We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Mar 2021, skipping first 50

[ total of 399 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 376-399 ]
[ showing 25 entries per page: fewer | more | all ]
[51]  arXiv:2103.03046 [pdf, other]
Title: PointGuard: Provably Robust 3D Point Cloud Classification
Comments: Published in IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[52]  arXiv:2103.03078 [pdf, other]
Title: Defending Medical Image Diagnostics against Privacy Attacks using Generative Methods
Comments: Accepted for oral presentation at MICCAI PPML 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[53]  arXiv:2103.03080 [pdf, other]
Title: Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
Comments: Accepted in ACM SACMAT 2021
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2103.03085 [pdf, ps, other]
Title: Online-Extractability in the Quantum Random-Oracle Model
Comments: Improvement of the bound in the FO reduction, fixed a few minor technical issues, added Appendix A
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[55]  arXiv:2103.03209 [pdf, ps, other]
Title: Requirement Analyses and Evaluations of Blockchain Platforms per Possible Use Cases
Comments: 50 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[56]  arXiv:2103.03227 [pdf]
Title: Graph Computing for Financial Crime and Fraud Detection: Trends, Challenges and Outlook
Authors: E.Kurshan, H. Shen
Comments: arXiv admin note: substantial text overlap with arXiv:2103.01854
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[57]  arXiv:2103.03287 [pdf, other]
Title: Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Systems and Control (eess.SY)
[58]  arXiv:2103.03344 [pdf, other]
Title: WaveGuard: Understanding and Mitigating Audio Adversarial Examples
Comments: Published as a conference paper at Usenix Security 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[59]  arXiv:2103.03411 [pdf, other]
Title: Efficient Encrypted Inference on Ensembles of Decision Trees
Comments: 9 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[60]  arXiv:2103.03443 [pdf, other]
Title: Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
Comments: This is the extended version of a paper that appears in USENIX Security 2021
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[61]  arXiv:2103.03472 [pdf, other]
Title: A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[62]  arXiv:2103.03500 [pdf, other]
Title: ShEF: Shielded Enclaves for Cloud FPGAs
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[63]  arXiv:2103.03502 [pdf, other]
Title: Update the Root of Integrity Tree in Secure Non-Volatile Memory Systems with Low Overhead
Comments: 13 pages, 16 figures
Subjects: Cryptography and Security (cs.CR)
[64]  arXiv:2103.03511 [pdf, other]
Title: App's Auto-Login Function Security Testing via Android OS-Level Virtualization
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2103.03530 [pdf, other]
Title: Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2103.03558 [pdf, ps, other]
Title: An algebraic approach to the Rank Support Learning problem
Authors: Magali Bardet (CA - LITIS, COSMIQ), Pierre Briaud (COSMIQ, SU)
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2103.03569 [pdf, other]
Title: Combining Forensics and Privacy Requirements for Digital Images
Authors: Pauline Puteaux (UM, LIRMM), Vincent Itier (IMT Lille Douai, CRIStAL), Patrick Bas (CNRS, CRIStAL)
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[68]  arXiv:2103.03699 [pdf, other]
Title: Implementing Automated Market Makers with Constant Circle
Authors: Yongge Wang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[69]  arXiv:2103.03739 [pdf, other]
Title: Privacy-preserving Analytics for Data Markets using MPC
Subjects: Cryptography and Security (cs.CR)
[70]  arXiv:2103.03806 [pdf, other]
Title: MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection
Comments: 10 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[71]  arXiv:2103.03831 [pdf, other]
Title: Tor circuit fingerprinting defenses using adaptive padding
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR)
[72]  arXiv:2103.03851 [pdf, other]
Title: SoK: Cryptojacking Malware
Comments: EuroS&P 2021 Conference
Subjects: Cryptography and Security (cs.CR)
[73]  arXiv:2103.04016 [pdf, other]
Title: Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[74]  arXiv:2103.04028 [pdf, other]
Title: Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors
Comments: To appear in IoTDI2021
Subjects: Cryptography and Security (cs.CR)
[75]  arXiv:2103.04038 [pdf, other]
Title: Hidden Backdoor Attack against Semantic Segmentation Models
Comments: This is a 6-pages short version of our ongoing work. It is accepted by the non-archival ICLR workshop on Security and Safety in Machine Learning Systems, 2021. The first two authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[ total of 399 entries: 1-25 | 26-50 | 51-75 | 76-100 | 101-125 | 126-150 | ... | 376-399 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2211, contact, help  (Access key information)