We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Dec 2020, skipping first 75

[ total of 308 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]
[76]  arXiv:2012.05434 [pdf, other]
Title: Composite Adversarial Attacks
Comments: To appear in AAAI 2021, code will be released later
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[77]  arXiv:2012.05471 [pdf, other]
Title: Securing the EDK II Image Loader
Comments: 10 pages, 2 tables
Journal-ref: 2020 Ivannikov Ispras Open Conference (ISPRAS), 2020, pp. 16-25
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[78]  arXiv:2012.05516 [pdf, other]
Title: Explainable Link Prediction for Privacy-Preserving Contact Tracing
Comments: 8 pages, 7 figures, SpicyFL 2020 Workshop at NeurIPS 2020
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[79]  arXiv:2012.05749 [pdf, other]
Title: Data Privacy in Trigger-Action Systems
Subjects: Cryptography and Security (cs.CR)
[80]  arXiv:2012.05867 [pdf, other]
Title: Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:2012.05948 [pdf, other]
Title: GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking
Comments: 6 pages, 4 figures, 6 tables, conference
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2012.06128 [pdf, other]
Title: SoK: Diving into DAG-based Blockchain Systems
Comments: Full version
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[83]  arXiv:2012.06150 [pdf, other]
Title: FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[84]  arXiv:2012.06300 [pdf, other]
Title: Towards Secure and Leak-Free Workflows Using Microservice Isolation
Subjects: Cryptography and Security (cs.CR)
[85]  arXiv:2012.06330 [pdf, other]
Title: Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and Filtering
Comments: Accepted in the International Workshop on Safety and Security of Deep Learning 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86]  arXiv:2012.06332 [pdf]
Title: An Empirical Review of Adversarial Defenses
Authors: Ayush Goel
Comments: 19 pages, 8 Figures, Report Reviewed by Vivek Menon
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[87]  arXiv:2012.06337 [pdf, other]
Title: Privacy and Robustness in Federated Learning: Attacks and Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[88]  arXiv:2012.06340 [pdf, ps, other]
Title: Control Flow Obfuscation for FJ using Continuation Passing
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[89]  arXiv:2012.06354 [pdf, other]
Title: Privacy-preserving medical image analysis
Comments: Accepted at the workshop for Medical Imaging meets NeurIPS, 34th Conference on Neural Information Processing Systems (NeurIPS) December 11, 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[90]  arXiv:2012.06502 [pdf, other]
Title: Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions
Journal-ref: Published at ACSAC 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[91]  arXiv:2012.06554 [pdf, other]
Title: TEEMon: A continuous performance monitoring framework for TEEs
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[92]  arXiv:2012.06609 [pdf, other]
Title: RegulaTor: A Straightforward Website Fingerprinting Defense
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2012.06658 [pdf, other]
Title: Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
Comments: Published in the proceedings of DSN'21 (51st IEEE/IFIP Int. Conf. on Dependable Systems and Networks). Code and BibTeX entry available at this https URL
Journal-ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[94]  arXiv:2012.06666 [pdf, other]
Title: Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough
Comments: 19 pages, 15 Figures, IEEE Internet of Things Journal
Journal-ref: IEEE Internet of Things Journal, 2021
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2012.06761 [pdf, other]
Title: CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Subjects: Cryptography and Security (cs.CR)
[96]  arXiv:2012.06805 [pdf, other]
Title: Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97]  arXiv:2012.06810 [pdf]
Title: Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions
Comments: 40 pages, 19 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[98]  arXiv:2012.06884 [pdf, other]
Title: AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
Authors: Mordechai Guri
Subjects: Cryptography and Security (cs.CR)
[99]  arXiv:2012.07006 [pdf, other]
Title: DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[100]  arXiv:2012.07173 [pdf, ps, other]
Title: Cover attacks for elliptic curves with prime order
Authors: Song Tian
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Algebraic Geometry (math.AG)
[ total of 308 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | 151-175 | ... | 301-308 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2205, contact, help  (Access key information)