privacy
Subjects: Cryptography and Security (cs.CR); Other Computer Science (cs.OH)
[60]  arXiv:2209.08893 [pdf, other]
Title: A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse
Comments: 12 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2209.08853 [pdf, other]
Title: Automated Identification of Security-Relevant Configuration Settings Using NLP
Comments: Peer-reviewed version accepted for publication in the Industry Showcase track at the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE '22), October 10--14, 2022, Rochester, MI, USA
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[62]  arXiv:2209.08824 [pdf, other]
Title: Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations
Comments: We submitted this article as a full-length paper. Unfortunately, the CODASPY Program Committee decided that our paper can only be accepted in the tool track. Thus, the published version only consists of 6 pages
Journal-ref: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY '22), April 24--27, 2022, Baltimore, MD, USA
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[63]  arXiv:2209.08773 [pdf, other]
Title: CATER: Intellectual Property Protection on Text Generation APIs via Conditional Watermarks
Comments: accepted to NeurIPS 2022
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2209.08673 [pdf, other]
Title: Proofs of Proof-of-Stake with Sublinear Complexity
Subjects: Cryptography and Security (cs.CR)
[ total of 76 entries: 1-25 | 15-39 | 40-64 | 65-76 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2209, contact, help  (Access key information)