We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 50

[ total of 100 entries: 1-50 | 51-100 ]
[ showing 50 entries per page: fewer | more | all ]

Fri, 12 Aug 2022 (continued, showing last 15 of 17 entries)

[51]  arXiv:2208.05865 [pdf, ps, other]
Title: Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms
Comments: 12 pages, 13 eps figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[52]  arXiv:2208.05750 [pdf, other]
Title: A Survey of MulVAL Extensions and Their Attack Scenarios Coverage
Subjects: Cryptography and Security (cs.CR)
[53]  arXiv:2208.05748 [pdf, other]
Title: Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work Mining
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2208.05734 [pdf, other]
Title: Secure ambient intelligence prototype for airports
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2208.05707 [pdf, other]
Title: Improving Tourist Experience Through an IoT Application Based on FatBeacons
Journal-ref: International Conference on Ubiquitous Computing and Ambient Intelligence, pp. 149-160, 2017
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2208.05680 [pdf, other]
Title: A Trust-Based Malicious RSU Detection Mechanism in Edge-Enabled Vehicular Ad Hoc Networks
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2208.05612 [pdf, other]
Title: SSLEM: A Simplifier for MBA Expressions based on Semi-linear MBA Expressions and Program Synthesis
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[58]  arXiv:2208.05604 [pdf, other]
Title: Going Incognito in the Metaverse
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2208.05586 [pdf, other]
Title: Multi-Factor Key Derivation Function (MFKDF)
Authors: Vivek Nair, Dawn Song
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2208.05514 [pdf, ps, other]
Title: Are Gradients on Graph Structure Reliable in Gray-box Attacks?
Comments: Preprint of a full paper accepted by CIKM 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[61]  arXiv:2208.05477 [pdf, other]
Title: Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation
Comments: 11 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2208.05476 [pdf, other]
Title: Sequence Feature Extraction for Malware Family Analysis via Graph Neural Network
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[63]  arXiv:2208.05475 [pdf, ps, other]
Title: Poster: Revocation in VANETs Based on k-ary Huffman Trees
Journal-ref: Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, pp. 25-26, 2015
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2208.05907 (cross-list from cs.IT) [pdf, other]
Title: Absolute Security in High-Frequency Wireless Links
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[65]  arXiv:2208.05740 (cross-list from cs.LG) [pdf, other]
Title: General Cutting Planes for Bound-Propagation-Based Neural Network Verification
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Optimization and Control (math.OC); Machine Learning (stat.ML)

Thu, 11 Aug 2022

[66]  arXiv:2208.05471 [pdf, ps, other]
Title: Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2208.05425 [pdf, other]
Title: Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
Comments: This paper is an extended version of a paper accepted to ACM Advances in Financial Techologies - AFT 2022
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2208.05408 [pdf, other]
Title: Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot
Comments: To appear at ConsensusDay 22 (ACM CCS 2022 Workshop)
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2208.05346 [pdf, ps, other]
Title: Analysis of lightweight cryptographic solutions for authentication in IoT
Journal-ref: International Conference on Computer Aided Systems Theory, 373-380, 2013
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2208.05345 [pdf]
Title: RFID authentication protocol based on a novel EPC Gen2 PRNG
Journal-ref: International Information Institute (Tokyo). Information 17 (4), 1587, 2014
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2208.05343 [pdf]
Title: Using query frequencies in tree-based revocation for certificateless authentication in VANETs
Journal-ref: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), pp. 268-273, 2014
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2208.05285 [pdf, other]
Title: Explaining Machine Learning DGA Detectors from DNS Traffic Data
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73]  arXiv:2208.05168 [pdf, other]
Title: TokenPatronus: A Decentralized NFT Anti-theft Mechanism
Comments: submitted to CESC 2022 as a work-in-progress paper
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2208.05125 [pdf, other]
Title: Cross-chain between a Parent Chain and Multiple Side Chains
Comments: 14 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2208.05109 [pdf, other]
Title: Tamperproof IoT with Blockchain
Comments: 3 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2208.05101 [pdf]
Title: Machine Learning with DBOS
Comments: AIDB@VLDB 2022
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[77]  arXiv:2208.05089 [pdf]
Title: Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, g figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2208.05085 [pdf]
Title: Collaborative Feature Maps of Networks and Hosts for AI-driven Intrusion Detection
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 3 figures 4 tables
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2208.05073 [pdf]
Title: Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services
Comments: IEEE Global Communications Conference (Globecom), 2022, 6 pages, 2 Figures, 4 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[80]  arXiv:2208.04999 [pdf, other]
Title: Measuring the Availability and Response Times of Public Encrypted DNS Resolvers
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2208.04991 [pdf, other]
Title: Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Networking and Internet Architecture (cs.NI)
[82]  arXiv:2208.05339 (cross-list from cs.DC) [pdf, other]
Title: Distributed Attestation Revocation in Self-Sovereign Identity
Comments: 8 pages, accepted at Local Computer Networks 2022, LCN 2022
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[83]  arXiv:2208.05264 (cross-list from cs.DS) [pdf, other]
Title: Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure
Comments: 14 pages, Accepted in IEEE Transactions on Data and Knowledge Engineering, 2022
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[84]  arXiv:2208.05083 (cross-list from cs.LG) [pdf, other]
Title: Reducing Exploitability with Population Based Training
Comments: Presented at New Frontiers in Adversarial Machine Learning Workshop, ICML 2022
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[85]  arXiv:2208.05009 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Aware Adversarial Network in Human Mobility Prediction
Comments: 15 pages, PoPETs'23, July 10--14, 2023, Lausanne, Switzerland. arXiv admin note: substantial text overlap with arXiv:2201.07519
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[86]  arXiv:2208.04946 (cross-list from cs.LG) [pdf, other]
Title: Attention Hijacking in Trojan Transformers
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[87]  arXiv:2208.04943 (cross-list from cs.LG) [pdf, other]
Title: PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)

Wed, 10 Aug 2022

[88]  arXiv:2208.04891 [pdf, other]
Title: Online Malware Classification with System-Wide System Calls in Cloud IaaS
Comments: Accepted at the IEEE 23rd International Conference on Information Reuse and Integration for Data Science
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2208.04838 [pdf, ps, other]
Title: Robust Machine Learning for Malware Detection over Time
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2208.04734 [pdf, other]
Title: Weak Equivalents for Nonlinear Filtering Functions
Journal-ref: International Conference on Computational Science and Its Applications, pp. 592-602, 2014
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2208.04719 [pdf, other]
Title: STELLA: Sparse Taint Analysis for Enclave Leakage Detection
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[92]  arXiv:2208.04676 [pdf]
Title: DeepHider: A Multi-module and Invisibility Watermarking Scheme for Language Model
Comments: 11 pages,7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[93]  arXiv:2208.04624 [pdf, other]
Title: Bottom-up Trust Registry in Self Sovereign Identity
Comments: 10 pages, published in Blockchain Congress Conference 2022
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2208.04591 [pdf, other]
Title: Stronger Privacy Amplification by Shuffling for Rényi and Approximate Differential Privacy
Comments: 14 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[95]  arXiv:2208.04903 (cross-list from cs.SI) [pdf, other]
Title: Characterizing the 2022 Russo-Ukrainian Conflict Through the Lenses of Aspect-Based Sentiment Analysis: Dataset, Methodology, and Preliminary Findings
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[96]  arXiv:2208.04845 (cross-list from math.OC) [pdf, ps, other]
Title: Quantization enabled Privacy Protection in Decentralized Stochastic Optimization
Comments: Accepted to IEEE Transactions on Automatic Control as a full paper. arXiv admin note: text overlap with arXiv:2205.03884
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[97]  arXiv:2208.04836 (cross-list from cs.NI) [pdf]
Title: Non-Fungible Tokens in Business and Management -- A Review
Comments: This is an author version of our paper submitted to a journal
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[98]  arXiv:2208.04767 (cross-list from cs.LG) [pdf, other]
Title: Combining Variational Modeling with Partial Gradient Perturbation to Prevent Deep Gradient Leakage
Comments: 21 pages, 14 figures, 6 tables (supplementary material included). This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[99]  arXiv:2208.04733 (cross-list from cs.NI) [pdf]
Title: Secure Implementation of a Vehicular Application for the Symbian Platform
Journal-ref: International Journal on Information Technologies & Security 4(2), 2012
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[100]  arXiv:2208.04692 (cross-list from cs.SE) [pdf, other]
Title: A Tutorial on the Interoperability of Self-sovereign Identities
Comments: Submitted to IEEE Communications Surveys & Tutorials
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[ total of 100 entries: 1-50 | 51-100 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)