We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020

[ total of 308 entries: 1-308 ]
[ showing 308 entries per page: fewer | more ]
[1]  arXiv:2012.00136 [pdf, ps, other]
Title: A Critique of Immunity Passports and W3C Decentralized Identifiers
Authors: Harry Halpin
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[2]  arXiv:2012.00193 [pdf, other]
Title: Lightweight Encryption for the Low Powered IoT Devices
Authors: Muhammad Usman
Comments: This is a short survey of lightweight encryption algorithms used in IoT, submitted as an assignment for the graduate course titled "Internet of Things"
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[3]  arXiv:2012.00283 [pdf, ps, other]
Title: A remark on MAKE -- a Matrix Action Key Exchange
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[4]  arXiv:2012.00463 [pdf, other]
Title: Towards a Universal Features Set for IoT Botnet Attacks Detection
Comments: Accepted in 2020 IEEE 23rd International Multitopic Conference (INMIC), 7 pages, 3 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[5]  arXiv:2012.00648 [pdf, other]
Title: Cyber-Attack Consequence Prediction
Comments: 9 pages. The pre-print of a paper to appear in the proceedings of the 3rd Workshop on Big Data Engineering and Analytics in Cyber-Physical Systems (BigEACPS'20), IEEE BigData Conference 2020
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[6]  arXiv:2012.00687 [pdf, other]
Title: Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7]  arXiv:2012.00740 [pdf, other]
Title: MYSTIKO : : Cloud-Mediated, Private, Federated Gradient Descent
Comments: IEEE CLOUD 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[8]  arXiv:2012.00817 [pdf, other]
Title: Game-Theoretic Malware Detection
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[9]  arXiv:2012.00826 [pdf]
Title: A Chatbot for Information Security
Journal-ref: IJCSNS International Journal of Computer Science and Network Security, VOL.20 No.4, April 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[10]  arXiv:2012.00845 [pdf, other]
Title: Malware Detection using Artificial Bee Colony Algorithm
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[11]  arXiv:2012.01032 [pdf, other]
Title: VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[12]  arXiv:2012.01046 [pdf, other]
Title: PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter
Comments: This paper is going to appear in 2021 Design, Automation and Test in Europe Conference (DATE)
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2012.01119 [pdf, other]
Title: Privacy-Preserving Directly-Follows Graphs: Balancing Risk and Utility in Process Mining
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[14]  arXiv:2012.01159 [pdf, other]
Title: Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
Journal-ref: The 6th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020)
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2012.01174 [pdf]
Title: Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning
Comments: Paper submitted for publication in ITU Journal on Future and Evolving Technologies (ITU J-FET)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[16]  arXiv:2012.01370 [pdf, other]
Title: CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum
Comments: In Proceedings of the 36th ACM/SIGAPP Symposium on Applied Computing
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2012.01765 [pdf, other]
Title: A Study of Password Security Factors among Bangladeshi Government Websites
Comments: Accepted for publication in the 23rd International Conference on Computer and Information Technology (ICCIT), 19-21 December, 2020
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2012.01812 [pdf, other]
Title: On Root Detection Strategies for Android Devices
Authors: Raphael Bialon
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[19]  arXiv:2012.01813 [pdf, other]
Title: A Multidisciplinary Definition of Privacy Labels: The Story of Princess Privacy and the Seven Helpers
Comments: 29 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[20]  arXiv:2012.01939 [pdf, other]
Title: Classifying Malware Using Function Representations in a Static Call Graph
Comments: 12 pages, 6 figures, accepted to CSoNet 2020 Dallas, to be published in Springer's Lecture Notes in Computer Science
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2012.01946 [pdf, other]
Title: Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web
Comments: Submitted to USENIX Security '21 on 16 Oct 2020
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2012.01964 [pdf, other]
Title: Proactive DDoS Attack Mitigation in Cloud-Fog Environment using Moving Target Defense
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2012.01968 [pdf, other]
Title: Accelerating Number Theoretic Transformations for Bootstrappable Homomorphic Encryption on GPUs
Comments: 12 pages, 13 figures, to appear in IISWC 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[24]  arXiv:2012.01971 [pdf, other]
Title: IoT DoS and DDoS Attack Detection using ResNet
Comments: Accepted in 2020 IEEE 23rd International Multitopic Conference (INMIC), 7 pages, 6 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2012.01972 [pdf, other]
Title: Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events
Journal-ref: The 6th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, June 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[26]  arXiv:2012.01983 [pdf, other]
Title: Detection of False-Reading Attacks in the AMI Net-Metering System
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[27]  arXiv:2012.01987 [pdf, ps, other]
Title: SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation
Journal-ref: The 15th International ARES Conference on Availability, Reliability and Security, August 25--28, 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[28]  arXiv:2012.02147 [pdf]
Title: The Application of Blockchain-Based Crypto Assets for Integrating the Physical and Financial Supply Chains in the Construction & Engineering Industry
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29]  arXiv:2012.02242 [pdf]
Title: A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem
Comments: 24 pages, 11 figures, 6 tables
Journal-ref: Int J Commun Syst. 2020;e4693
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[30]  arXiv:2012.02494 [pdf, other]
Title: LSB Steganography Using Pixel Locator Sequence with AES
Comments: 5 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[31]  arXiv:2012.02511 [pdf]
Title: Threats to the information system in the physical environment and cyberspace
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2012.02554 [pdf, other]
Title: Automating Seccomp Filter Generation for Linux Applications
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2012.02586 [pdf, other]
Title: TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic
Comments: Accepted for publication at NSPW 2020
Journal-ref: New Security Paradigms Workshop (NSPW) 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[34]  arXiv:2012.02606 [pdf, other]
Title: TrollHunter2020: Real-Time Detection of Trolling Narratives on Twitter During the 2020 US Elections
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[35]  arXiv:2012.02644 [pdf, other]
Title: A Survey on Blockchain & Cloud Integration
Comments: Accepted for publication in the 23rd International Conference on Computer and Information Technology (ICCIT), 2020
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2012.02670 [pdf, other]
Title: Unleashing the Tiger: Inference Attacks on Split Learning
Comments: ACM Conference on Computer and Communications Security 2021 (CCS21)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[37]  arXiv:2012.02675 [pdf, other]
Title: Resilience-by-design in Adaptive Multi-Agent Traffic Control Systems
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2012.02715 [pdf, other]
Title: Efficient Sealable Protection Keys for RISC-V
Comments: 7 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[39]  arXiv:2012.02745 [pdf, other]
Title: Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
Comments: Accepted at Annual Computer Security Applications Conference (ACSAC 2020), December 7-11, 2020, Austin, USA. ACM, New York, NY, USA, 13 pages, ACM ISBN 978-1-4503-8858-0/20/12 Artifact available: this https URL
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2012.02848 [pdf, other]
Title: Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Comments: arXiv admin note: substantial text overlap with arXiv:2005.10429
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2012.02865 [pdf]
Title: Hybrid Chaotic Method for Medical Images Ciphering
Journal-ref: International Journal of Network Security & Its Applications (IJNSA) Vol.12, No.6, November 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[42]  arXiv:2012.02885 [pdf, other]
Title: Verifiable Proof of Health using Public Key Cryptography
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[43]  arXiv:2012.02891 [pdf, other]
Title: Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems
Comments: IEEE Latin-American Conference on Communications (LATINCOM) 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44]  arXiv:2012.03141 [pdf, other]
Title: Automated Symbolic Verification of Telegram's MTProto 2.0
Comments: 19 pages
Journal-ref: In "Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021". ISBN 978-989-758-524-1, pages 185-197
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2012.03162 [pdf, other]
Title: MeLPUF: Memory in Logic PUF
Comments: 5 pages, 16 figures
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2012.03165 [pdf, other]
Title: Security and Privacy for Mobile Edge Caching: Challenges and Solutions
Comments: This article has been accepted by IEEE Wireless Communications Magazine
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[47]  arXiv:2012.03283 [pdf, other]
Title: On the Privacy and Integrity Risks of Contact-Tracing Applications
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[48]  arXiv:2012.03371 [pdf, other]
Title: More style, less work: card-style data decrease risk-limiting audit sample sizes
Comments: 19 pages, 9 figures. In submission at Digital Threats: Research and Practice
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[49]  arXiv:2012.03386 [pdf, other]
Title: SoK: Training Machine Learning Models over Multiple Sources with Privacy Preservation
Comments: 17 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2012.03404 [pdf, other]
Title: Black-box Model Inversion Attribute Inference Attacks on Classification Models
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[51]  arXiv:2012.03577 [pdf]
Title: Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions
Comments: Copy draft with 10 pages, 4 figures,35 references
Subjects: Cryptography and Security (cs.CR)
[52]  arXiv:2012.03586 [pdf, other]
Title: No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[53]  arXiv:2012.03589 [pdf]
Title: The Challenges with Internet of Things for Business
Comments: 9 pages, 42 references
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2012.03622 [pdf]
Title: Real-time monitoring as a supplementary security component of vigilantism in modern network environments
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2012.03669 [pdf]
Title: Internet Security Awareness of Filipinos: A Survey Paper
Comments: 13 pages
Journal-ref: IJCSR. Vol 1 No. 4 (2018) 14-26
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2012.03670 [pdf]
Title: Non-Repudiation for VoIP Communication in UMTS and LTE Networks
Authors: Umut Can Cabuk
Comments: Master's Thesis. Prepared in Fraunhofer SIT; defended in Aarhus University, in 2015
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[57]  arXiv:2012.03706 [pdf, other]
Title: Pricing Security in Proof-of-Work Systems
Subjects: Cryptography and Security (cs.CR)
[58]  arXiv:2012.03750 [pdf]
Title: Using Side Channel Information and Artificial Intelligence for Malware Detection
Comments: 7 pages
Journal-ref: 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2012.03765 [pdf, other]
Title: Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks
Comments: To appear in AAAI Conference on Artificial Intelligence, 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[60]  arXiv:2012.03782 [pdf, other]
Title: PCT-TEE: Trajectory-based Private Contact Tracing System with Trusted Execution Environment
Comments: Accepted by ACM TSAS
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[61]  arXiv:2012.03814 [pdf, other]
Title: Vulnerability Forecasting: In theory and practice
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2012.03816 [pdf, other]
Title: Invisible Backdoor Attack with Sample-Specific Triggers
Comments: It is accepted by ICCV 2021
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2012.04117 [pdf, other]
Title: Local Dampening: Differential Privacy for Non-numeric Queries via Local Sensitivity
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2012.04163 [pdf, other]
Title: Privacy-Preserving Spam Filtering using Functional Encryption
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[65]  arXiv:2012.04172 [pdf, other]
Title: When Services Computing Meets Blockchain: Challenges and Opportunities
Comments: 15 pages, 5 figures
Journal-ref: Journal of Parallel and Distributed Computing, 2021
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[66]  arXiv:2012.04215 [pdf, ps, other]
Title: On Aadhaar Identity Management System
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2012.04254 [pdf, other]
Title: RouTEE: A Secure Payment Network Routing Hub using Trusted Execution Environments
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2012.04405 [pdf]
Title: Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security
Authors: Ryan K L Ko
Comments: 15 pages, 5 figures, preprint of chapter in edited book "Emerging Technologies and International Security: Machines, the State, and War" edited By Reuben Steff, Joe Burton, Simona R. Soare
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Software Engineering (cs.SE)
[69]  arXiv:2012.04699 [pdf]
Title: Class Clown: Data Redaction in Machine Unlearning at Enterprise Scale
Comments: 8 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2012.04734 [pdf, other]
Title: A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[71]  arXiv:2012.04884 [pdf, other]
Title: Risk Management Framework for Machine Learning Security
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[72]  arXiv:2012.05003 [pdf, other]
Title: Interconnection between darknets
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[73]  arXiv:2012.05064 [pdf, other]
Title: Secure Medical Image Analysis with CrypTFlow
Comments: 6 pages. PPML NeurIPS 2020 Workshop, Vancouver, Canada. arXiv admin note: substantial text overlap with arXiv:1909.07814
Subjects: Cryptography and Security (cs.CR)
[74]  arXiv:2012.05141 [pdf, other]
Title: EMRs with Blockchain : A distributed democratised Electronic Medical Record sharing platform
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2012.05291 [pdf, other]
Title: PrivFramework: A System for Configurable and Automated Privacy Policy Compliance
Journal-ref: NeurIPS 2020 Workshop on Dataset Security and Curation
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2012.05434 [pdf, other]
Title: Composite Adversarial Attacks
Comments: To appear in AAAI 2021, code will be released later
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[77]  arXiv:2012.05471 [pdf, other]
Title: Securing the EDK II Image Loader
Comments: 10 pages, 2 tables
Journal-ref: 2020 Ivannikov Ispras Open Conference (ISPRAS), 2020, pp. 16-25
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[78]  arXiv:2012.05516 [pdf, other]
Title: Explainable Link Prediction for Privacy-Preserving Contact Tracing
Comments: 8 pages, 7 figures, SpicyFL 2020 Workshop at NeurIPS 2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[79]  arXiv:2012.05749 [pdf, other]
Title: Data Privacy in Trigger-Action Systems
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2012.05867 [pdf, other]
Title: Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2012.05948 [pdf, other]
Title: GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking
Comments: 6 pages, 4 figures, 6 tables, conference
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2012.06128 [pdf, other]
Title: SoK: Diving into DAG-based Blockchain Systems
Comments: Full version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[83]  arXiv:2012.06150 [pdf, other]
Title: FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[84]  arXiv:2012.06300 [pdf, other]
Title: Towards Secure and Leak-Free Workflows Using Microservice Isolation
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2012.06330 [pdf, other]
Title: Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and Filtering
Comments: Accepted in the International Workshop on Safety and Security of Deep Learning 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86]  arXiv:2012.06332 [pdf]
Title: An Empirical Review of Adversarial Defenses
Authors: Ayush Goel
Comments: 19 pages, 8 Figures, Report Reviewed by Vivek Menon
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[87]  arXiv:2012.06337 [pdf, other]
Title: Privacy and Robustness in Federated Learning: Attacks and Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88]  arXiv:2012.06340 [pdf, ps, other]
Title: Control Flow Obfuscation for FJ using Continuation Passing
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[89]  arXiv:2012.06354 [pdf, other]
Title: Privacy-preserving medical image analysis
Comments: Accepted at the workshop for Medical Imaging meets NeurIPS, 34th Conference on Neural Information Processing Systems (NeurIPS) December 11, 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[90]  arXiv:2012.06502 [pdf, other]
Title: Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions
Journal-ref: Published at ACSAC 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[91]  arXiv:2012.06554 [pdf, other]
Title: TEEMon: A continuous performance monitoring framework for TEEs
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[92]  arXiv:2012.06609 [pdf, other]
Title: RegulaTor: A Straightforward Website Fingerprinting Defense
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2012.06658 [pdf, other]
Title: Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
Comments: Published in the proceedings of DSN'21 (51st IEEE/IFIP Int. Conf. on Dependable Systems and Networks). Code and BibTeX entry available at this https URL
Journal-ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[94]  arXiv:2012.06666 [pdf, other]
Title: Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough
Comments: 19 pages, 15 Figures, IEEE Internet of Things Journal
Journal-ref: IEEE Internet of Things Journal, 2021
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2012.06761 [pdf, other]
Title: CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2012.06805 [pdf, other]
Title: Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2012.06810 [pdf]
Title: Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions
Comments: 40 pages, 19 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[98]  arXiv:2012.06884 [pdf, other]
Title: AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
Authors: Mordechai Guri
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2012.07006 [pdf, other]
Title: DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[100]  arXiv:2012.07173 [pdf, ps, other]
Title: Cover attacks for elliptic curves with prime order
Authors: Song Tian
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG)
[101]  arXiv:2012.07242 [pdf, other]
Title: Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs
Comments: Published in the 2020 proceedings of the International Conference of Field-Programmable Technology (ICFPT)
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[102]  arXiv:2012.07339 [pdf, other]
Title: Verifiable Observation of Permissioned Ledgers
Comments: Full report of ICBC'21 version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[103]  arXiv:2012.07432 [pdf, other]
Title: Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Authors: Amit Klein
Comments: To be published in 2021 IEEE Symposium on Security and Privacy (SP)
Subjects: Cryptography and Security (cs.CR)
[104]  arXiv:2012.07626 [pdf, ps, other]
Title: On Lightweight Privacy-Preserving Collaborative Learning for Internet of Things by Independent Random Projections
Comments: arXiv admin note: substantial text overlap with arXiv:1902.05197
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[105]  arXiv:2012.07634 [pdf, other]
Title: SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection
Comments: Associated code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2012.07805 [pdf, other]
Title: Extracting Training Data from Large Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[107]  arXiv:2012.07916 [pdf, other]
Title: When Physical Unclonable Function Meets Biometrics
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[108]  arXiv:2012.07917 [pdf, other]
Title: The Design and Implementation of a Verified File System with End-to-End Data Integrity
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[109]  arXiv:2012.07944 [pdf, other]
Title: Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services
Comments: To appear at: Rahel A. Fainchtein, Adam A. Aviv, Micah Sherr, Stephen Ribaudo, and Armaan Khullar. Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services. Proceedings on Privacy Enhancing Technologies (PoPETS), July 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[110]  arXiv:2012.07989 [pdf]
Title: The Emerging Threats of Deepfake Attacks and Countermeasures
Comments: 5
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[111]  arXiv:2012.07994 [pdf, other]
Title: Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model
Comments: Accepted in 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML)
Journal-ref: AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2012.08003 [pdf, other]
Title: Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies
Comments: 21 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[113]  arXiv:2012.08042 [pdf]
Title: Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach
Comments: 9 pages, 1 figure, 1 table, conference
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2012.08318 [pdf]
Title: Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:2012.08347 [pdf]
Title: Beyond Privacy Trade-offs with Structured Transparency
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[116]  arXiv:2012.08356 [pdf]
Title: Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection
Comments: 5 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[117]  arXiv:2012.08460 [pdf]
Title: Review and Test of Steganography Techniques
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2012.08487 [pdf, other]
Title: Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation
Comments: 11 pages, 10 figures
Journal-ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2012.08559 [pdf]
Title: Intrusion detection in computer systems by using artificial neural networks with Deep Learning approaches
Journal-ref: 10th International Conference on Advances in Computing and Information Technology (ACITY 2020), November 28~29, 2020, London, United Kingdom Volume Editors : David C. Wyld, Dhinaharan Nagamalai (Eds) ISBN : 978-1-925953-29-9
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[120]  arXiv:2012.08680 [pdf, other]
Title: Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[121]  arXiv:2012.08726 [pdf, other]
Title: Responsible Disclosure of Generative Models Using Scalable Fingerprinting
Comments: Accepted to ICLR'22 as Spotlight
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Graphics (cs.GR); Machine Learning (cs.LG)
[122]  arXiv:2012.08782 [pdf, other]
Title: A novel Two-Factor HoneyToken Authentication Mechanism
Comments: 7 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2012.08811 [pdf, other]
Title: Investigating the Ecosystem of Offensive Information Security Tools
Comments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2012.08835 [pdf, other]
Title: A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities
Comments: A poster version of this paper appeared as this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[125]  arXiv:2012.08968 [pdf]
Title: The Impact of Cyber Security Threats on the 2020 US Elections
Authors: Nicholas Stedmon
Comments: 3 pages
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[126]  arXiv:2012.09163 [pdf, other]
Title: Intertwining ROP Gadgets and Opaque Predicates for Robust Obfuscation
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2012.09214 [pdf, other]
Title: Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection
Comments: Includes Actionable Takeaways for SOCs
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[128]  arXiv:2012.09221 [pdf, other]
Title: Group Handover for Drone Base Stations
Comments: Published in IEEE Internet of Things Journal 2021
Journal-ref: IEEE Internet of Things Journal 2021
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2012.09292 [pdf, other]
Title: ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection
Journal-ref: Pervasive & Mobile Computing, Vol 76, September 2021
Subjects: Cryptography and Security (cs.CR)
[130]  arXiv:2012.09344 [pdf, other]
Title: Machine Learning for Detecting Data Exfiltration: A Review
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[131]  arXiv:2012.09375 [pdf, other]
Title: KHOVID: Interoperable Privacy Preserving Digital Contact Tracing
Comments: 14 pages, 7 figures. Submitted to a conference
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[132]  arXiv:2012.09593 [pdf, other]
Title: Concurrent Encryption and Authentication for Wireless Networks using Compressed Sensing
Authors: Chaoqing Tang
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2012.09707 [pdf]
Title: Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks
Comments: 24 single-column, double-spaced pages; 1 Figure; and 21 Tables
Subjects: Cryptography and Security (cs.CR)
[134]  arXiv:2012.09919 [pdf, ps, other]
Title: Efficient Verification of Optimized Code: Correct High-speed X25519
Comments: 19 pages, 5 figures. accepted at NFM 2021 (without appendix)
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[135]  arXiv:2012.09950 [pdf, other]
Title: Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication
Comments: 17 pages
Journal-ref: ACM Journal of Digital Threats: Research and Practice, June 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Human-Computer Interaction (cs.HC)
[136]  arXiv:2012.09960 [pdf]
Title: Understanding The Top 10 OWASP Vulnerabilities
Subjects: Cryptography and Security (cs.CR)
[137]  arXiv:2012.09987 [pdf]
Title: DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium
Comments: 17 Pages, 12 Tables, 17 Figures
Journal-ref: EEE Access, vol. 8, pp. 209594-209609, 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[138]  arXiv:2012.10011 [pdf]
Title: DistB-SDoIndustry: Enhancing Security in Industry 4.0 Services based on Distributed Blockchain through Software Defined Networking-IoT Enabled Architecture
Comments: 8 Pages, 6 Figures
Journal-ref: IJACSA, 11(9), 2020
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2012.10049 [pdf, ps, other]
Title: Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption
Subjects: Cryptography and Security (cs.CR)
[140]  arXiv:2012.10253 [pdf]
Title: Data Storage in the Decentralized World: Blockchain and Derivatives
Comments: 33 pages, 10 figures
Journal-ref: In Gulsecen S., Sharma S., Akadal E.(Eds.), Who Runs The World: DATA (pp. 37-69). Istanbul, Istanbul University Press (2020)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[141]  arXiv:2012.10313 [pdf, other]
Title: Towards Formally Verified Compilation of Tag-Based Policy Enforcement
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2012.10376 [pdf, other]
Title: Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[143]  arXiv:2012.10452 [pdf, other]
Title: Experimental relativistic zero-knowledge proofs
Comments: 8 pages, 3 figures
Journal-ref: Nature 599, 47-50 (2021)
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[144]  arXiv:2012.10511 [pdf, ps, other]
Title: An Infrastructure for Faithful Execution of Remote Attestation Protocols
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Programming Languages (cs.PL)
[145]  arXiv:2012.10523 [pdf, other]
Title: A closed form scale bound for the $(ε, δ)$-differentially private Gaussian Mechanism valid for all privacy regimes
Comments: 11 pages. Version 2 improves on the bound
Subjects: Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[146]  arXiv:2012.10534 [pdf, other]
Title: PAARS: Privacy Aware Access Regulation System
Comments: Published in 11th IEEE UEMCON 2020, NY, USA
Subjects: Cryptography and Security (cs.CR)
[147]  arXiv:2012.10563 [pdf, other]
Title: Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous Cryptocurrencies
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Cryptography and Security (cs.CR)
[148]  arXiv:2012.10566 [pdf, other]
Title: FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism
Subjects: Cryptography and Security (cs.CR)
[149]  arXiv:2012.10576 [pdf, other]
Title: Enabling Micro-payments on IoT Devices using Bitcoin Lightning Network
Comments: To be published at 2021 IEEE ICBC in Poster Track
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2012.10681 [pdf, ps, other]
Title: Blockchain-Based Approach for Securing Spectrum Trading in Multibeam Satellite Systems
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2012.10692 [pdf, other]
Title: Confused Modulo Projection based Somewhat Homomorphic Encryption -- Cryptosystem, Library and Applications on Secure Smart Cities
Comments: IEEE Internet of Things Journal (IOTJ), Published Online: 7 August 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[152]  arXiv:2012.10825 [pdf, ps, other]
Title: Hashcashed Reputation with Application in Designing Watchtowers
Subjects: Cryptography and Security (cs.CR)
[153]  arXiv:2012.10832 [pdf, other]
Title: AWA: Adversarial Website Adaptation
Comments: 15 pages, 7 figures, and 2 tables. Accepted in IEEE Transactions on Information Forensics and Security (TIFS)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[154]  arXiv:2012.10876 [src]
Title: Concrete Evaluation of the Random Probing Security
Comments: V. Jahandideh had an issue with his affiliation, and the other two did not want to be part of the project
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2012.11072 [src]
Title: A Secured Protocol for IoT Networks
Comments: Implementation was never carrier out with the proposed algorithms. The implementation discussed is based on earlier algorithms
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2012.11097 [pdf, other]
Title: DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
[157]  arXiv:2012.11206 [pdf]
Title: Edge Computing in Transportation: Security Issues and Challenges
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2012.11223 [pdf, other]
Title: FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs
Comments: 4 pages
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[159]  arXiv:2012.11325 [pdf, other]
Title: Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach
Comments: 4 pages, 2 figures, 1 table, Accepted and presented at IEEE 32nd International Conference on Microelectronics (IEEE-ICM2020)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[160]  arXiv:2012.11326 [pdf, other]
Title: Optimized Random Forest Model for Botnet Detection Based on DNS Queries
Comments: 4 pages, 3 figures, 1 table, Accepted and presented in IEEE 32nd International Conference on Microelectronics (IEEE-ICM2020)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[161]  arXiv:2012.11358 [pdf, other]
Title: Reconfigurable Integrated Optical Interferometer Network-Based Physically Unclonable Function
Journal-ref: Journal of Lightwave Technology, vol. 38, no. 17, pp. 4599-4606, 1 Sept.1, 2020
Subjects: Cryptography and Security (cs.CR); Optics (physics.optics); Quantum Physics (quant-ph)
[162]  arXiv:2012.11375 [pdf]
Title: Effectiveness of SCADA System Security Used Within Critical Infrastructure
Authors: Joshua Taylor
Subjects: Cryptography and Security (cs.CR)
[163]  arXiv:2012.11541 [pdf, other]
Title: Privacy Interpretation of Behavioural-based Anomaly Detection Approaches
Comments: 19 Pages
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2012.11699 [pdf, other]
Title: A Vulnerability Study on Academic Collaboration Networks Based on Network Dynamics
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[165]  arXiv:2012.11701 [pdf, other]
Title: Learning from What We Know: How to Perform Vulnerability Prediction using Noisy Historical Data
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[166]  arXiv:2012.12060 [pdf, other]
Title: Information Leakage Games: Exploring Information as a Utility Function
Comments: The journal version of GameSec'17 paper (arXiv:1705.05030), accepted in ACM Transactions on Privacy and Security (TOPS)
Journal-ref: ACM Trans. Priv. Secur. 25, 3, Article 20 (August 2022), pp. 1-36
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); Theoretical Economics (econ.TH)
[167]  arXiv:2012.12518 [pdf, ps, other]
Title: If This Context Then That Concern: Exploring users' concerns with IFTTT applets
Subjects: Cryptography and Security (cs.CR)
[168]  arXiv:2012.12529 [pdf, other]
Title: SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems
Subjects: Cryptography and Security (cs.CR)
[169]  arXiv:2012.12603 [pdf, other]
Title: Flexible Software Protection
Comments: Submitted to ACM Transactions on Privacy and Security
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2012.12743 [pdf, other]
Title: Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks
Authors: Qingtian Zou (1), Anoop Singhal (2), Xiaoyan Sun (3), Peng Liu (1) ((1) The Pennsylvania State University, (2) National Institute of Standards and Technology, (3) California State University, Sacramento)
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2012.12835 [pdf, other]
Title: Enabling Secure and Effective Biomedical Data Sharing through Cyberinfrastructure Gateways
Comments: Presented at Gateways 2020, Online, USA, October 2020, see this https URL
Subjects: Cryptography and Security (cs.CR)
[172]  arXiv:2012.12958 [pdf]
Title: Privacy Preservation for Wireless Sensor Networks in Healthcare: State of the Art, and Open Research Challenges
Comments: 42 pages, 15 figures and 4 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[173]  arXiv:2012.13053 [pdf, other]
Title: Function Secret Sharing for PSI-CA:With Applications to Private Contact Tracing
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2012.13225 [pdf, other]
Title: Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis
Subjects: Cryptography and Security (cs.CR)
[175]  arXiv:2012.13230 [pdf, ps, other]
Title: SoK: Lending Pools in Decentralized Finance
Comments: 20 pages. Under submission
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); General Finance (q-fin.GN)
[176]  arXiv:2012.13293 [pdf, other]
Title: Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[177]  arXiv:2012.13366 [pdf]
Title: Blockchain Technology: Methodology, Application and Security Issues
Comments: 10 pages, 14 Figures and 4 Tables
Journal-ref: IJCSNS International Journal of Computer Science and Network Security, VOL.20 No.2, February 2020
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2012.13423 [pdf, other]
Title: Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services
Journal-ref: IEEE Access, vol. 8, p.198152-198167, 2020
Subjects: Cryptography and Security (cs.CR)
[179]  arXiv:2012.13464 [pdf]
Title: Security of Connected and Automated Vehicles
Comments: 11 pages, 4 figures, published in the 2019 fall issue of the "Bridge" article of NAE on Cybersecurity
Journal-ref: The Bridge, National Academy of Engineering, 49(3), pp. 46-56 (2019)
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2012.13552 [pdf, other]
Title: Neural Network Training With Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2012.13718 [pdf]
Title: Towards Assessing Critical Infrastructures Cyber-Security Culture During Covid-19 Crisis: A Tailor-Made Survey
Comments: 4th International Conference on Networks and Security (NSEC 2020)
Subjects: Cryptography and Security (cs.CR)
[182]  arXiv:2012.13807 [pdf, ps, other]
Title: Secure Hot Path Crowdsourcing with Local Differential Privacy under Fog Computing Architecture
Comments: This paper appears in IEEE Transactions on Services Computing. this https URL
Subjects: Cryptography and Security (cs.CR)
[183]  arXiv:2012.13995 [pdf, other]
Title: FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
Comments: Appeared in NDSS 2021. For demo code, see this https URL . For slides, see this https URL . For the talk, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[184]  arXiv:2012.14111 [pdf]
Title: Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[185]  arXiv:2012.14171 [pdf, other]
Title: Spread-Transform Dither Modulation Watermarking of Deep Neural Network
Comments: Submitted to Journal of Information Security and Applications
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[186]  arXiv:2012.14205 [pdf, ps, other]
Title: Contract-Aware Secure Compilation
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[187]  arXiv:2012.14227 [pdf, other]
Title: Detecting Colluding Sybil Attackers in Robotic Networks using Backscatters
Comments: To appear in ACM/IEEE Transactions on Networking. arXiv admin note: substantial text overlap with arXiv:1912.04613
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2012.14318 [pdf, other]
Title: IRO: Integrity and Reliability Enhanced Ring ORAM
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[189]  arXiv:2012.14425 [pdf]
Title: Predicting Organizational Cybersecurity Risk: A Deep Learning Approach
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[190]  arXiv:2012.14427 [pdf, other]
Title: Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Journal-ref: 2020 IEEE REGION 10 CONFERENCE (TENCON), Osaka, Japan, 2020, pp. 414-419
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[191]  arXiv:2012.14430 [pdf]
Title: Effective Email Spam Detection System using Extreme Gradient Boosting
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[192]  arXiv:2012.14481 [pdf, other]
Title: A Survey on Vulnerabilities of Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2012.14488 [pdf, other]
Title: Phishing Detection through Email Embeddings
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[194]  arXiv:2012.14600 [pdf, other]
Title: Addressing the Lack of Comparability & Testing in CAN Intrusion Detection Research: A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset
Comments: title changed and author added from original version
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[195]  arXiv:2012.14663 [pdf]
Title: Assessing Information Quality in IoT Forensics: Theoretical Framework and Model Implementation
Comments: accepted for publication in Journal of Applied Logics (2020)
Subjects: Cryptography and Security (cs.CR)
[196]  arXiv:2012.14718 [pdf, other]
Title: Resource Analysis of Ethereum 2.0 Clients
Subjects: Cryptography and Security (cs.CR)
[197]  arXiv:2012.14728 [pdf, other]
Title: Armiarma: Ethereum2 Network Monitoring Tool
Subjects: Cryptography and Security (cs.CR)
[198]  arXiv:2012.14816 [pdf, other]
Title: Analysis of the Scalability of a Deep-Learning Network for Steganography "Into the Wild"
Comments: Proceeding of the 25th International Conference on Pattern Recognition, ICPR'2021, Worshop on MultiMedia FORensics in the WILD, MMForWILD'2021, Lecture Notes in Computer Science, LNCS, Springer, Virtual Conference due to Covid (formerly Milan, Italy), January 10-15, 2021, 14 pages, this https URL Also look at the associated video (youtube)
Journal-ref: Lecture Notes in Computer Science, LNCS, Springer, 2021
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2012.14867 [pdf]
Title: Scams in modern societies: how does China differ from the world?
Authors: Jeff Yan
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Physics and Society (physics.soc-ph)
[200]  arXiv:2012.14884 [pdf, other]
Title: Lightweight Techniques for Private Heavy Hitters
Comments: Appeared at IEEE Security & Privacy 2021
Subjects: Cryptography and Security (cs.CR)
[201]  arXiv:2012.14938 [pdf, other]
Title: UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
Comments: IEEE Transactions on Information Forensics and Security (TIFS)
Subjects: Cryptography and Security (cs.CR)
[202]  arXiv:2012.14954 [pdf]
Title: Privacy-Preserving Methods for Vertically Partitioned Incomplete Data
Journal-ref: 2020 AMIA Annual Symposium Proceedings
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[203]  arXiv:2012.15080 [pdf, other]
Title: Security Engineering for ISO 21434
Comments: This is a White Paper. This is a preliminary version. Its figures and template are to be finalized by our marketing department. V3 corrects a number of typos
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[204]  arXiv:2012.15116 [pdf, other]
Title: Stack-based Buffer Overflow Detection using Recurrent Neural Networks
Comments: 9 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[205]  arXiv:2012.15128 [pdf, other]
Title: PrivSyn: Differentially Private Data Synthesis
Subjects: Cryptography and Security (cs.CR)
[206]  arXiv:2012.15351 [pdf, other]
Title: A Decentralized Dynamic PKI based on Blockchain
Comments: 19 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[207]  arXiv:2012.15423 [pdf, other]
Title: Lattice-based Signcryption with Equality Test in Standard Model
Subjects: Cryptography and Security (cs.CR)
[208]  arXiv:2012.15740 [pdf, other]
Title: Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
Comments: ACM SAC'21. arXiv admin note: substantial text overlap with arXiv:2002.02741
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[209]  arXiv:2012.15799 [pdf, ps, other]
Title: On the Construction of a Post-Quantum Blockchain for Smart City
Comments: Elsevier. 20 pages, 9 figures, 6 tables
Journal-ref: Journal of Information Security and Applications, 2021
Subjects: Cryptography and Security (cs.CR)
[210]  arXiv:2012.00472 (cross-list from cs.DC) [pdf, other]
Title: Byzantine Eventual Consistency and the Fundamental Limits of Peer-to-Peer Databases
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Databases (cs.DB)
[211]  arXiv:2012.00517 (cross-list from cs.CV) [pdf, other]
Title: One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer
Journal-ref: 2021 4th International Conference on Signal Processing and Machine Learning (SPML 2021) (2021) 100-106
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[212]  arXiv:2012.01107 (cross-list from cs.MM) [pdf, ps, other]
Title: Retracing the Flow of the Stream: Investigating Kodi Streaming Services
Journal-ref: Digital Forensics and Cyber Crime: 11th EAI International Conference on Digital Forensics and Cybercrime (ICDF2C), Boston, USA, September 2020
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[213]  arXiv:2012.01382 (cross-list from cs.CY) [pdf, other]
Title: Analysis of a Decentralised Digital Token Architecture for Public Transport
Comments: 15 pages, 7 figures, 3 tables
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[214]  arXiv:2012.01553 (cross-list from cs.CY) [pdf, other]
Title: COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion
Comments: 37 pages, 11 figures. Supercedes arXiv:2005.06056
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[215]  arXiv:2012.01592 (cross-list from cs.DB) [pdf, other]
Title: Free Gap Estimates from the Exponential Mechanism, Sparse Vector, Noisy Max and Related Algorithms
Comments: arXiv admin note: substantial text overlap with arXiv:1904.12773
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[216]  arXiv:2012.01699 (cross-list from cs.CV) [pdf, other]
Title: Essential Features: Content-Adaptive Pixel Discretization to Improve Model Robustness to Adaptive Adversarial Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[217]  arXiv:2012.01701 (cross-list from cs.LG) [pdf, other]
Title: FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques
Comments: 12 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[218]  arXiv:2012.01791 (cross-list from cs.LG) [pdf, other]
Title: FAT: Federated Adversarial Training
Comments: NeurIPS 2020 Workshop on Scalability, Privacy, and Security in Federated Learning (SpicyFL)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[219]  arXiv:2012.01973 (cross-list from cs.LG) [pdf, other]
Title: A Systematic Literature Review on Federated Learning: From A Model Quality Perspective
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[220]  arXiv:2012.02009 (cross-list from eess.SY) [pdf, other]
Title: Fundamental Stealthiness-Distortion Tradeoffs in Dynamical Systems under Injection Attacks: A Power Spectral Analysis
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Information Theory (cs.IT); Signal Processing (eess.SP); Optimization and Control (math.OC)
[221]  arXiv:2012.02076 (cross-list from cs.LG) [pdf, other]
Title: SSGD: A safe and efficient method of gradient descent
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Distributed, Parallel, and Cluster Computing (cs.DC)
[222]  arXiv:2012.02081 (cross-list from cs.IT) [pdf, other]
Title: Compressive Sensing Approaches for Sparse Distribution Estimation Under Local Privacy
Comments: 11 pages, 2 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[223]  arXiv:2012.02384 (cross-list from eess.SY) [pdf, ps, other]
Title: Cross-Layer Coordinated Attacks on Cyber-Physical Systems: A LQG Game Framework with Controlled Observations
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[224]  arXiv:2012.02688 (cross-list from cs.LG) [pdf, other]
Title: ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare
Comments: AAAI 2021, Preprint version of the full paper with supplementary material
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[225]  arXiv:2012.03483 (cross-list from cs.LG) [pdf, other]
Title: Learning to Separate Clusters of Adversarial Representations for Robust Adversarial Detection
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[226]  arXiv:2012.03528 (cross-list from cs.LG) [pdf, other]
Title: Backpropagating Linearly Improves Transferability of Adversarial Examples
Comments: Accepted by NeurIPS 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[227]  arXiv:2012.03754 (cross-list from cs.LG) [pdf]
Title: Deep Learning Methods for Credit Card Fraud Detection
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[228]  arXiv:2012.03817 (cross-list from cs.DS) [pdf, other]
Title: A bounded-noise mechanism for differential privacy
Authors: Yuval Dagan, Gil Kur
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[229]  arXiv:2012.03893 (cross-list from cs.LG) [pdf, other]
Title: Sample-efficient proper PAC learning with approximate differential privacy
Comments: 40 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[230]  arXiv:2012.04156 (cross-list from math.NA) [pdf]
Title: An Efficient Analyses of the Behavior of One Dimensional Chaotic Maps using 0-1 Test and Three State Test
Comments: 6 pages, Published in IEEE RAICS 2020, see this https URL
Journal-ref: 2020 IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2020, pp. 125-130
Subjects: Numerical Analysis (math.NA); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Dynamical Systems (math.DS); Functional Analysis (math.FA); Chaotic Dynamics (nlin.CD)
[231]  arXiv:2012.04432 (cross-list from cs.LG) [pdf, other]
Title: Poisoning Semi-supervised Federated Learning via Unlabeled Data: Attacks and Defenses
Comments: Updated Version
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[232]  arXiv:2012.04436 (cross-list from cs.LG) [pdf, other]
Title: Towards Communication-efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[233]  arXiv:2012.04770 (cross-list from cs.NI) [pdf, other]
Title: SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[234]  arXiv:2012.04864 (cross-list from cs.LG) [pdf, other]
Title: EvaLDA: Efficient Evasion Attacks Towards Latent Dirichlet Allocation
Comments: Accepted for publication at AAAI'2021. 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[235]  arXiv:2012.05326 (cross-list from cs.LG) [pdf, other]
Title: Privacy Amplification by Decentralization
Comments: Accepted to AISTATS 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[236]  arXiv:2012.05403 (cross-list from cs.LG) [pdf, other]
Title: Research Challenges in Designing Differentially Private Text Generation Mechanisms
Comments: 14 pages, 1 figure
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[237]  arXiv:2012.05433 (cross-list from cs.LG) [pdf, other]
Title: Communication-Computation Efficient Secure Aggregation for Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[238]  arXiv:2012.05685 (cross-list from cs.LG) [pdf, other]
Title: Generative Deep Learning Techniques for Password Generation
Comments: 25 pages, 13 figures. Comments welcome!
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[239]  arXiv:2012.06024 (cross-list from cs.LG) [pdf, other]
Title: Robustness and Transferability of Universal Attacks on Compressed Models
Comments: Accepted to AAAI 2021 Workshop: Towards Robust, Secure and Efficient Machine Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[240]  arXiv:2012.06122 (cross-list from cs.LG) [pdf, other]
Title: DSRNA: Differentiable Search of Robust Neural Architectures
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[241]  arXiv:2012.06405 (cross-list from cs.CV) [pdf, other]
Title: Attack Agnostic Detection of Adversarial Examples via Random Subspace Analysis
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[242]  arXiv:2012.06809 (cross-list from cs.MM) [pdf, other]
Title: Coverless Video Steganography based on Maximum DC Coefficients
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[243]  arXiv:2012.06876 (cross-list from cs.LG) [pdf, other]
Title: Normalized Label Distribution: Towards Learning Calibrated, Adaptable and Efficient Activation Maps
Comments: Accepted in AAAI 2021 Workshop on "Towards Robust, Secure and Efficient Machine Learning"
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[244]  arXiv:2012.07110 (cross-list from cs.LG) [pdf, other]
Title: Leaking Sensitive Financial Accounting Data in Plain Sight using Deep Autoencoder Neural Networks
Comments: 8 pages (excl. appendix), 4 Figures, 2 Tables, AAAI-21 Workshop on Knowledge Discovery from Unstructured Data in Financial Services, this paper is the initial accepted version
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[245]  arXiv:2012.07196 (cross-list from cs.SE) [pdf, other]
Title: Software Quality Assessment for Robot Operating System
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Robotics (cs.RO)
[246]  arXiv:2012.07474 (cross-list from cs.LG) [pdf, other]
Title: HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Comments: 21 pages, 36 figures, conference paper
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[247]  arXiv:2012.07727 (cross-list from cs.IT) [pdf, ps, other]
Title: Localization Attack by Precoder Feedback Overhearing in 5G Networks and Countermeasures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[248]  arXiv:2012.07828 (cross-list from cs.LG) [pdf, other]
Title: Robustness Threats of Differential Privacy
Comments: NeurIPS'20 Privacy-Preserving Machine Learning Workshop
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[249]  arXiv:2012.08096 (cross-list from cs.CV) [pdf, other]
Title: FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems
Authors: Lu Chen, Jiao Sun, Wei Xu
Comments: 16 pages, ECML/PKDD 2020 research trace
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[250]  arXiv:2012.08156 (cross-list from cs.LG) [pdf, other]
Title: Confidential Machine Learning on Untrusted Platforms: A Survey
Comments: To appear in Cybersecurity Journal, Springer, 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[251]  arXiv:2012.08588 (cross-list from cs.CV) [pdf, other]
Title: FoggySight: A Scheme for Facial Lookup Privacy
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252]  arXiv:2012.08604 (cross-list from cs.LG) [pdf, other]
Title: Multi-modal AsynDGAN: Learn From Distributed Medical Image Data without Sharing Private Information
Comments: arXiv admin note: text overlap with arXiv:2006.00080
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[253]  arXiv:2012.08723 (cross-list from cs.LG) [pdf, other]
Title: Exacerbating Algorithmic Bias through Fairness Attacks
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[254]  arXiv:2012.08742 (cross-list from cs.MM) [pdf]
Title: An adaptive algorithm for embedding information into compressed JPEG images using the QIM method
Comments: 4 pages, 4 figures
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[255]  arXiv:2012.08980 (cross-list from cs.IT) [pdf, ps, other]
Title: Secure Degrees-of-Freedom of the MIMO X Channel with Delayed CSIT
Authors: Tong Zhang, Rui Wang
Comments: Accepted by IEEE WCL
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[256]  arXiv:2012.09013 (cross-list from cs.HC) [pdf, other]
Title: An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[257]  arXiv:2012.09116 (cross-list from cs.DS) [pdf, ps, other]
Title: On Avoiding the Union Bound When Answering Multiple Differentially Private Queries
Comments: 12 pages
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[258]  arXiv:2012.09155 (cross-list from cs.PL) [pdf, other]
Title: On the Generation of Disassembly Ground Truth and the Evaluation of Disassemblers
Comments: Revised and extended version of our publication that first appeared in the 2020 Workshop on Forming an Ecosystem Around Software Transformation (FEAST '20), November 13, 2020
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[259]  arXiv:2012.09364 (cross-list from cs.LG) [pdf, other]
Title: Towards Scalable and Privacy-Preserving Deep Neural Network via Algorithmic-Cryptographic Co-design
Comments: Accepted by ACM TIST
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[260]  arXiv:2012.10431 (cross-list from cs.CY) [pdf, other]
Title: TILT: A GDPR-Aligned Transparency Information Language and Toolkit for Practical Privacy Engineering
Comments: Accepted for publication at the ACM Conference on Fairness, Accountability, and Transparency 2021 (ACM FAccT'21). This is a preprint manuscript (authors' own version before final copy-editing)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Software Engineering (cs.SE)
[261]  arXiv:2012.10544 (cross-list from cs.LG) [pdf, other]
Title: Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[262]  arXiv:2012.10547 (cross-list from cs.LG) [pdf, other]
Title: NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-Sourced Datasets
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[263]  arXiv:2012.10602 (cross-list from cs.LG) [pdf, other]
Title: Scalable and Provably Accurate Algorithms for Differentially Private Distributed Decision Tree Learning
Comments: In AAAI Workshop on Privacy-Preserving Artificial Intelligence, 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[264]  arXiv:2012.10831 (cross-list from cs.LG) [pdf, other]
Title: Suspicious Massive Registration Detection via Dynamic Heterogeneous Graph Neural Networks
Comments: 8 pages, 1 figure, accepted in the AAAI Workshop on Deep Learning on Graphs 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[265]  arXiv:2012.11035 (cross-list from cs.IT) [pdf, other]
Title: Privacy Analysis of Online Learning Algorithms via Contraction Coefficients
Comments: Submitted
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[266]  arXiv:2012.11182 (cross-list from cs.SE) [pdf, other]
Title: Program State Abstraction for Feedback-Driven Fuzz Testing using Likely Invariants
Authors: Andrea Fioraldi
Comments: This is a Master Thesis
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[267]  arXiv:2012.11207 (cross-list from cs.LG) [pdf, other]
Title: On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Comments: NeurIPS 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[268]  arXiv:2012.11354 (cross-list from cs.LG) [pdf]
Title: Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape
Comments: Will be published on ACM Transactions Data Science
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[269]  arXiv:2012.11775 (cross-list from cs.LG) [pdf]
Title: MailLeak: Obfuscation-Robust Character Extraction Using Transfer Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[270]  arXiv:2012.11803 (cross-list from cs.CV) [pdf, other]
Title: Modeling Deep Learning Based Privacy Attacks on Physical Mail
Comments: Source code: this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[271]  arXiv:2012.12031 (cross-list from cs.DB) [pdf, other]
Title: Towards Quantifying Privacy in Process Mining
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[272]  arXiv:2012.12138 (cross-list from cs.LG) [pdf, ps, other]
Title: Projection-Free Bandit Optimization with Privacy Guarantees
Comments: Appears in AAAI-21
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Optimization and Control (math.OC)
[273]  arXiv:2012.12528 (cross-list from cs.CV) [pdf, other]
Title: The Translucent Patch: A Physical and Universal Attack on Object Detectors
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[274]  arXiv:2012.12591 (cross-list from cs.LG) [pdf, other]
Title: Comparison of Privacy-Preserving Distributed Deep Learning Methods in Healthcare
Comments: 10 pages, 12 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[275]  arXiv:2012.12640 (cross-list from cs.LG) [pdf, other]
Title: Gradient-Free Adversarial Attacks for Bayesian Neural Networks
Comments: 6 Pages, 2 Figures, AABI2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[276]  arXiv:2012.12803 (cross-list from cs.LG) [pdf, other]
Title: Hiding Among the Clones: A Simple and Nearly Optimal Analysis of Privacy Amplification by Shuffling
Comments: Updated to include numerical experiments for Renyi differential privacy
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[277]  arXiv:2012.13028 (cross-list from cs.LG) [pdf, other]
Title: General Domain Adaptation Through Proportional Progressive Pseudo Labeling
Comments: Published at 2020 IEEE International Conference on Big Data (Big Data)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[278]  arXiv:2012.13061 (cross-list from cs.CY) [pdf, other]
Title: Quantifying the Privacy-Utility Trade-offs in COVID-19 Contact Tracing Apps
Comments: 12 pages, 11 figures, 4 tables
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[279]  arXiv:2012.13111 (cross-list from cs.LG) [pdf, other]
Title: Exploring Adversarial Examples via Invertible Neural Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[280]  arXiv:2012.13573 (cross-list from cs.LG) [pdf, other]
Title: Robustness, Privacy, and Generalization of Adversarial Training
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[281]  arXiv:2012.13971 (cross-list from cs.LG) [pdf, other]
Title: Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[282]  arXiv:2012.14095 (cross-list from cs.CC) [pdf, other]
Title: Learning algorithms from circuit lower bounds
Authors: Ján Pich
Subjects: Computational Complexity (cs.CC); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Logic in Computer Science (cs.LO)
[283]  arXiv:2012.14156 (cross-list from cs.IT) [pdf]
Title: An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN
Journal-ref: Multimedia Tools and Applications, 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[284]  arXiv:2012.14574 (cross-list from cs.LG) [pdf, other]
Title: A Differentially Private Multi-Output Deep Generative Networks Approach For Activity Diary Synthesis
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285]  arXiv:2012.14738 (cross-list from cs.LG) [pdf, other]
Title: With False Friends Like These, Who Can Notice Mistakes?
Comments: AAAI 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[286]  arXiv:2012.14965 (cross-list from cs.LG) [pdf, other]
Title: Improving Adversarial Robustness in Weight-quantized Neural Networks
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[287]  arXiv:2012.15019 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Constrained Policies via Mutual Information Regularized Policy Gradients
Comments: 8 pages; figure/table formatting fixed
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[288]  arXiv:2012.15041 (cross-list from cs.CV) [pdf, other]
Title: Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes
Comments: This paper was accepted, on December 5, 2020, for publication and oral presentation at the 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021) to be held in Zhuhai, China during January 8-10, 2021 and hosted by Beijing Normal University (Zhuhai)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[289]  arXiv:2012.15713 (cross-list from cs.DB) [pdf, other]
Title: Kamino: Constraint-Aware Differentially Private Data Synthesis
Comments: Update based on reviewers' comments
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[290]  arXiv:2012.15721 (cross-list from cs.LG) [pdf, other]
Title: Coded Machine Unlearning
Comments: Accepted for publication in IEEE Access
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[291]  arXiv:2012.00870 (cross-list from math.CO) [pdf, ps, other]
Title: Image sets of perfectly nonlinear maps
Comments: Major revision
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[292]  arXiv:2012.02127 (cross-list from quant-ph) [pdf, other]
Title: Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol
Comments: 17 pages; 3 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[293]  arXiv:2012.02256 (cross-list from eess.SP) [pdf]
Title: A Novel Approach to Radiometric Identification
Comments: 7 pages, 3 figures, 2 tables
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[294]  arXiv:2012.03154 (cross-list from eess.AS) [pdf, other]
Title: Multi-task Learning Based Spoofing-Robust Automatic Speaker Verification System
Comments: 12 pages, 6 figures, codes used in the experimental section can be found at this https URL
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[295]  arXiv:2012.03407 (cross-list from quant-ph) [pdf, other]
Title: Quantum Keyless Privacy vs. Quantum Key Distribution for Space Links
Journal-ref: Phys. Rev. Applied 16, 014006 (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[296]  arXiv:2012.03461 (cross-list from math.OC) [pdf, ps, other]
Title: A Distributed and Secure Algorithm for Computing Dominant SVD Based on Projection Splitting
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[297]  arXiv:2012.04211 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Fully Homomorphic Encryption by Integrating Pauli One-time Pad with Quaternions
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[298]  arXiv:2012.04454 (cross-list from eess.AS) [pdf, other]
Title: Adversarial Disentanglement of Speaker Representation for Attribute-Driven Privacy Preservation
Comments: Accepted to Interspeech 2021
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[299]  arXiv:2012.04473 (cross-list from econ.GN) [pdf, other]
Title: Quantum Technology for Economists
Comments: 106 pages, 13 figures
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[300]  arXiv:2012.04848 (cross-list from quant-ph) [pdf, ps, other]
Title: Constant-round Blind Classical Verification of Quantum Sampling
Comments: improved presentation. main results remain the same
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[301]  arXiv:2012.08870 (cross-list from math.AG) [pdf, ps, other]
Title: Explicit bases of the Riemann-Roch spaces on divisors on hyperelliptic curves
Subjects: Algebraic Geometry (math.AG); Cryptography and Security (cs.CR)
[302]  arXiv:2012.08924 (cross-list from eess.SP) [pdf, ps, other]
Title: Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary
Comments: To appear in MDPI Entropy Journal. arXiv admin note: text overlap with arXiv:2002.11687
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Information Theory (cs.IT); Multimedia (cs.MM)
[303]  arXiv:2012.09775 (cross-list from stat.ME) [pdf, other]
Title: Differential privacy and noisy confidentiality concepts for European population statistics
Authors: Fabian Bach
Comments: 37 pages, 7 figures, extended abstract accepted for NTTS 2021
Subjects: Methodology (stat.ME); Cryptography and Security (cs.CR)
[304]  arXiv:2012.11424 (cross-list from quant-ph) [pdf, other]
Title: Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis
Comments: 16 pages main text, 25 pages supplementary material, 20 figures. Comments welcome
Journal-ref: Phys. Rev. A 105, 042604, 2022
Subjects: Quantum Physics (quant-ph); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[305]  arXiv:2012.14396 (cross-list from quant-ph) [pdf]
Title: A Guide to Global Quantum Key Distribution Networks
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[306]  arXiv:2012.14897 (cross-list from quant-ph) [pdf, other]
Title: $\mathcal{PT}$-Symmetric Quantum Discrimination of Three States
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[307]  arXiv:2012.15254 (cross-list from quant-ph) [pdf, other]
Title: Post-Quantum Blockchain Proofs of Work
Comments: 30 pages. (v3) changed the title and improved readability. This work supersedes the result of our previous work in eprint.iacr.org/2019/1150
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[308]  arXiv:2012.04454 (cross-list from eess.AS) [pdf, other]
Title: Adversarial Disentanglement of Speaker Representation for Attribute-Driven Privacy Preservation
Comments: Accepted to Interspeech 2021
Subjects: Audio and Speech Processing (eess.AS); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 308 entries: 1-308 ]
[ showing 308 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2205, contact, help  (Access key information)