We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 42

[ total of 91 entries: 1-10 | ... | 13-22 | 23-32 | 33-42 | 43-52 | 53-62 | 63-72 | 73-82 | 83-91 ]
[ showing 10 entries per page: fewer | more | all ]

Tue, 6 Dec 2022 (continued, showing last 1 of 24 entries)

[43]  arXiv:2212.01436 (cross-list from cs.CV) [pdf, other]
Title: Unauthorized Drone Detection: Experiments and Prototypes
Comments: This paper has been accepted for presentation in 23rd IEEE International Conference on Industrial Technology (ICIT22), 22 - 25 August, 2022, Shanghai, China
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Mon, 5 Dec 2022 (showing first 9 of 17 entries)

[44]  arXiv:2212.01372 [pdf, ps, other]
Title: Bitcoin Security-Latency Under Network Delay
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Discrete Mathematics (cs.DM); Information Theory (cs.IT)
[45]  arXiv:2212.01362 [pdf, ps, other]
Title: Fast Detection of Burst Jamming for Delay-Sensitive Internet-of-Things Applications
Comments: arXiv admin note: text overlap with arXiv:1603.05305 by other authors
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2212.01356 [pdf, ps, other]
Title: Sequential Anomaly Detection Against Demodulation Reference Signal Spoofing in 5G NR
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[47]  arXiv:2212.01298 [pdf, other]
Title: 5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network
Comments: Link to the Dataset this http URL
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[48]  arXiv:2212.01274 [pdf]
Title: OOG- Optuna Optimized GAN Sampling Technique for Tabular Imbalanced Malware Data
Comments: Accepted for publication at 2022 IEEE International Conference on Big Data (IEEE BigData 2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[49]  arXiv:2212.01254 [pdf]
Title: Deep-Learning-based Vulnerability Detection in Binary Executables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2212.01194 [pdf, ps, other]
Title: Inheritance and Blockchain: Thoughts and Open Questions
Authors: Frédéric Prost
Comments: arXiv admin note: text overlap with arXiv:2209.11194
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2212.01082 [pdf, other]
Title: Membership Inference Attacks Against Semantic Segmentation Models
Comments: Submitted as conference paper to PETS 2023
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2212.00966 [pdf, other]
Title: A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection
Comments: Keywords: Cybersecurity, Anomaly Detection, Intrusion Detection, Deep Learning, Unsupervised Learning, Neural Networks; this https URL
Journal-ref: IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp. 137-142. IEEE, 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[ total of 91 entries: 1-10 | ... | 13-22 | 23-32 | 33-42 | 43-52 | 53-62 | 63-72 | 73-82 | 83-91 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2212, contact, help  (Access key information)