We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 67

[ total of 97 entries: 1-25 | 18-42 | 43-67 | 68-92 | 93-97 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 22 Nov 2022 (continued, showing last 3 of 40 entries)

[68]  arXiv:2211.10712 (cross-list from cs.IT) [pdf, other]
Title: Comparison of different coding schemes for 1-bit ADC
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[69]  arXiv:2211.10708 (cross-list from cs.LG) [pdf, other]
Title: A Survey on Differential Privacy with Machine Learning and Future Outlook
Comments: 12 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[70]  arXiv:2211.10661 (cross-list from cs.SD) [pdf, other]
Title: Phonemic Adversarial Attack against Audio Recognition in Real World
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)

Mon, 21 Nov 2022

[71]  arXiv:2211.10299 [pdf, other]
Title: Trusted Hart for Mobile RISC-V Security
Comments: Abbreviated version of this paper will be presented at the 14th International Workshop on Cyberspace Security and Artificial Intelligence (CAI-2022)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[72]  arXiv:2211.10260 [pdf, other]
Title: Integrated Space Domain Awareness and Communication System
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[73]  arXiv:2211.10173 [pdf, other]
Title: How Do Input Attributes Impact the Privacy Loss in Differential Privacy?
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[74]  arXiv:2211.10095 [pdf, other]
Title: Improving Robustness of TCM-based Robust Steganography with Variable Robustness
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2211.10082 [pdf, other]
[76]  arXiv:2211.10076 [pdf, other]
Title: Applications of Quantum Annealing in Cryptography
Subjects: Cryptography and Security (cs.CR)
[77]  arXiv:2211.10062 [pdf, other]
Title: Intrusion Detection in Internet of Things using Convolutional Neural Networks
Comments: Keywords: Cybersecurity, Intrusion Detection, IoT, Deep Learning, Convolutional Neural Networks; this https URL
Journal-ref: In 2021 18th International Conference on Privacy, Security and Trust (PST), pp. 1-10. IEEE, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[78]  arXiv:2211.10048 [pdf, other]
Title: Clustering based opcode graph generation for malware variant detection
Comments: Keywords: malware detection and attribution, malware family, clustering, opcode graph, machine learning; this https URL
Journal-ref: In 18th International Conference on Privacy, Security and Trust (PST), pp. 1-11. IEEE, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[79]  arXiv:2211.10033 [pdf, other]
Title: Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[80]  arXiv:2211.10028 [pdf]
Title: Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments
Comments: 20 pages, 4 Figures
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2211.10027 [pdf]
Title: Secure Quantum Computing for Healthcare Sector: A Short Analysis
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2211.10014 [pdf, other]
Title: Users are Closer than they Appear: Protecting User Location from WiFi APs
Comments: 6 pages, 6 figures, submitted to HotMobile 2023
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP); Systems and Control (eess.SY)
[83]  arXiv:2211.10001 [pdf, other]
Title: BDTS: A Blockchain-based Data Trading System with Fair Exchange
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Computer Science and Game Theory (cs.GT)
[84]  arXiv:2211.10227 (cross-list from cs.LG) [pdf]
Title: Adversarial Detection by Approximation of Ensemble Boundary
Authors: T. Windeatt
Comments: 8 pages, 8 figures, 8 tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[85]  arXiv:2211.10209 (cross-list from cs.LG) [pdf, other]
Title: Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks
Comments: arXiv admin note: text overlap with arXiv:2202.02242
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[86]  arXiv:2211.10099 (cross-list from cs.PL) [pdf, other]
Title: Reconciling Shannon and Scott with a Lattice of Computable Information
Comments: 30 pages; to be presented at the 50th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL 2023), 15-21 January 2023
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[87]  arXiv:2211.10024 (cross-list from cs.LG) [pdf, other]
Title: Diagnostics for Deep Neural Networks with Automated Copy/Paste Attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[88]  arXiv:2211.09810 (cross-list from cs.LG) [pdf, other]
Title: Certifying Robustness of Convolutional Neural Networks with Tight Linear Approximation
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Fri, 18 Nov 2022 (showing first 4 of 9 entries)

[89]  arXiv:2211.09656 [pdf, other]
Title: Social Networks are Divulging Your Identity behind Crypto Addresses
Subjects: Cryptography and Security (cs.CR)
[90]  arXiv:2211.09565 [pdf, other]
Title: Towards Good Practices in Evaluating Transfer Adversarial Attacks
Comments: Our code and a list of categorized attacks are publicly available at this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[91]  arXiv:2211.09524 [pdf]
Title: Towards Effective Cybercrime Intervention
Comments: Crime motivations, crime prevention, cybercrime, ex-cyber criminals
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[92]  arXiv:2211.09353 [pdf, other]
Title: Securer and Faster Privacy-Preserving Distributed Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 97 entries: 1-25 | 18-42 | 43-67 | 68-92 | 93-97 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2211, contact, help  (Access key information)