We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 64

[ total of 96 entries: 1-50 | 15-64 | 65-96 ]
[ showing 50 entries per page: fewer | more | all ]

Tue, 16 Aug 2022 (continued, showing last 11 of 27 entries)

[65]  arXiv:2208.07316 (cross-list from cs.CL) [pdf, other]
Title: MENLI: Robust Evaluation Metrics from Natural Language Inference
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[66]  arXiv:2208.07272 (cross-list from cs.LG) [pdf, other]
Title: Training-Time Attacks against k-Nearest Neighbors
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[67]  arXiv:2208.07241 (cross-list from cs.CV) [pdf, other]
Title: HEFT: Homomorphically Encrypted Fusion of Biometric Templates
Comments: IJCB 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[68]  arXiv:2208.07119 (cross-list from cs.SE) [pdf, other]
Title: Xscope: Hunting for Cross-Chain Bridge Attacks
Comments: To appear at the Tool Demonstration Track of ASE'22. Please cite the conference version
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[69]  arXiv:2208.06963 (cross-list from cs.IT) [pdf, ps, other]
Title: Privacy-Preserving Decentralized Inference with Graph Neural Networks in Wireless Networks
Comments: This paper has been submitted to TWC
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[70]  arXiv:2208.06946 (cross-list from cs.AI) [pdf, other]
Title: Targeted Honeyword Generation with Language Models
Comments: 8 pages, 7 tables, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[71]  arXiv:2208.06767 (cross-list from cs.NI) [pdf, other]
Title: IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation
Comments: Accepted to S&P '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[72]  arXiv:2208.06651 (cross-list from cs.SI) [pdf, other]
Title: Revisiting Adversarial Attacks on Graph Neural Networks for Graph Classification
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73]  arXiv:2208.06538 (cross-list from cs.LG) [pdf, other]
Title: MaskBlock: Transferable Adversarial Examples with Bayes Approach
Comments: Under Review
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[74]  arXiv:2208.06537 (cross-list from cs.LG) [pdf, other]
Title: Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[75]  arXiv:2208.06432 (cross-list from cs.DC) [pdf, other]
Title: Hybrid On/Off Blockchain Approach for Vehicle Data Management, Processing and Visualization Exemplified by the ADAPT Platform
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)

Mon, 15 Aug 2022

[76]  arXiv:2208.06231 [pdf, other]
Title: Mutual authentication in self-organized VANETs
Journal-ref: Computer Standards & Interfaces 36 (4), 704-710, 2014
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2208.06223 [pdf, ps, other]
Title: Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries
Comments: 56 pages, 11 figures. arXiv admin note: text overlap with arXiv:2201.12194
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[78]  arXiv:2208.06165 [pdf, other]
Title: Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots
Authors: Chintan Patel
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[79]  arXiv:2208.06153 [pdf, ps, other]
Title: How to build vehicular ad-hoc networks on smartphones
Journal-ref: Journal of Systems Architecture 59 (10), 996-1004, 2013
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2208.06147 [pdf]
Title: Software implementation of the SNOW 3G Generator on iOS and Android platforms
Journal-ref: Logic Journal of IGPL 24 (1), 29-41, 2016
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2208.06136 [pdf, ps, other]
Title: How far are German companies in improving security through static program analysis tools?
Comments: IEEE Secure Development Conference 2022
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[82]  arXiv:2208.06130 [pdf]
Title: Analysis, Detection, and Classification of Android Malware using System Calls
Comments: 18 pages, 7 table , 3 figures
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2208.06092 [pdf, other]
Title: On deceiving malware classification with section injection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[84]  arXiv:2208.06075 [pdf, other]
[85]  arXiv:2208.06003 [pdf]
Title: Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
Comments: IEEE Access, early published by July 14, 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[86]  arXiv:2208.06002 [pdf, other]
Title: A review of cryptosystems based on multi layer chaotic mappings
Comments: 10 pages, 1 figure, 3 tables
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2208.06405 (cross-list from cs.LG) [pdf, other]
Title: Collective Obfuscation and Crowdsourcing
Comments: 9 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[88]  arXiv:2208.06265 (cross-list from cs.IR) [pdf, other]
Title: Trustworthy Recommender Systems
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[89]  arXiv:2208.06236 (cross-list from stat.ME) [pdf, other]
Title: Differentially Private Kolmogorov-Smirnov-Type Tests
Authors: Jordan Awan, Yue Wang
Comments: 15 pages before references. 3 Figures
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[90]  arXiv:2208.06228 (cross-list from stat.ML) [pdf, ps, other]
Title: Unifying Gradients to Improve Real-world Robustness for Deep Networks
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[91]  arXiv:2208.06176 (cross-list from cs.LG) [pdf, other]
Title: A Knowledge Distillation-Based Backdoor Attack in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[92]  arXiv:2208.06163 (cross-list from cs.LG) [pdf, other]
Title: Dropout is NOT All You Need to Prevent Gradient Leakage
Comments: 25 pages, 17 figures, 8 tables (supplementary material included)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[93]  arXiv:2208.06135 (cross-list from cs.LG) [pdf, other]
Title: Private Domain Adaptation from a Public Source
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[94]  arXiv:2208.06095 (cross-list from cs.LG) [pdf, other]
Title: A Fast Blockchain-based Federated Learning Framework with Compressed Communications
Comments: To appear in IEEE Journal on Selected Areas in Communications (JSAC)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[95]  arXiv:2208.06093 (cross-list from cs.LG) [pdf, other]
Title: Scalable and Sparsity-Aware Privacy-Preserving K-means Clustering with Application to Fraud Detection
Comments: 10 pages, 9 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[96]  arXiv:2208.05969 (cross-list from cs.LG) [pdf, other]
Title: Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment
Comments: Accepted by ASE2022. Camera-ready Version
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[ total of 96 entries: 1-50 | 15-64 | 65-96 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)