We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 98

[ total of 65 entries: 1-50 | 16-65 ]
[ showing 50 entries per page: fewer | more | all ]

Fri, 30 Sep 2022 (continued, showing last 1 of 16 entries)

[16]  arXiv:2209.14385 (cross-list from cs.CV) [pdf, other]
Title: Feature Decoupling in Self-supervised Representation Learning for Open Set Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Thu, 29 Sep 2022

[17]  arXiv:2209.14243 [pdf, other]
Title: A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks
Comments: Extended version from IEEE IOLTS'2022 short paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[18]  arXiv:2209.14200 [pdf, ps, other]
Title: Building an Ethereum-Based Decentralized Vehicle Rental System
Journal-ref: Computational Intelligence in Security for Information Systems Conference, 45-53, 2019
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2209.14195 [pdf, other]
Title: Secure Indoor Location for Airport Environments
Journal-ref: 018 4th International Conference on Big Data Innovations and Applications (Innovate-Data) 2018
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2209.14130 [pdf, other]
Title: Video surveillance robot powered by raspberry pi
Journal-ref: Proceedings of the 1st International Conference on Internet of Things and Machine Learning 1-4, 2017
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2209.13961 [pdf]
Title: Big data analysis and distributed deep learning for next-generation intrusion detection system optimization
Journal-ref: J Big Data 6, 88 (2019)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[22]  arXiv:2209.13913 [pdf, other]
Title: Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2209.13793 [pdf]
Title: A Unified View of IoT And CPS Security and Privacy
Authors: Xinwen Fu
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2209.13697 [pdf, ps, other]
Title: On the Choice of Databases in Differential Privacy Composition
Comments: 14 pages, 0 figures
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2209.13643 [pdf, other]
Title: MPC-Pipe: an Efficient Pipeline Scheme for Secure Multi-party Machine Learning Inference
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[26]  arXiv:2209.13965 (cross-list from cs.AI) [pdf]
Title: Anomaly detection optimization using big data and deep learning to reduce false-positive
Journal-ref: J Big Data 7, 68 (2020)
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 28 Sep 2022

[27]  arXiv:2209.13454 [pdf]
Title: Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation
Comments: Submitted to Springer
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
[28]  arXiv:2209.13431 [pdf]
Title: MTTBA- A Key Contributor for Sustainable Energy Consumption Time and Space Utility for Highly Secured Crypto Transactions in Blockchain Technology
Comments: 15 pages, 13 figures
Subjects: Cryptography and Security (cs.CR)
[29]  arXiv:2209.13288 [pdf, other]
Title: A Benchmark Comparison of Python Malware Detection Approaches
Comments: 12 pages, 3 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[30]  arXiv:2209.13073 [pdf]
Title: Preprint: Privacy-preserving IoT Data Sharing Scheme
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2209.12993 [pdf, other]
Title: Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)
Comments: This is an extended version of a paper with the same name that will be presented in the 32nd Usenix Security Symposium (USENIX 2023)
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2209.12987 [pdf, other]
Title: TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[33]  arXiv:2209.12985 [pdf, other]
Title: A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2209.12984 [pdf, other]
Title: Characteristics and Main Threats about Multi-Factor Authentication: A Survey
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[35]  arXiv:2209.13523 (cross-list from cs.LG) [pdf, other]
Title: Watch What You Pretrain For: Targeted, Transferable Adversarial Examples on Self-Supervised Speech Recognition models
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[36]  arXiv:2209.13113 (cross-list from cs.CV) [pdf, other]
Title: FG-UAP: Feature-Gathering Universal Adversarial Perturbation
Comments: 27 pages, 4 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2209.13081 (cross-list from quant-ph) [pdf, ps, other]
Title: Functional Encryption with Secure Key Leasing
Journal-ref: In: Agrawal S., Lin D. (eds) Advances in Cryptology - Asiacrypt 2022 - LNCS
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[38]  arXiv:2209.13007 (cross-list from cs.NI) [pdf, other]
Title: Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Comments: IEEE GLOBECOM 2022 Publication
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[39]  arXiv:2209.12962 (cross-list from cs.CV) [pdf, other]
Title: FaRO 2: an Open Source, Configurable Smart City Framework for Real-Time Distributed Vision and Biometric Systems
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Tue, 27 Sep 2022

[40]  arXiv:2209.12867 [pdf, other]
Title: Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[41]  arXiv:2209.12742 [pdf, other]
Title: Too Many Options: A Survey of ABE Libraries for Developers
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2209.12698 [pdf, other]
Title: QuantumSolver: A quantum tool-set for developers
Comments: 10 pages, 4 figures, sumited to CAITS, SAM, CSCE, Springer Nature, Indexed by Computing Research and Education (CORE) with ranking C, Indexed by CS Conference Rankings (0.83), Indexed by GII-GRIN in Class WiP
Journal-ref: CAITS, SAM, CSCE. The 2022 World Congress in Computer Science, Computer Engineering, and Applied Computing. CSCE 2022, pg. 149. ISBN # 1-60132-516-9; American Council on Science & Education Las Vegas, USA. July 25-28, 2022
Subjects: Cryptography and Security (cs.CR)
[43]  arXiv:2209.12683 [pdf]
Title: Evaluating Malware Forensics Tools
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2209.12482 [pdf]
Title: Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity
Comments: Accepted by TrustCom-2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2209.12195 [pdf, other]
Title: SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[46]  arXiv:2209.12145 [pdf, other]
Title: Secure Decentralized IoT Service Platform using Consortium Blockchain
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[47]  arXiv:2209.12077 [pdf]
Title: Impact of a non-deterministic rekey interval on the performance of arc4random
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2209.12041 [pdf]
Title: Blockchain technologies in the design of Industrial Control Systems for Smart Cities
Authors: Gabriela Ahmadi-Assalemi (1), Haider Al-Khateeb (1) ((1) Cyber Quarter - Midlands Centre for Cyber Security, University of Wolverhampton, UK)
Comments: 8 pages, 5 figures
Journal-ref: published in IEEE Blockchain Technical Briefs, 2022, https://blockchain.ieee.org/technicalbriefs
Subjects: Cryptography and Security (cs.CR)
[49]  arXiv:2209.11962 [pdf, ps, other]
Title: Trace-based cryptoanalysis of cyclotomic PLWE for the non-split case
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2209.11957 [pdf, ps, other]
Title: Cooperative Resource Management in Quantum Key Distribution (QKD) Networks for Semantic Communication
Comments: 16 pages, 20 figures, journal paper. arXiv admin note: text overlap with arXiv:2208.11270
Subjects: Cryptography and Security (cs.CR)
[51]  arXiv:2209.11904 [pdf, other]
Title: CryptoGCN: Fast and Scalable Homomorphically Encrypted Graph Convolutional Network Inference
Comments: Accepted in Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[52]  arXiv:2209.11878 [pdf, other]
Title: "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software
Comments: To appear in USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[53]  arXiv:2209.11861 [pdf, other]
Title: Authentication and encryption for a robotic ad hoc network using identity-based cryptography
Journal-ref: 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data), 2018
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2209.11857 [pdf, other]
Title: Analysis of the new standard hash function
Journal-ref: International Conference on Computer Aided Systems Theory, 142-149, 2013
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2209.11802 [pdf]
Title: Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2209.12046 (cross-list from cs.LG) [pdf, other]
Title: Blinder: End-to-end Privacy Protection in Sensing Systems via Personalized Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[57]  arXiv:2209.11865 (cross-list from cs.NI) [pdf, other]
Title: Revocation management in vehicular ad-hoc networks
Comments: arXiv admin note: substantial text overlap with arXiv:2208.05343
Journal-ref: 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1210-1217, 2015
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Mon, 26 Sep 2022

[58]  arXiv:2209.11715 [pdf, other]
Title: The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
Comments: 19 pages, 23 figures. Accepted to NDSS 2023. Code availability: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[59]  arXiv:2209.11650 [pdf, ps, other]
Title: An Algebraic-Geometry Approach to Prime Factorization
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Algebraic Geometry (math.AG); Number Theory (math.NT); Quantum Physics (quant-ph)
[60]  arXiv:2209.11647 [pdf, other]
Title: Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2209.11545 [pdf, other]
Title: Analysis on Blockchain Consensus Mechanism Based on Proof of Work and Proof of Stake
Authors: Shi Yan
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2209.11274 [pdf, other]
Title: Trusted IP solution in multi-tenant cloud FPGA platform
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[63]  arXiv:2209.11739 (cross-list from cs.CV) [pdf]
Title: Catoptric Light can be Dangerous: Effective Physical-World Attack by Natural Phenomenon
Comments: arXiv admin note: substantial text overlap with arXiv:2209.09652, arXiv:2209.02430
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[64]  arXiv:2209.11595 (cross-list from cs.LG) [pdf, other]
Title: Differentially private partitioned variational inference
Comments: 30 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[65]  arXiv:2209.11531 (cross-list from eess.IV) [pdf, other]
Title: Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[ total of 65 entries: 1-50 | 16-65 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2210, contact, help  (Access key information)