We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 175

[ total of 308 entries: 1-25 | ... | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]
[176]  arXiv:2012.13293 [pdf, other]
Title: Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[177]  arXiv:2012.13366 [pdf]
Title: Blockchain Technology: Methodology, Application and Security Issues
Comments: 10 pages, 14 Figures and 4 Tables
Journal-ref: IJCSNS International Journal of Computer Science and Network Security, VOL.20 No.2, February 2020
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2012.13423 [pdf, other]
Title: Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services
Journal-ref: IEEE Access, vol. 8, p.198152-198167, 2020
Subjects: Cryptography and Security (cs.CR)
[179]  arXiv:2012.13464 [pdf]
Title: Security of Connected and Automated Vehicles
Comments: 11 pages, 4 figures, published in the 2019 fall issue of the "Bridge" article of NAE on Cybersecurity
Journal-ref: The Bridge, National Academy of Engineering, 49(3), pp. 46-56 (2019)
Subjects: Cryptography and Security (cs.CR)
[180]  arXiv:2012.13552 [pdf, other]
Title: Neural Network Training With Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[181]  arXiv:2012.13718 [pdf]
Title: Towards Assessing Critical Infrastructures Cyber-Security Culture During Covid-19 Crisis: A Tailor-Made Survey
Comments: 4th International Conference on Networks and Security (NSEC 2020)
Subjects: Cryptography and Security (cs.CR)
[182]  arXiv:2012.13807 [pdf, ps, other]
Title: Secure Hot Path Crowdsourcing with Local Differential Privacy under Fog Computing Architecture
Comments: This paper appears in IEEE Transactions on Services Computing. this https URL
Subjects: Cryptography and Security (cs.CR)
[183]  arXiv:2012.13995 [pdf, other]
Title: FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
Comments: Appeared in NDSS 2021. For demo code, see this https URL . For slides, see this https URL . For the talk, see this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[184]  arXiv:2012.14111 [pdf]
Title: Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[185]  arXiv:2012.14171 [pdf, other]
Title: Spread-Transform Dither Modulation Watermarking of Deep Neural Network
Comments: Submitted to Journal of Information Security and Applications
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[186]  arXiv:2012.14205 [pdf, ps, other]
Title: Contract-Aware Secure Compilation
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[187]  arXiv:2012.14227 [pdf, other]
Title: Detecting Colluding Sybil Attackers in Robotic Networks using Backscatters
Comments: To appear in ACM/IEEE Transactions on Networking. arXiv admin note: substantial text overlap with arXiv:1912.04613
Subjects: Cryptography and Security (cs.CR)
[188]  arXiv:2012.14318 [pdf, other]
Title: IRO: Integrity and Reliability Enhanced Ring ORAM
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[189]  arXiv:2012.14425 [pdf]
Title: Predicting Organizational Cybersecurity Risk: A Deep Learning Approach
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[190]  arXiv:2012.14427 [pdf, other]
Title: Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Journal-ref: 2020 IEEE REGION 10 CONFERENCE (TENCON), Osaka, Japan, 2020, pp. 414-419
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[191]  arXiv:2012.14430 [pdf]
Title: Effective Email Spam Detection System using Extreme Gradient Boosting
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[192]  arXiv:2012.14481 [pdf, other]
Title: A Survey on Vulnerabilities of Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[193]  arXiv:2012.14488 [pdf, other]
Title: Phishing Detection through Email Embeddings
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[194]  arXiv:2012.14600 [pdf, other]
Title: Addressing the Lack of Comparability & Testing in CAN Intrusion Detection Research: A Comprehensive Guide to CAN IDS Data & Introduction of the ROAD Dataset
Comments: title changed and author added from original version
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[195]  arXiv:2012.14663 [pdf]
Title: Assessing Information Quality in IoT Forensics: Theoretical Framework and Model Implementation
Comments: accepted for publication in Journal of Applied Logics (2020)
Subjects: Cryptography and Security (cs.CR)
[196]  arXiv:2012.14718 [pdf, other]
Title: Resource Analysis of Ethereum 2.0 Clients
Subjects: Cryptography and Security (cs.CR)
[197]  arXiv:2012.14728 [pdf, other]
Title: Armiarma: Ethereum2 Network Monitoring Tool
Subjects: Cryptography and Security (cs.CR)
[198]  arXiv:2012.14816 [pdf, other]
Title: Analysis of the Scalability of a Deep-Learning Network for Steganography "Into the Wild"
Comments: Proceeding of the 25th International Conference on Pattern Recognition, ICPR'2021, Worshop on MultiMedia FORensics in the WILD, MMForWILD'2021, Lecture Notes in Computer Science, LNCS, Springer, Virtual Conference due to Covid (formerly Milan, Italy), January 10-15, 2021, 14 pages, this https URL Also look at the associated video (youtube)
Journal-ref: Lecture Notes in Computer Science, LNCS, Springer, 2021
Subjects: Cryptography and Security (cs.CR)
[199]  arXiv:2012.14867 [pdf]
Title: Scams in modern societies: how does China differ from the world?
Authors: Jeff Yan
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Physics and Society (physics.soc-ph)
[200]  arXiv:2012.14884 [pdf, other]
Title: Lightweight Techniques for Private Heavy Hitters
Comments: Appeared at IEEE Security & Privacy 2021
Subjects: Cryptography and Security (cs.CR)
[ total of 308 entries: 1-25 | ... | 101-125 | 126-150 | 151-175 | 176-200 | 201-225 | 226-250 | 251-275 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2208, contact, help  (Access key information)