We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021

[ total of 273 entries: 1-273 ]
[ showing 273 entries per page: fewer | more ]
[1]  arXiv:2101.00008 [pdf, other]
Title: Explainability Matters: Backdoor Attacks on Medical Imaging
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[2]  arXiv:2101.00084 [pdf, other]
Title: Towards Threshold Key Exchange Protocols
Comments: 10 pages, 5 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2101.00292 [pdf, other]
Title: Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2101.00310 [pdf, other]
Title: Privacy-preserving Travel Time Prediction with Uncertainty Using GPS Trace Data
Journal-ref: IEEE Transactions on Mobile Computing, 2021
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2101.00311 [pdf, other]
Title: Disclosure Risk from Homogeneity Attack in Differentially Private Frequency Distribution
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2101.00328 [pdf, other]
Title: PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2101.00330 [pdf, other]
Title: e-PoS: Making Proof-of-Stake Decentralized and Fair
Journal-ref: IEEE Transactions on Parallel and Distributed Systems, 2021
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[8]  arXiv:2101.00521 [pdf, other]
Title: Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Comments: 10 pages, 6 figures , 2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[9]  arXiv:2101.00845 [pdf, other]
Title: Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures
Journal-ref: Symposium on Cryptocurrency Analysis (SOCCA) 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[10]  arXiv:2101.00848 [pdf, other]
Title: Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos
Comments: Accepted by IEEE International Conference on Computer Communications 2021
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2101.00851 [pdf, other]
Title: Blockchain Privacy Through Merge Avoidance and Mixing Services: a Hardness and an Impossibility Result
Journal-ref: Symposium on Cryptocurrency Analysis (SOCCA) 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[12]  arXiv:2101.00897 [pdf]
Title: Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images
Comments: 7 pages
Journal-ref: International Journal of Advanced Trends in Computer Science and Engineering, 2020
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2101.00919 [pdf, other]
Title: Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Authors: Enric Florit (UB), Benjamin Smith (GRACE)
Journal-ref: Arithmetic, Geometry, Cryptography, and Coding Theory 2021, May 2021, Luminy, France
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[14]  arXiv:2101.00961 [pdf, other]
Title: Learning Differentially Private Mechanisms
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL)
[15]  arXiv:2101.01015 [pdf, other]
Title: Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms
Comments: 12 pages, 8 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[16]  arXiv:2101.01077 [pdf, other]
Title: HyperDegrade: From GHz to MHz Effective CPU Frequencies
Comments: Accepted to USENIX Security Symposium 2022
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2101.01289 [pdf, other]
Title: A practical approach for updating an integrity-enforced operating system
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2101.01306 [pdf]
Title: SG-PBFT: a Secure and Highly Efficient Blockchain PBFT Consensus Algorithm for Internet of Vehicles
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2101.01341 [pdf, ps, other]
Title: Practical Blind Membership Inference Attack via Differential Comparisons
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2101.01395 [pdf]
Title: Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning
Comments: 6 pages
Journal-ref: International Journal of Advanced Trends in Computer Science and Engineering, 2020
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2101.01399 [pdf]
Title: Proposed E-payment Process Model to Enhance Quality of Service through Maintaining the Trust of Availability
Comments: 5 pages
Journal-ref: International Journal of Emerging Trends in Engineering Research, 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[22]  arXiv:2101.01421 [pdf, other]
Title: Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges
Comments: Published in Elsevier Computers & Security, see this https URL (first available online on December 27, 2020). The article has 32 pages (in the preprint template), 9 figures, and 4 tables
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2101.01450 [pdf, other]
Title: Community Preserved Social Graph Publishing with Node Differential Privacy
Comments: Accepted by the 2020 IEEE International Conference on Data Mining
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2101.01495 [pdf, other]
Title: LSSD: a Controlled Large JPEG Image Database for Deep-Learning-based Steganalysis "into the Wild"
Comments: ICPR'2021, International Conference on Pattern Recognition, MMForWILD'2021, Workshop on MultiMedia FORensics in the WILD, Lecture Notes in Computer Science, LNCS, Springer. January 10-15, 2021, Virtual Conference due to Covid (formerly Milan, Italy). Version of December 2020
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2101.01536 [pdf, other]
Title: Context-Aware Security for 6G Wireless The Role of Physical Layer Security
Comments: arXiv admin note: text overlap with arXiv:2011.07323
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[26]  arXiv:2101.01856 [pdf]
Title: Designing Actively Secure, Highly Available Industrial Automation Applications
Comments: Conference, 7 pages, 9 figures
Journal-ref: Proceedings of the 17th International Conference on Industrial Informatics (INDIN2019). Helsinki-Espoo, Finland, IEEE Computer Society Press, pp.374-379
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[27]  arXiv:2101.01898 [pdf, other]
Title: Connecting The Dots To Combat Collective Fraud
Authors: Mingxi Wu, Xi Chen
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[28]  arXiv:2101.01917 [pdf, other]
Title: sGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
Comments: Published in IEEE S&P 2021
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[29]  arXiv:2101.01950 [pdf, other]
Title: HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2101.02069 [pdf, other]
Title: Model Extraction and Defenses on Generative Adversarial Networks
Authors: Hailong Hu, Jun Pang
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[31]  arXiv:2101.02102 [pdf, ps, other]
Title: A Qualitative Empirical Analysis of Human Post-Exploitation Behavior
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[32]  arXiv:2101.02147 [pdf, other]
Title: A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
Comments: Accepted in IEEE TrustCom 2020, 7 Pages, 4 Figures, 3 Tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[33]  arXiv:2101.02281 [pdf, other]
Title: FLAME: Taming Backdoors in Federated Learning
Comments: To appear in the 31st USENIX Security Symposium, August 2022, Boston, MA, USA
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2101.02325 [pdf, other]
Title: Understanding the Error in Evaluating Adversarial Robustness
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2101.02334 [pdf, other]
Title: Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2101.02341 [pdf, other]
Title: Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2101.02377 [pdf, other]
Title: Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[38]  arXiv:2101.02552 [pdf]
Title: Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)
Journal-ref: In: Huang DS., Premaratne P. (eds) Intelligent Computing Methodologies. ICIC 2020. Lecture Notes in Computer Science, vol 12465. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2101.02556 [pdf, ps, other]
Title: Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geospatial Technologies
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2101.02559 [pdf, other]
Title: Robust Machine Learning Systems: Challenges, Current Trends, Perspectives, and the Road Ahead
Comments: Final version appears in this https URL
Journal-ref: IEEE Design and Test (Volume: 37, Issue: 2, April 2020): 30-57
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[41]  arXiv:2101.02562 [pdf, other]
Title: DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[42]  arXiv:2101.02573 [pdf, other]
Title: RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43]  arXiv:2101.02577 [pdf, other]
Title: Robust and Attack Resilient Logic Locking with a High Application-Level Impact
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Formal Languages and Automata Theory (cs.FL)
[44]  arXiv:2101.02627 [pdf, other]
Title: Privacy-Preserving Data Publishing in Process Mining
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[45]  arXiv:2101.02631 [pdf, other]
Title: Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
Comments: Paper accepted at WorldCist'21 - 9th World Conference on Information Systems and Technologies, Portugal, 30-31 March to 1-2 April 2021, this http URL
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2101.02632 [pdf]
Title: Triple-entry Accounting, Blockchain and Next of Kin: Towards a Standardization of Ledger Terminology
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2101.02644 [pdf, other]
Title: Data Poisoning Attacks to Deep Learning Based Recommender Systems
Comments: To appear in NDSS 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48]  arXiv:2101.02780 [pdf, other]
Title: SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Comments: This article has been accepted in IEEE Transactions on Emerging Topics in Computing. 17 pages, 12 figures, IEEE copyright
Journal-ref: IEEE Transactions on Emerging Topics in Computing, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[49]  arXiv:2101.02826 [pdf, other]
Title: Privacy-Preserving Cloud-Aided Broad Learning System
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2101.02834 [pdf, other]
Title: Differential Privacy-Based Online Allocations towards Integrating Blockchain and Edge Computing
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[51]  arXiv:2101.02957 [pdf, ps, other]
Title: Observations on the Bias of Nonnegative Mechanisms for Differential Privacy
Journal-ref: AIMS Foundations of Data Science, December 2020
Subjects: Cryptography and Security (cs.CR); Statistics Theory (math.ST)
[52]  arXiv:2101.02975 [pdf, other]
Title: Physical Layer Security based Key Management for LoRaWAN
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[53]  arXiv:2101.03022 [pdf]
Title: Security Threats and Research Challenges of IoT-A Review
Comments: 13 pages. 1 table
Journal-ref: Journal of Engineering Advancements Vol. 01(04) 2020, pp 170-182
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[54]  arXiv:2101.03103 [pdf, other]
Title: Blockchain for steganography: advantages, new algorithms and open challenges
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2101.03118 [pdf, other]
Title: Simulating SQL Injection Vulnerability Exploitation Using Q-Learning Reinforcement Learning Agents
Comments: 20 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[56]  arXiv:2101.03209 [pdf, other]
Title: Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities
Comments: in IEEE Transactions on Emerging Topics in Computing (Early Access), 2020
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2101.03212 [pdf, other]
Title: Unveiling the I2P web structure: a connectivity analysis
Journal-ref: Computer Networks, vol. 194, 2021
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[58]  arXiv:2101.03241 [pdf, ps, other]
Title: Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing
Comments: 29 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[59]  arXiv:2101.03403 [pdf, other]
Title: CryptoEmu: An Instruction Set Emulator for Computation Over Ciphers
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2101.03564 [pdf, other]
Title: Cybersecurity of Industrial Cyber-Physical Systems: A Review
Comments: 32 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2101.03736 [pdf, other]
Title: Reachability Analysis for Attributes in ABAC with Group Hierarchy
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2101.03844 [pdf, other]
Title: Understanding the Quality of Container Security Vulnerability Detection Tools
Subjects: Cryptography and Security (cs.CR)
[63]  arXiv:2101.03965 [pdf, other]
Title: FamDroid: Learning-Based Android Malware Family Classification Using Static Analysis
Comments: This manuscript has been submitted to Neurocomputing and is currently under its consideration for publication
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2101.04163 [pdf, ps, other]
Title: On the Practicality of Differential Privacy in Federated Learning by Tuning Iteration Times
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[65]  arXiv:2101.04173 [pdf]
Title: Online rating system development using blockchain-based distributed ledger technology
Comments: 25 figures, 5 tables, Journal Wireless Netw (2021)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[66]  arXiv:2101.04194 [pdf, other]
Title: Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[67]  arXiv:2101.04244 [pdf, other]
Title: Multi-Perspective Trust Management Framework for Crowdsourced IoT Services
Comments: 14 pages, accepted and to appear in IEEE Ttransactions on Services Computing
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2101.04319 [pdf, other]
Title: DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Comments: The 36th ACM SIGAPP Symposium on Applied Computing (ACM SAC)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69]  arXiv:2101.04338 [pdf, other]
Title: A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes
Comments: 17 pages, 8 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[70]  arXiv:2101.04556 [pdf, other]
Title: Masking Host Identity on Internet: Encrypted TLS/SSL Handshake
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[71]  arXiv:2101.04575 [pdf, ps, other]
Title: Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation
Comments: 10 pages, 5 figures, 1 table
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Performance (cs.PF)
[72]  arXiv:2101.04766 [pdf, other]
Title: Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[73]  arXiv:2101.04829 [pdf, other]
Title: On the Effectiveness of Small Input Noise for Defending Against Query-based Black-Box Attacks
Comments: Accepted at WACV 2022
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[74]  arXiv:2101.04888 [pdf, other]
Title: Crooked Indifferentiability Revisited
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2101.05067 [pdf]
Title: UNSW-NB15 Computer Security Dataset: Analysis through Visualization
Comments: 17 singled spaced pages, 2 tables and 12 figures
Subjects: Cryptography and Security (cs.CR)
[76]  arXiv:2101.05093 [pdf]
Title: Protecting Privacy and Transforming COVID-19 Case Surveillance Datasets for Public Use
Comments: 19 pages, 4 figures, 1 table, 5 supplements
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[77]  arXiv:2101.05102 [pdf, other]
Title: ProFuzzBench: A Benchmark for Stateful Protocol Fuzzing
Comments: The source code of ProFuzzBench is available online on GitHub at: this https URL
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Software Engineering (cs.SE)
[78]  arXiv:2101.05105 [src]
Title: F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network
Comments: There was a major error in the paper I submitted, which led to a large error in the conclusion
Subjects: Cryptography and Security (cs.CR)
[79]  arXiv:2101.05405 [pdf, other]
Title: Training Data Leakage Analysis in Language Models
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[80]  arXiv:2101.05495 [pdf, other]
Title: Selective Deletion in a Blockchain
Journal-ref: International Workshop on Blockchain and Mobile Applications (BlockApp 2020) during the International Conference on Distributed Computing Systems (ICDCS 2020)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Systems and Control (eess.SY)
[81]  arXiv:2101.05511 [pdf, other]
Title: Quantifying Blockchain Extractable Value: How dark is the forest?
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2101.05538 [pdf, other]
Title: Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems
Journal-ref: Model-driven Simulation and Training Environments for Cybersecurity (MSTEC 2020)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Systems and Control (eess.SY)
[83]  arXiv:2101.05589 [pdf, other]
Title: DeFi-ning DeFi: Challenges & Pathway
Authors: Hendrik Amler (1), Lisa Eckey (1), Sebastian Faust (1), Marcel Kaiser (2), Philipp Sandner (2), Benjamin Schlosser (1) ((1) Technical University of Darmstadt, (2) Frankfurt School of Finance and Management)
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2101.05614 [pdf]
Title: Review on the Security Threats of Internet of Things
Comments: 9 Pages, 9 figures
Journal-ref: International Journal of Computer Applications (IJCA), 2020
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[85]  arXiv:2101.05646 [pdf]
Title: Malicious Code Detection: Run Trace Output Analysis by LSTM
Comments: 11 pages, 5 figures, 5 tables, accepted to IEEE Access
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[86]  arXiv:2101.05735 [pdf, other]
Title: The Good, the Bad and the Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[87]  arXiv:2101.05781 [pdf, other]
Title: Time-Based CAN Intrusion Detection Benchmark
Authors: Deborah H. Blevins (1), Pablo Moriano (2), Robert A. Bridges (2), Miki E. Verma (2), Michael D. Iannacone (2), Samuel C Hollifield (2) ((1) University of Kentucky, (2) Oak Ridge National Laboratory)
Comments: 7 pages, 2 figures
Journal-ref: Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[88]  arXiv:2101.06000 [pdf, other]
Title: Horizon: A Gas-Efficient, Trustless Bridge for Cross-Chain Transactions
Comments: 14 Pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[89]  arXiv:2101.06039 [pdf, other]
Title: Secure Optimization Through Opaque Observations
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[90]  arXiv:2101.06043 [pdf, other]
Title: Bulwark: Holistic and Verified Security Monitoring of Web Protocols
Comments: Full version of the paper presented at ESORICS2020 (14-18 September 2020)
Journal-ref: ESORICS 2020: Computer Security (2020) 23-41
Subjects: Cryptography and Security (cs.CR)
[91]  arXiv:2101.06124 [pdf, other]
Title: Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets
Comments: 31 pages, 3 figures, 10 tables; Modified table headings to make them readable
Subjects: Cryptography and Security (cs.CR)
[92]  arXiv:2101.06137 [pdf, ps, other]
Title: Quantitative System-Level Security Verification of the IoV Infrastructure
Subjects: Cryptography and Security (cs.CR)
[93]  arXiv:2101.06148 [pdf, other]
Title: SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine
Subjects: Cryptography and Security (cs.CR)
[94]  arXiv:2101.06204 [pdf, other]
Title: The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[95]  arXiv:2101.06232 [pdf]
Title: Towards interpreting ML-based automated malware detection models: a survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[96]  arXiv:2101.06291 [pdf, other]
Title: Lissy: Experimenting with on-chain order books
Subjects: Cryptography and Security (cs.CR)
[97]  arXiv:2101.06300 [pdf, other]
Title: CARE: Lightweight Attack Resilient Secure Boot Architecturewith Onboard Recovery for RISC-V based SOC
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2101.06308 [pdf, other]
Title: Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2101.06362 [pdf, other]
Title: SEDAT:Security Enhanced Device Attestation with TPM2.0
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[100]  arXiv:2101.06419 [pdf, other]
Title: Revisiting Driver Anonymity in ORide
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2101.06454 [pdf, other]
Title: AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets
Comments: This is a technical report from The Chinese Chinese University of Hong Kong
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[102]  arXiv:2101.06519 [pdf]
Title: Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study
Comments: 7 pages, 4 figures, 2 tables
Journal-ref: International Symposium on Security in Computing and Communication. SSCC 2019: Security in Computing and Communications
Subjects: Cryptography and Security (cs.CR)
[103]  arXiv:2101.06676 [pdf]
Title: A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
Comments: 5 pages, 13 figures, 5 tables, technical report of IEEE Consumer Electronics Magazine paper (Light-Edge)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[104]  arXiv:2101.06761 [pdf, other]
Title: A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Comments: Accepted paper at ICDE 2021 demonstrations track. arXiv admin note: substantial text overlap with arXiv:2010.13637
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Databases (cs.DB)
[105]  arXiv:2101.06896 [pdf, other]
Title: DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
Comments: ICSE 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[106]  arXiv:2101.07078 [pdf, other]
Title: SoK: Fully Homomorphic Encryption Compilers
Comments: 13 pages, to appear in IEEE Symposium on Security and Privacy 2021
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2101.07113 [pdf, ps, other]
Title: Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2101.07223 [pdf, other]
Title: Leveraging AI to optimize website structure discovery during Penetration Testing
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[109]  arXiv:2101.07328 [pdf, other]
Title: MIMOSA: Reducing Malware Analysis Overhead with Coverings
Subjects: Cryptography and Security (cs.CR)
[110]  arXiv:2101.07365 [pdf, other]
Title: Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[111]  arXiv:2101.07377 [pdf]
Title: Panel: Humans and Technology for Inclusive Privacy and Security
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[112]  arXiv:2101.07769 [pdf, other]
Title: A System for Automated Open-Source Threat Intelligence Gathering and Management
Comments: Accepted paper at SIGMOD 2021 demonstrations track
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Databases (cs.DB)
[113]  arXiv:2101.07841 [pdf, other]
Title: Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2101.07897 [pdf, other]
Title: Safer Illinois and RokWall: Privacy Preserving University Health Apps for COVID-19
Comments: Appears in the Workshop on Secure IT Technologies against COVID-19(CoronaDef) 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[115]  arXiv:2101.07912 [pdf, other]
Title: Epidemic? The Attack Surface of German Hospitals during the COVID-19 Pandemic
Comments: Preprint for NATO CCDCOE Annual International Conference on Cyber Conflict (CyCon) [Paper submitted to Peer Review Process]
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[116]  arXiv:2101.08030 [pdf, ps, other]
Title: Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data
Comments: Will be published on Proceedings of the Workshop on Artificial Intelligence Safety (SafeAI 2021) co-located with 35th AAAI Conference on Artificial Intelligence (AAAI 2021)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[117]  arXiv:2101.08132 [pdf, ps, other]
Title: The (in)security of some recently proposed lightweight key distribution schemes
Authors: Chris J Mitchell
Comments: This version adds a brief critique of a related paper on secure multiparty computation
Subjects: Cryptography and Security (cs.CR)
[118]  arXiv:2101.08177 [pdf, other]
Title: On Provable Backdoor Defense in Collaborative Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[119]  arXiv:2101.08204 [pdf, other]
Title: secureTF: A Secure TensorFlow Framework
Comments: arXiv admin note: text overlap with arXiv:1902.04413
Journal-ref: Pages 44-59, 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[120]  arXiv:2101.08254 [pdf, other]
Title: RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[121]  arXiv:2101.08423 [pdf, other]
Title: Understand Volatility of Algorithmic Stablecoin: Modeling, Verification and Empirical Analysis
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[122]  arXiv:2101.08428 [pdf]
Title: Introducing the Unitychain Structure: A novel blockchain-like structure that enables greater parallel processing, security, and performance for networks that leverage distributed key generation and classical consensus protocols
Authors: Joshua D. Tobkin
Comments: 16 pages, 7 Figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[123]  arXiv:2101.08429 [pdf, other]
Title: Malware Detection and Analysis: Challenges and Research Opportunities
Authors: Zahid Akhtar
Subjects: Cryptography and Security (cs.CR)
[124]  arXiv:2101.08677 [pdf, other]
Title: Quantitative Security Risk Modeling and Analysis with RisQFLan
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[125]  arXiv:2101.08717 [pdf, other]
Title: Copycat CNN: Are Random Non-Labeled Data Enough to Steal Knowledge from Black-box Models?
Comments: The code is available at this https URL
Journal-ref: Pattern Recognition 113 (2021) 107830
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[126]  arXiv:2101.08754 [pdf]
Title: An Efficient Communication Protocol for FPGA IP Protection
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[127]  arXiv:2101.08778 [pdf, other]
Title: SoK: Decentralized Finance (DeFi)
Subjects: Cryptography and Security (cs.CR); General Economics (econ.GN)
[128]  arXiv:2101.08879 [pdf, other]
Title: Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies
Comments: To appear in Proceedings of Privacy Enhancing Technologies Symposium (PETS) 2022
Subjects: Cryptography and Security (cs.CR)
[129]  arXiv:2101.08969 [pdf]
Title: A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion
Authors: Yuzhou Lin
Comments: Some errors made in paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[130]  arXiv:2101.08997 [pdf, other]
Title: A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement
Journal-ref: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Dec 2020, Guangzhou, China
Subjects: Cryptography and Security (cs.CR)
[131]  arXiv:2101.08998 [pdf, ps, other]
Title: Decision process for blockchain architectures based on requirements
Authors: Nicolas Six (CRI)
Journal-ref: CAiSE (Doctoral Consortium), 2020, Jun 2020, Grenoble, France. pp.53
Subjects: Cryptography and Security (cs.CR)
[132]  arXiv:2101.09085 [pdf, ps, other]
Title: Privacy Friendly E-Ticketing For Public Transport
Comments: 31 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[133]  arXiv:2101.09139 [pdf, ps, other]
Title: The Privacy-Utility Tradeoff of Robust Local Differential Privacy
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[134]  arXiv:2101.09162 [pdf, other]
Title: A Robust Blockchain Readiness Index Model
Comments: The final authenticated version is available online at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135]  arXiv:2101.09317 [pdf]
Title: Short Secret Sharing Using Repeatable Random Sequence Generators
Subjects: Cryptography and Security (cs.CR)
[136]  arXiv:2101.09365 [pdf, other]
Title: MAVERICK: Proactively detecting network control plane bugs using structural outlierness
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[137]  arXiv:2101.09381 [pdf, ps, other]
Title: An Enhanced Passkey Entry Protocol for Secure Simple Pairing in Bluetooth
Comments: 13 pages, 5 figures, original paper
Subjects: Cryptography and Security (cs.CR)
[138]  arXiv:2101.09416 [pdf, other]
Title: Privacy Assured Recovery of Compressively Sensed ECG signals
Subjects: Cryptography and Security (cs.CR)
[139]  arXiv:2101.09477 [pdf, ps, other]
Title: Trusted Data Notifications from Private Blockchains
Comments: 9 pages
Journal-ref: IEEE International Conference on Blockchain, Blockchain 2020, Rhodes Island, Greece, November 2-6, 2020, pages {53--61}
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[140]  arXiv:2101.09494 [pdf, ps, other]
Title: A DSA-like digital signature protocol
Journal-ref: JDMSC, 2020
Subjects: Cryptography and Security (cs.CR)
[141]  arXiv:2101.09725 [pdf]
Title: Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey
Journal-ref: in IEEE Access, vol. 9, pp. 37431-37455, 2021
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2101.09834 [pdf, other]
Title: Privacy Preserving Techniques Applied to CPNI Data: Analysis and Recommendations
Subjects: Cryptography and Security (cs.CR)
[143]  arXiv:2101.10008 [pdf, ps, other]
Title: SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks
Subjects: Cryptography and Security (cs.CR)
[144]  arXiv:2101.10048 [pdf]
Title: A Process to Facilitate Automated Automotive Cybersecurity Testing
Comments: 7 pages, 2 figures paper presented at IEEE VTC2021-Spring. Full published version at this https URL
Journal-ref: IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, pp. 1-7
Subjects: Cryptography and Security (cs.CR)
[145]  arXiv:2101.10063 [pdf, other]
Title: Few-Shot Website Fingerprinting Attack
Comments: 10 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[146]  arXiv:2101.10121 [pdf, ps, other]
Title: Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
Comments: 37 pages, 184 citations
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[147]  arXiv:2101.10181 [pdf, other]
Title: Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey
Comments: This paper is currently under revision
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[148]  arXiv:2101.10198 [pdf, other]
Title: Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[149]  arXiv:2101.10374 [pdf, ps, other]
Title: DAHash: Distribution Aware Tuning of Password Hashing Costs
Comments: 25 pages, 15 figures, Financial Crypto 2021
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[150]  arXiv:2101.10386 [pdf, other]
Title: ProbLock: Probability-based Logic Locking
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2101.10412 [pdf]
Title: End-Users' Knowledge and Perception about Security of Mobile Health Apps: A Case Study with Two Saudi Arabian mHealth Providers
Comments: This research is 29 pages. It has 9 figures, and 7 tables
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[152]  arXiv:2101.10464 [pdf, other]
Title: Personal Data Access Control Through Distributed Authorization
Journal-ref: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Performance (cs.PF)
[153]  arXiv:2101.10474 [pdf, other]
Title: Towards an Open Format for Scalable System Telemetry
Comments: To be published in 2020 IEEE International Conference on Big Data (Big Data)
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2101.10522 [pdf, other]
Title: PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection
Comments: A new version of a previous submission with arXiv identifier arXiv:1910.07987. This version cannot be merged to the previous submission due to a title change
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2101.10569 [pdf, other]
Title: Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges
Comments: 22 pages, 8 figures, accepted by IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2101.10578 [pdf, other]
Title: Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Comments: Submitted version - Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS) 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[157]  arXiv:2101.10621 [pdf, other]
Title: xLumi: Payment Channel Protocol and Off-chain Payment in Blockchain Contract Systems
Subjects: Cryptography and Security (cs.CR)
[158]  arXiv:2101.10631 [pdf, other]
Title: Biometric Verification Secure Against Malicious Adversaries
Authors: Amina Bassit (1), Florian Hahn (1), Joep Peeters (1), Tom Kevenaar (2), Raymond N.J. Veldhuis (1), Andreas Peter (1) ((1) University of Twente, (2) GenKey Netherlands B.V.)
Comments: This is a complete reworking and major expansion of our paper arXiv:1705.09936 * Reworking of original semi-honest protocol and its security proof * Major expansions: tailored zero-knowledge proofs; efficient variant of original protocol that we prove secure against malicious adversaries; extensive experimental evaluation using three different datasets; in-depth comparison with related work
Subjects: Cryptography and Security (cs.CR)
[159]  arXiv:2101.10681 [pdf, other]
Title: What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics
Comments: 23 pages, 4 figures, 5 tables
Journal-ref: 25th International Conference on Financial Cryptography and Data Security (FC '21). March 01-05, 2021. Springer
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[160]  arXiv:2101.10699 [pdf, other]
Title: Measuring Decentralization in Bitcoin and Ethereum using Multiple Metrics and Granularities
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[161]  arXiv:2101.10729 [pdf]
Title: Ethereum ECCPoW
Comments: It is under the review of IEEE Access
Subjects: Cryptography and Security (cs.CR)
[162]  arXiv:2101.10852 [pdf, ps, other]
Title: How Much Communication Resource is Needed to Run a Wireless Blockchain Network?
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[163]  arXiv:2101.10856 [pdf, other]
Title: BE-RAN: Blockchain-enabled Open RAN with Decentralized Identity Management and Privacy-Preserving Communication
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[164]  arXiv:2101.10865 [pdf, other]
Title: On managing vulnerabilities in AI/ML systems
Comments: 16 pages. New Security Paradigms Workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[165]  arXiv:2101.10868 [pdf, other]
Title: An In-depth Review of Privacy Concerns Raised by the COVID-19 Pandemic
Authors: Jiaqi Wang
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[166]  arXiv:2101.10893 [pdf, other]
Title: Dynamic cyber risk estimation with Competitive Quantile Autoregression
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[167]  arXiv:2101.10904 [pdf, other]
Title: Untargeted Poisoning Attack Detection in Federated Learning via Behavior Attestation
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[168]  arXiv:2101.10920 [pdf, other]
Title: A Blockchain-based Trust System for Decentralised Applications: When trustless needs trust
Comments: 14 pages, 8 figures, submitted to Elsevier Future Generation Computer Systems jornal
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[169]  arXiv:2101.10921 [pdf]
Title: Blockchain Technology: Introduction, Integration and Security Issues with IoT
Comments: 21 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2101.11060 [pdf, other]
Title: Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers
Journal-ref: This paper is published on European Conference on Computer Vision 2020, page 202-219, Springer
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[171]  arXiv:2101.11194 [pdf, ps, other]
Title: Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[172]  arXiv:2101.11404 [pdf, other]
Title: An Open-source Library of Large Integer Polynomial Multipliers
Comments: This paper has been accepted for conference proceeding in DDECS 2021 - April 7-9 2021 Vienna, Austria
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[173]  arXiv:2101.11502 [pdf, other]
Title: Randori: Local Differential Privacy for All
Authors: Boel Nelson
Comments: 25 pages
Subjects: Cryptography and Security (cs.CR)
[174]  arXiv:2101.11611 [pdf]
Title: Analyzing the Overhead of Filesystem Protection Using Linux Security Modules
Subjects: Cryptography and Security (cs.CR)
[175]  arXiv:2101.11720 [pdf, other]
Title: MiniV2G: An Electric Vehicle Charging Emulator
Subjects: Cryptography and Security (cs.CR)
[176]  arXiv:2101.11728 [pdf, other]
Title: SimBle: Generating privacy preserving real-world BLE traces with ground truth
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[177]  arXiv:2101.11866 [pdf, other]
Title: An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems
Subjects: Cryptography and Security (cs.CR)
[178]  arXiv:2101.11871 [pdf, other]
Title: Website fingerprinting on early QUIC traffic
Comments: This work has been accepted by Elsevier Computer Networks for publication
Journal-ref: Computer Networks 200 (2021) 108538
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[179]  arXiv:2101.11915 [pdf, other]
Title: Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Comments: Submitted
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[180]  arXiv:2101.12016 [pdf, other]
Title: Baseline Pruning-Based Approach to Trojan Detection in Neural Networks
Comments: The funding for all authors was provided by IARPA: IARPA-20001-D2020-2007180011
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[181]  arXiv:2101.12031 [pdf, other]
Title: Robust Android Malware Detection System against Adversarial Attacks using Q-Learning
Comments: Inf Syst Front (2020)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[182]  arXiv:2101.12078 [pdf, other]
Title: S++: A Fast and Deployable Secure-Computation Framework for Privacy-Preserving Neural Network Training
Comments: Appeared at the Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21). (7 pages, technical paper.)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[183]  arXiv:2101.12143 [pdf, other]
Title: Security, Fault Tolerance, and Communication Complexity in Distributed Systems
Comments: PhD thesis, Harvard University, Cambridge, Massachusetts, USA, May 1990. Some chapters report joint work
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[184]  arXiv:2101.12270 [pdf, other]
Title: An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Journal-ref: Sensors. 2021; 21(2):446
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[185]  arXiv:2101.12279 [pdf, other]
Title: GF-Flush: A GF(2) Algebraic Attack on Secure Scan Chains
Comments: Submitted to IEEE Transactions on Computer-Aided Design of Integrated Circuits And Systems
Subjects: Cryptography and Security (cs.CR)
[186]  arXiv:2101.12332 [pdf, ps, other]
Title: Atomic Swaps between Bitcoin and Monero
Subjects: Cryptography and Security (cs.CR)
[187]  arXiv:2101.12412 [pdf, ps, other]
Title: Open problems in cross-chain protocols
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[188]  arXiv:2101.12434 [pdf, ps, other]
Title: Peeler: Profiling Kernel-Level Events to Detect Ransomware
Comments: 15 pages, 10 figures
Subjects: Cryptography and Security (cs.CR)
[189]  arXiv:2101.12602 [pdf, other]
Title: On the differential privacy of dynamic location obfuscation with personalized error bounds
Comments: 5 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[190]  arXiv:2101.12604 [pdf]
Title: Detection and Prevention of New Attacks for ID-based Authentication Protocols
Journal-ref: 9th ACM International Conference on Networks, Communication and Computing (ICNCC 2020)
Subjects: Cryptography and Security (cs.CR)
[191]  arXiv:2101.12620 [pdf, ps, other]
Title: EphemeriShield -- defence against cyber-antisatellite weapons
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[192]  arXiv:2101.12723 [pdf, ps, other]
Title: State of the Art: Content-based and Hybrid Phishing Detection
Comments: 6 pages, 1 table
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[193]  arXiv:2101.12736 [pdf, other]
Title: N-grams Bayesian Differential Privacy
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[194]  arXiv:2101.00157 (cross-list from cs.LG) [pdf, ps, other]
Title: Active Learning Under Malicious Mislabeling and Poisoning Attacks
Comments: 2021 IEEE Global Communications Conference (GLOBECOM)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[195]  arXiv:2101.00378 (cross-list from cs.NI) [pdf, other]
Title: Speeding up Block Propagation in Blockchain Network: Uncoded and Coded Designs
Comments: 10 pages, 8 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[196]  arXiv:2101.00522 (cross-list from cs.CV) [pdf, other]
Title: Privacy Preserving Domain Adaptation for Semantic Segmentation of Medical Images
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[197]  arXiv:2101.00606 (cross-list from cs.CV) [pdf, other]
Title: News Image Steganography: A Novel Architecture Facilitates the Fake News Identification
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[198]  arXiv:2101.00612 (cross-list from cs.SE) [pdf, other]
Title: Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[199]  arXiv:2101.00676 (cross-list from cs.CV) [pdf, other]
Title: Fake Visual Content Detection Using Two-Stream Convolutional Neural Networks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[200]  arXiv:2101.01032 (cross-list from cs.CV) [pdf, other]
Title: Local Black-box Adversarial Attacks: A Query Efficient Approach
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[201]  arXiv:2101.01269 (cross-list from cs.CY) [pdf]
Title: Post Quantum Cryptography: Readiness Challenges and the Approaching Storm
Comments: A Computing Community Consortium (CCC) white paper, 5 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[202]  arXiv:2101.01401 (cross-list from cs.HC) [pdf]
Title: Perceptions of Smartphone Users Acceptance and Adoption of Mobile Commerce (MC) The Case of Jordan
Comments: 11 pages
Journal-ref: Journal of Computer Science, 2020
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[203]  arXiv:2101.01872 (cross-list from cs.CV) [pdf, other]
Title: Multi-Stage Residual Hiding for Image-into-Audio Steganography
Comments: ICASSP 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[204]  arXiv:2101.02159 (cross-list from cs.DC) [pdf, ps, other]
Title: Highway: Efficient Consensus with Flexible Finality
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[205]  arXiv:2101.02392 (cross-list from cs.LG) [pdf, other]
Title: Detecting Log Anomalies with Multi-Head Attention (LAMA)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[206]  arXiv:2101.02899 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks
Comments: Accepted to RSEML Workshop at AAAI 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[207]  arXiv:2101.03042 (cross-list from cs.LG) [pdf, other]
Title: Towards a Robust and Trustworthy Machine Learning System Development: An Engineering Perspective
Comments: 20 pages (58 pages pre-print), 6 figures
Journal-ref: Journal of Information Security and Applications 65 (2022) 103121
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[208]  arXiv:2101.03141 (cross-list from cs.LG) [pdf, other]
Title: An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[209]  arXiv:2101.03300 (cross-list from cs.LG) [pdf, other]
Title: Robust Blockchained Federated Learning with Model Validation and Proof-of-Stake Inspired Consensus
Comments: 8 pages, 7 figures, AAAI 2021 Workshop - Towards Robust, Secure and Efficient Machine Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[210]  arXiv:2101.03715 (cross-list from cs.DC) [pdf, ps, other]
Title: Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[211]  arXiv:2101.03840 (cross-list from eess.SY) [pdf, other]
Title: Privacy-Preserving Transactive Energy Management for IoT-aided Smart Homes via Blockchain
Authors: Qing Yang, Hao Wang
Journal-ref: IEEE Internet of Things Journal, 2021
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Optimization and Control (math.OC)
[212]  arXiv:2101.04401 (cross-list from cs.LG) [pdf, other]
Title: Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps
Comments: Accepted to the 43rd International Conference on Software Engineering, Software Engineering in Practice Track. This is a preprint version, the copyright belongs to The Institute of Electrical and Electronics Engineers
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[213]  arXiv:2101.04535 (cross-list from cs.LG) [pdf, other]
Title: Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[214]  arXiv:2101.04645 (cross-list from cs.LG) [pdf, other]
Title: Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators
Comments: Accepted at IJCNN 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[215]  arXiv:2101.04718 (cross-list from cs.PL) [pdf, other]
Title: Declarative Demand-Driven Reverse Engineering
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[216]  arXiv:2101.04773 (cross-list from cs.SD) [pdf, other]
Title: Practical Speech Re-use Prevention in Voice-driven Services
Subjects: Sound (cs.SD); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[217]  arXiv:2101.04889 (cross-list from cs.LG) [pdf]
Title: Towards Interpretable Ensemble Learning for Image-based Malware Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[218]  arXiv:2101.04898 (cross-list from cs.LG) [pdf, other]
Title: Unlearnable Examples: Making Personal Data Unexploitable
Comments: ICLR2021, In International Conference on Learning Representations
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[219]  arXiv:2101.05037 (cross-list from cs.DB) [pdf, other]
Title: Immutable and Democratic Data in permissionless Peer-to-Peer Systems
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[220]  arXiv:2101.05140 (cross-list from cs.LO) [pdf, other]
Title: Secure Process Algebra
Authors: Yong Wang
Comments: 172 pages, 36 figures, 28 tables
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[221]  arXiv:2101.05259 (cross-list from cs.CY) [pdf, other]
Title: A Digital Currency Architecture for Privacy and Owner-Custodianship
Comments: 24 pages, 6 figures, 1 table. arXiv admin note: substantial text overlap with arXiv:2006.03023
Journal-ref: Future Internet 2021, 13(5), 130, 2021-05-14
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[222]  arXiv:2101.05371 (cross-list from cs.LG) [pdf]
Title: Anomaly Detection Support Using Process Classification
Comments: 14 pages, 6 figures
Journal-ref: Proceedings of the 5th International Conference on Software Security and Assurance (ICSSA 2019), 2019, 27-40
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[223]  arXiv:2101.05543 (cross-list from cs.DC) [pdf, other]
Title: On the Synchronization Power of Token Smart Contracts
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[224]  arXiv:2101.05641 (cross-list from cs.IR) [pdf, other]
Title: $C^3DRec$: Cloud-Client Cooperative Deep Learning for Temporal Recommendation in the Post-GDPR Era
Authors: Jialiang Han, Yun Ma
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[225]  arXiv:2101.06485 (cross-list from cs.DC) [pdf, other]
Title: T-Lease: A Trusted Lease Primitive for Distributed Systems
Authors: Bohdan Trach (1), Rasha Faqeh (1), Oleksii Oleksenko (1), Wojciech Ozga (1), Pramod Bhatotia (2), Christof Fetzer (1) ((1) TU Dresden, (2) TU Münich)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[226]  arXiv:2101.06560 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks On Multi-Agent Communication
Journal-ref: International Conference On Computer Vision 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[227]  arXiv:2101.06565 (cross-list from cs.IT) [pdf, ps, other]
Title: Joint Beamforming and Location Optimization for Secure Data Collection in Wireless Sensor Networks with UAV-Carried Intelligent Reflecting Surface
Comments: Submitted to IEEE Transactions on Communications
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[228]  arXiv:2101.06570 (cross-list from cs.LG) [pdf, other]
Title: Membership Inference Attack on Graph Neural Networks
Comments: Best student paper award, IEEE TPS 21
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[229]  arXiv:2101.06704 (cross-list from cs.AI) [pdf, other]
Title: Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions
Comments: Preprint
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[230]  arXiv:2101.06847 (cross-list from cs.LG) [pdf, ps, other]
Title: On the Differentially Private Nature of Perturbed Gradient Descent
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[231]  arXiv:2101.06855 (cross-list from cs.LG) [pdf, other]
Title: GraphAttacker: A General Multi-Task GraphAttack Framework
Comments: 17 pages,9 figeures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[232]  arXiv:2101.07292 (cross-list from cs.CY) [pdf]
Title: Data Protection Impact Assessment for the Corona App
Comments: 97 pages, German version here: this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[233]  arXiv:2101.07750 (cross-list from cs.IT) [pdf, other]
Title: Information Theoretic Secure Aggregation with User Dropouts
Authors: Yizhou Zhao, Hua Sun
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234]  arXiv:2101.07922 (cross-list from cs.CV) [pdf, other]
Title: LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition
Comments: Published as a conference paper at ICLR 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[235]  arXiv:2101.07931 (cross-list from cs.CY) [pdf, other]
Title: MIT SafePaths Card (MiSaCa): Augmenting Paper Based Vaccination Cards with Printed Codes
Comments: 8 pages, 4 Figures, 1 Table
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[236]  arXiv:2101.07981 (cross-list from cs.DS) [pdf, ps, other]
Title: Inference under Information Constraints III: Local Privacy Constraints
Comments: To appear in the Special Issue on Privacy and Security of Information Systems of the IEEE Journal on Selected Areas in Information Theory (JSAIT), 2021. Journal version of the AISTATS'19 paper "Test without Trust: Optimal Locally Private Distribution Testing" (arXiv:1808.02174), which it extends and supersedes
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Statistics Theory (math.ST)
[237]  arXiv:2101.08658 (cross-list from cs.LG) [pdf]
Title: Fidelity and Privacy of Synthetic Medical Data
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[238]  arXiv:2101.08675 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Machine Learning in Text Analysis and Generation
Authors: Izzat Alsmadi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[239]  arXiv:2101.09054 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Laws of Large Numbers and Optimal Regret in Online Classification
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Statistics Theory (math.ST); Machine Learning (stat.ML)
[240]  arXiv:2101.09324 (cross-list from cs.LG) [pdf, other]
Title: Generating Black-Box Adversarial Examples in Sparse Domain
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[241]  arXiv:2101.09378 (cross-list from cs.DL) [pdf, other]
Title: Ants-Review: a Protocol for Incentivized Open Peer-Reviews on Ethereum
Comments: 8 pages, 1 figure, to appear as "B. Trov\`o, N. Massari (forthcoming). Ants-Review: a Protocol for Incentivized Open Peer-Reviews on Ethereum. In: Bartosz Balis, Dora B. Heras et al. (eds) Euro-Par 2020: Parallel Processing Workshops. Euro-Par 2020. Lecture Notes in Computer Science, Springer, Cham."
Subjects: Digital Libraries (cs.DL); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT)
[242]  arXiv:2101.09387 (cross-list from cs.LG) [pdf, other]
Title: Online Adversarial Purification based on Self-Supervision
Comments: Accepted to ICLR 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[243]  arXiv:2101.09451 (cross-list from cs.CV) [pdf, other]
Title: Error Diffusion Halftoning Against Adversarial Examples
Comments: Accepted at IEEE International Conference on Image Processing (ICIP) 2021
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[244]  arXiv:2101.09653 (cross-list from cs.SI) [pdf, other]
Title: BU-Trace: A Permissionless Mobile System for Privacy-Preserving Intelligent Contact Tracing
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[245]  arXiv:2101.09841 (cross-list from cs.HC) [pdf, other]
Title: E-cheating Prevention Measures: Detection of Cheating at Online Examinations Using Deep Learning Approach -- A Case Study
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[246]  arXiv:2101.09930 (cross-list from cs.LG) [pdf]
Title: Generalizing Adversarial Examples by AdaBelief Optimizer
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[247]  arXiv:2101.10011 (cross-list from cs.CV) [pdf, other]
Title: They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors
Comments: 15 pages, 15 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[248]  arXiv:2101.10540 (cross-list from cs.CV) [pdf]
Title: Ear Recognition
Comments: Submission to Biometrics in University of Twente under the auspices of the EIT ICT Labs Master School in the academic year 2013-14
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[249]  arXiv:2101.10570 (cross-list from eess.SY) [pdf, other]
Title: Towards a Secure and Resilient All-Renewable Energy Grid for Smart Cities
Comments: Accepted to IEEE Consumer Electronics Magazine
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[250]  arXiv:2101.10572 (cross-list from cs.LG) [pdf, other]
Title: Transparent Contribution Evaluation for Secure Federated Learning on Blockchain
Journal-ref: 2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[251]  arXiv:2101.10792 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Vulnerability of Active Transfer Learning
Comments: Accepted for publication at IDA 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[252]  arXiv:2101.11073 (cross-list from cs.LG) [pdf, ps, other]
Title: Property Inference From Poisoning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[253]  arXiv:2101.11081 (cross-list from cs.CV) [pdf, ps, other]
Title: The Effect of Class Definitions on the Transferability of Adversarial Attacks Against Forensic CNNs
Journal-ref: Published at Electronic Imaging, Media Watermarking, Security, and Forensics 2020, pp. 119-1-119-7(7)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[254]  arXiv:2101.11144 (cross-list from cs.LG) [pdf, other]
Title: Accuracy and Privacy Evaluations of Collaborative Data Analysis
Comments: 16 pages; 2 figures; 1 table
Journal-ref: To be presented at The Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21) (2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[255]  arXiv:2101.11574 (cross-list from cs.AI) [pdf, other]
Title: Privacy Information Classification: A Hybrid Approach
Comments: IJCAI 2019 Workshop. The 4th International Workshop on Smart Simulation and Modelling for Complex Systems
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[256]  arXiv:2101.11693 (cross-list from cs.LG) [pdf, other]
Title: Dopamine: Differentially Private Federated Learning on Medical Data
Comments: The Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[257]  arXiv:2101.11702 (cross-list from cs.LG) [pdf, other]
Title: Better sampling in explanation methods can prevent dieselgate-like deception
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[258]  arXiv:2101.11835 (cross-list from cs.CV) [pdf, other]
Title: Reducing ReLU Count for Privacy-Preserving CNN Speedup
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[259]  arXiv:2101.12097 (cross-list from cs.LG) [pdf]
Title: Adversarial Machine Learning Attacks on Condition-Based Maintenance Capabilities
Comments: 9 pages, 7 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[260]  arXiv:2101.12124 (cross-list from cs.IT) [pdf, other]
Title: Private DNA Sequencing: Hiding Information in Discrete Noise
Comments: 10 pages, 5 figures, shorter version to appear in proceedings of ITW 2020
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[261]  arXiv:2101.12428 (cross-list from cs.GT) [pdf, other]
Title: FedChain: Secure Proof-of-Stake-based Framework for Federated-blockchain Systems
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[262]  arXiv:2101.12442 (cross-list from cs.GT) [pdf, other]
Title: Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[263]  arXiv:2101.00973 (cross-list from eess.IV) [pdf, other]
Title: Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[264]  arXiv:2101.02800 (cross-list from math.ST) [pdf, other]
Title: Differentially private depth functions and their associated medians
Comments: 25 pages, 2 figures
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Methodology (stat.ME)
[265]  arXiv:2101.02997 (cross-list from stat.ML) [pdf, other]
Title: Differentially Private Federated Learning for Cancer Prediction
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[266]  arXiv:2101.03577 (cross-list from quant-ph) [pdf, other]
Title: Quantum Secure Direct Communication with Mutual Authentication using a Single Basis
Journal-ref: International Journal of Theoretical Physics (2021)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[267]  arXiv:2101.04427 (cross-list from quant-ph) [pdf, other]
Title: Quantum Internet- Applications, Functionalities, Enabling Technologies, Challenges, and Research Directions
Comments: This survey paper is submitted in IEEE Communications Surveys and Tutorials and revised on 27th May 2021. It includes 31 pages, 14 figures, and 5 tables
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[268]  arXiv:2101.05560 (cross-list from quant-ph) [pdf, ps, other]
Title: Secure Multi-Party Quantum Conference and Xor Computation
Comments: Accepted in Quantum Information and Computation
Journal-ref: Quantum Information and Computation, Vol.21 No.3&4 March 2021
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[269]  arXiv:2101.08478 (cross-list from eess.AS) [pdf, other]
Title: A Study of F0 Modification for X-Vector Based Speech Pseudonymization Across Gender
Authors: Pierre Champion (MULTISPEECH), Denis Jouvet (MULTISPEECH), Anthony Larcher (LIUM)
Journal-ref: The Second AAAI Workshop on Privacy-Preserving Artificial Intelligence, Feb 2021, Nancy, France
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[270]  arXiv:2101.08919 (cross-list from eess.AS) [pdf, other]
Title: Understanding the Tradeoffs in Client-side Privacy for Downstream Speech Tasks
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[271]  arXiv:2101.09041 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Private Information Retrieval for Quantum Messages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[272]  arXiv:2101.09712 (cross-list from eess.SP) [pdf, ps, other]
Title: Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC
Comments: Accepted by IEEE TIFS
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[273]  arXiv:2101.10293 (cross-list from q-fin.RM) [pdf]
Title: The Role of Cost in the Integration of Security Features in Integrated Circuits for Smart Cards
Comments: Submission to Research Topics in University of Twente under the auspices of the EIT ICT Labs Master School in the academic year 2013-14
Subjects: Risk Management (q-fin.RM); Cryptography and Security (cs.CR); General Economics (econ.GN)
[ total of 273 entries: 1-273 ]
[ showing 273 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)