We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 75

[ total of 308 entries: 1-10 | ... | 46-55 | 56-65 | 66-75 | 76-85 | 86-95 | 96-105 | 106-115 | ... | 306-308 ]
[ showing 10 entries per page: fewer | more | all ]
[76]  arXiv:2012.05434 [pdf, other]
Title: Composite Adversarial Attacks
Comments: To appear in AAAI 2021, code will be released later
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[77]  arXiv:2012.05471 [pdf, other]
Title: Securing the EDK II Image Loader
Comments: 10 pages, 2 tables
Journal-ref: 2020 Ivannikov Ispras Open Conference (ISPRAS), 2020, pp. 16-25
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[78]  arXiv:2012.05516 [pdf, other]
Title: Explainable Link Prediction for Privacy-Preserving Contact Tracing
Comments: 8 pages, 7 figures, SpicyFL 2020 Workshop at NeurIPS 2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[79]  arXiv:2012.05749 [pdf, other]
Title: Data Privacy in Trigger-Action Systems
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2012.05867 [pdf, other]
Title: Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2012.05948 [pdf, other]
Title: GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking
Comments: 6 pages, 4 figures, 6 tables, conference
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2012.06128 [pdf, other]
Title: SoK: Diving into DAG-based Blockchain Systems
Comments: Full version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[83]  arXiv:2012.06150 [pdf, other]
Title: FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[84]  arXiv:2012.06300 [pdf, other]
Title: Towards Secure and Leak-Free Workflows Using Microservice Isolation
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2012.06330 [pdf, other]
Title: Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and Filtering
Comments: Accepted in the International Workshop on Safety and Security of Deep Learning 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[ total of 308 entries: 1-10 | ... | 46-55 | 56-65 | 66-75 | 76-85 | 86-95 | 96-105 | 106-115 | ... | 306-308 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)