We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jan 2021

[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]
[1]  arXiv:2101.00008 [pdf, other]
Title: Explainability Matters: Backdoor Attacks on Medical Imaging
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[2]  arXiv:2101.00084 [pdf, other]
Title: Towards Threshold Key Exchange Protocols
Comments: 10 pages, 5 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[3]  arXiv:2101.00292 [pdf, other]
Title: Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2101.00310 [pdf, other]
Title: Privacy-preserving Travel Time Prediction with Uncertainty Using GPS Trace Data
Journal-ref: IEEE Transactions on Mobile Computing, 2021
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2101.00311 [pdf, other]
Title: Disclosure Risk from Homogeneity Attack in Differentially Private Frequency Distribution
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2101.00328 [pdf, other]
Title: PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2101.00330 [pdf, other]
Title: e-PoS: Making Proof-of-Stake Decentralized and Fair
Journal-ref: IEEE Transactions on Parallel and Distributed Systems, 2021
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[8]  arXiv:2101.00521 [pdf, other]
Title: Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Comments: 10 pages, 6 figures , 2 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[9]  arXiv:2101.00845 [pdf, other]
Title: Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures
Journal-ref: Symposium on Cryptocurrency Analysis (SOCCA) 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[10]  arXiv:2101.00848 [pdf, other]
Title: Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos
Comments: Accepted by IEEE International Conference on Computer Communications 2021
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2101.00851 [pdf, other]
Title: Blockchain Privacy Through Merge Avoidance and Mixing Services: a Hardness and an Impossibility Result
Journal-ref: Symposium on Cryptocurrency Analysis (SOCCA) 2020
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[12]  arXiv:2101.00897 [pdf]
Title: Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images
Comments: 7 pages
Journal-ref: International Journal of Advanced Trends in Computer Science and Engineering, 2020
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2101.00919 [pdf, other]
Title: Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
Authors: Enric Florit (UB), Benjamin Smith (GRACE)
Journal-ref: Arithmetic, Geometry, Cryptography, and Coding Theory 2021, May 2021, Luminy, France
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[14]  arXiv:2101.00961 [pdf, other]
Title: Learning Differentially Private Mechanisms
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL)
[15]  arXiv:2101.01015 [pdf, other]
Title: Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms
Comments: 12 pages, 8 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[16]  arXiv:2101.01077 [pdf, other]
Title: HyperDegrade: From GHz to MHz Effective CPU Frequencies
Comments: Accepted to USENIX Security Symposium 2022
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2101.01289 [pdf, other]
Title: A practical approach for updating an integrity-enforced operating system
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2101.01306 [pdf]
Title: SG-PBFT: a Secure and Highly Efficient Blockchain PBFT Consensus Algorithm for Internet of Vehicles
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2101.01341 [pdf, ps, other]
Title: Practical Blind Membership Inference Attack via Differential Comparisons
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[20]  arXiv:2101.01395 [pdf]
Title: Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning
Comments: 6 pages
Journal-ref: International Journal of Advanced Trends in Computer Science and Engineering, 2020
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2101.01399 [pdf]
Title: Proposed E-payment Process Model to Enhance Quality of Service through Maintaining the Trust of Availability
Comments: 5 pages
Journal-ref: International Journal of Emerging Trends in Engineering Research, 2020
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[22]  arXiv:2101.01421 [pdf, other]
Title: Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges
Comments: Published in Elsevier Computers & Security, see this https URL (first available online on December 27, 2020). The article has 32 pages (in the preprint template), 9 figures, and 4 tables
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2101.01450 [pdf, other]
Title: Community Preserved Social Graph Publishing with Node Differential Privacy
Comments: Accepted by the 2020 IEEE International Conference on Data Mining
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2101.01495 [pdf, other]
Title: LSSD: a Controlled Large JPEG Image Database for Deep-Learning-based Steganalysis "into the Wild"
Comments: ICPR'2021, International Conference on Pattern Recognition, MMForWILD'2021, Workshop on MultiMedia FORensics in the WILD, Lecture Notes in Computer Science, LNCS, Springer. January 10-15, 2021, Virtual Conference due to Covid (formerly Milan, Italy). Version of December 2020
Subjects: Cryptography and Security (cs.CR)
[25]  arXiv:2101.01536 [pdf, other]
Title: Context-Aware Security for 6G Wireless The Role of Physical Layer Security
Comments: arXiv admin note: text overlap with arXiv:2011.07323
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[26]  arXiv:2101.01856 [pdf]
Title: Designing Actively Secure, Highly Available Industrial Automation Applications
Comments: Conference, 7 pages, 9 figures
Journal-ref: Proceedings of the 17th International Conference on Industrial Informatics (INDIN2019). Helsinki-Espoo, Finland, IEEE Computer Society Press, pp.374-379
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[27]  arXiv:2101.01898 [pdf, other]
Title: Connecting The Dots To Combat Collective Fraud
Authors: Mingxi Wu, Xi Chen
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[28]  arXiv:2101.01917 [pdf, other]
Title: sGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
Comments: Published in IEEE S&P 2021
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[29]  arXiv:2101.01950 [pdf, other]
Title: HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Subjects: Cryptography and Security (cs.CR)
[30]  arXiv:2101.02069 [pdf, other]
Title: Model Extraction and Defenses on Generative Adversarial Networks
Authors: Hailong Hu, Jun Pang
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[31]  arXiv:2101.02102 [pdf, ps, other]
Title: A Qualitative Empirical Analysis of Human Post-Exploitation Behavior
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[32]  arXiv:2101.02147 [pdf, other]
Title: A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
Comments: Accepted in IEEE TrustCom 2020, 7 Pages, 4 Figures, 3 Tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[33]  arXiv:2101.02281 [pdf, other]
Title: FLAME: Taming Backdoors in Federated Learning
Comments: To appear in the 31st USENIX Security Symposium, August 2022, Boston, MA, USA
Subjects: Cryptography and Security (cs.CR)
[34]  arXiv:2101.02325 [pdf, other]
Title: Understanding the Error in Evaluating Adversarial Robustness
Subjects: Cryptography and Security (cs.CR)
[35]  arXiv:2101.02334 [pdf, other]
Title: Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2101.02341 [pdf, other]
Title: Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2101.02377 [pdf, other]
Title: Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[38]  arXiv:2101.02552 [pdf]
Title: Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)
Journal-ref: In: Huang DS., Premaratne P. (eds) Intelligent Computing Methodologies. ICIC 2020. Lecture Notes in Computer Science, vol 12465. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[39]  arXiv:2101.02556 [pdf, ps, other]
Title: Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geospatial Technologies
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2101.02559 [pdf, other]
Title: Robust Machine Learning Systems: Challenges, Current Trends, Perspectives, and the Road Ahead
Comments: Final version appears in this https URL
Journal-ref: IEEE Design and Test (Volume: 37, Issue: 2, April 2020): 30-57
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR); Machine Learning (cs.LG); Systems and Control (eess.SY)
[41]  arXiv:2101.02562 [pdf, other]
Title: DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[42]  arXiv:2101.02573 [pdf, other]
Title: RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43]  arXiv:2101.02577 [pdf, other]
Title: Robust and Attack Resilient Logic Locking with a High Application-Level Impact
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Formal Languages and Automata Theory (cs.FL)
[44]  arXiv:2101.02627 [pdf, other]
Title: Privacy-Preserving Data Publishing in Process Mining
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[45]  arXiv:2101.02631 [pdf, other]
Title: Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
Comments: Paper accepted at WorldCist'21 - 9th World Conference on Information Systems and Technologies, Portugal, 30-31 March to 1-2 April 2021, this http URL
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2101.02632 [pdf]
Title: Triple-entry Accounting, Blockchain and Next of Kin: Towards a Standardization of Ledger Terminology
Subjects: Cryptography and Security (cs.CR)
[47]  arXiv:2101.02644 [pdf, other]
Title: Data Poisoning Attacks to Deep Learning Based Recommender Systems
Comments: To appear in NDSS 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48]  arXiv:2101.02780 [pdf, other]
Title: SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Comments: This article has been accepted in IEEE Transactions on Emerging Topics in Computing. 17 pages, 12 figures, IEEE copyright
Journal-ref: IEEE Transactions on Emerging Topics in Computing, 2021
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[49]  arXiv:2101.02826 [pdf, other]
Title: Privacy-Preserving Cloud-Aided Broad Learning System
Subjects: Cryptography and Security (cs.CR)
[50]  arXiv:2101.02834 [pdf, other]
Title: Differential Privacy-Based Online Allocations towards Integrating Blockchain and Edge Computing
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[ total of 273 entries: 1-50 | 51-100 | 101-150 | 151-200 | ... | 251-273 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2206, contact, help  (Access key information)