We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 98

[ total of 92 entries: 1-25 | 18-42 | 43-67 | 68-92 ]
[ showing 25 entries per page: fewer | more | all ]

Mon, 8 Aug 2022 (continued, showing last 9 of 15 entries)

[68]  arXiv:2208.02877 [pdf, other]
Title: A Forward-secure Efficient Two-factor Authentication Protocol
Subjects: Cryptography and Security (cs.CR)
[69]  arXiv:2208.02858 [pdf, other]
Title: An Empirical Study on Ethereum Private Transactions and the Security Implications
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2208.02857 [pdf, other]
Title: Identity-Based Authentication for On-Demand Charging of Electric Vehicles
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[71]  arXiv:2208.02820 [pdf, other]
Title: MOVE: Effective and Harmless Ownership Verification via Embedded External Features
Comments: 15 pages. The journal extension of our conference paper in AAAI 2022 (this https URL). arXiv admin note: substantial text overlap with arXiv:2112.03476
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[72]  arXiv:2208.03309 (cross-list from cs.LG) [pdf, other]
Title: Lethal Dose Conjecture on Data Poisoning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[73]  arXiv:2208.03111 (cross-list from cs.LG) [pdf, other]
Title: Data-free Backdoor Removal based on Channel Lipschitzness
Comments: Accepted to ECCV 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[74]  arXiv:2208.02905 (cross-list from cs.CY) [pdf, ps, other]
Title: Can the Government Compel Decryption? Don't Trust -- Verify
Comments: 16 pages. This is the full version of a forthcoming publication in Proceedings of the 2022 Symposium on Computer Science and Law
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[75]  arXiv:2208.02878 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Counterfactuals via Functional Mechanism
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[76]  arXiv:2208.02868 (cross-list from cs.LG) [pdf, other]
Title: GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation
Comments: This article will be presented in the International Conference on Compilers, Architectures, and Synthesis for Embedded Systems (CASES) 2022 and will appear as part of the ESWEEK-TCAD special issue
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Fri, 5 Aug 2022

[77]  arXiv:2208.02733 [pdf, other]
Title: On False Data Injection Attack against Building Automation Systems
Subjects: Cryptography and Security (cs.CR)
[78]  arXiv:2208.02699 [pdf, other]
Title: Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Comments: Extended version of a paper accepted at ESORICS 2022
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[79]  arXiv:2208.02672 [pdf, other]
Title: Information Flow Control-by-Construction for an Object-Oriented Language Using Type Modifiers
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2208.02615 [pdf, other]
Title: SROS2: Usable Cyber Security Tools for ROS 2
Comments: Accepted, IROS 2022, 7 pages, 2 figures, 5 code listings, 5 sections plus references
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Robotics (cs.RO); Software Engineering (cs.SE)
[81]  arXiv:2208.02592 [pdf, other]
Title: Design Considerations and Architecture for a Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[82]  arXiv:2208.02500 [pdf, other]
Title: "Yeah, it does have a...Windows `98 Vibe'': Usability Study of Security Features in Programmable Logic Controllers
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC); Systems and Control (eess.SY)
[83]  arXiv:2208.02310 [pdf, other]
Title: Design of secure and robust cognitive system for malware detection
Authors: Sanket Shukla
Comments: arXiv admin note: substantial text overlap with arXiv:2104.06652
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[84]  arXiv:2208.02759 (cross-list from cs.HC) [pdf, other]
Title: New Differential Privacy Communication Pipeline and Design Framework
Comments: poster
Journal-ref: The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[85]  arXiv:2208.02724 (cross-list from eess.SP) [pdf, other]
Title: Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[86]  arXiv:2208.02587 (cross-list from cs.LG) [pdf]
Title: Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption
Comments: 26 pages; 1 Figure; 7 Tables. arXiv admin note: text overlap with arXiv:2205.13265
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[87]  arXiv:2208.02556 (cross-list from cs.CV) [pdf, other]
Title: Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix
Comments: arXiv admin note: text overlap with arXiv:2205.12041
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[88]  arXiv:2208.02482 (cross-list from cs.CV) [pdf, other]
Title: Privacy Safe Representation Learning via Frequency Filtering Encoder
Comments: The IJCAI-ECAI-22 Workshop on Artificial Intelligence Safety (AISafety 2022)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[89]  arXiv:2208.02468 (cross-list from math.GR) [pdf, ps, other]
Title: On Compression Functions over Small Groups with Applications to Cryptography
Authors: Koji Nuida
Comments: 10 pages
Subjects: Group Theory (math.GR); Cryptography and Security (cs.CR)
[90]  arXiv:2208.02369 (cross-list from cs.AI) [pdf, other]
Title: Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework
Comments: 12 pages, 3 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[91]  arXiv:2208.02304 (cross-list from cs.LG) [pdf, other]
Title: How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?
Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[92]  arXiv:2208.02250 (cross-list from cs.SD) [pdf]
Title: Adversarial Attacks on ASR Systems: An Overview
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[ total of 92 entries: 1-25 | 18-42 | 43-67 | 68-92 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2208, contact, help  (Access key information)