We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 40

[ total of 91 entries: 1-25 | 16-40 | 41-65 | 66-90 | 91 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 28 Mar 2023 (continued, showing last 16 of 27 entries)

[41]  arXiv:2303.14445 [pdf]
Title: A Hybrid Algorithm to Enhance Wireless Sensor Networks security on the IoT
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2303.14443 [pdf, other]
Title: No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
Comments: Accepted at USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43]  arXiv:2303.14441 [pdf]
Title: A User-Based Authentication and DoS Mitigation Scheme for Wearable Wireless Body Sensor Networks
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2303.14416 [src]
Title: Blockchain Technology for Preventing Counterfeit in Health Insurance
Comments: I uploaded the wrong paper, which has been already published in 2021 international Conference on Information Technology (ICIT)
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2303.14317 [pdf, other]
Title: Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection
Comments: Accepted by IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[46]  arXiv:2303.15433 (cross-list from cs.CV) [pdf, other]
Title: Anti-DreamBooth: Protecting users from personalized text-to-image synthesis
Comments: Project page: this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[47]  arXiv:2303.15180 (cross-list from cs.CV) [pdf, other]
Title: Detecting Backdoors in Pre-trained Encoders
Comments: Accepted at CVPR 2023. Code is available at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[48]  arXiv:2303.15130 (cross-list from cs.SE) [pdf, other]
Title: Picking a CHERI Allocator: Security and Performance Considerations
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[49]  arXiv:2303.15127 (cross-list from cs.LG) [pdf, other]
Title: Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks
Comments: UEraser introduces adversarial augmentations to suppress unlearnable example attacks and outperforms current defenses
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[50]  arXiv:2303.15033 (cross-list from cs.SE) [pdf, other]
Title: Design, Implementation, and Automation of a Risk Management Approach for Man-at-the-End Software Protection
Comments: Preprint submitted to Computers & Security. arXiv admin note: substantial text overlap with arXiv:2011.07269
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[51]  arXiv:2303.14868 (cross-list from cs.LG) [pdf, other]
Title: The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning
Comments: Accepted to CVPR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[52]  arXiv:2303.14836 (cross-list from cs.LG) [pdf, other]
Title: Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis
Comments: EuroS&P 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[53]  arXiv:2303.14622 (cross-list from quant-ph) [pdf, ps, other]
Title: Experimental quantum secret sharing based on phase encoding of coherent states
Comments: 10 pages, 5 figures, 3 tables, accepted by Sci. China-Phys. Mech. Astron
Journal-ref: Sci. China-Phys. Mech. Astron. 66, (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[54]  arXiv:2303.14304 (cross-list from cs.CV) [pdf, other]
Title: Ensemble-based Blackbox Attacks on Dense Prediction
Comments: CVPR 2023 Accepted
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[55]  arXiv:2303.14241 (cross-list from cs.LG) [pdf, other]
Title: Core-based Trend Detection in Blockchain Networks
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[56]  arXiv:2303.14197 (cross-list from cs.LG) [pdf, other]
Title: Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 27 Mar 2023 (showing first 9 of 13 entries)

[57]  arXiv:2303.14009 [pdf, other]
Title: PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems
Comments: This manuscript is currently under review at IEEE Transactions on Computers
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2303.13992 [pdf, other]
Title: Physical Backdoor Trigger Activation of Autonomous Vehicle using Reachability Analysis
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[59]  arXiv:2303.13919 [pdf, ps, other]
Title: Applicability of Trust Management Algorithm in C2C services
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[60]  arXiv:2303.13727 [pdf, other]
Title: A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[61]  arXiv:2303.13713 [pdf, other]
Title: Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[62]  arXiv:2303.13679 [pdf, other]
Title: Primer: Fast Private Transformer Inference on Encrypted Data
Comments: 6 pages, 6 figures, 3 tables
Journal-ref: 2023 Design Automation Conference
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2303.13521 [pdf, other]
Title: Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC)
[64]  arXiv:2303.14178 (cross-list from cs.CY) [pdf, ps, other]
Title: One Protocol to Rule Them All? On Securing Interoperable Messaging
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[65]  arXiv:2303.14173 (cross-list from cs.LG) [pdf, other]
Title: How many dimensions are required to find an adversarial example?
Comments: Comments welcome!
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[ total of 91 entries: 1-25 | 16-40 | 41-65 | 66-90 | 91 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)