We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Oct 2021, skipping first 95

[ total of 346 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-145 | 146-170 | 171-195 | ... | 346 ]
[ showing 25 entries per page: fewer | more | all ]
[96]  arXiv:2110.06654 [pdf, other]
Title: State of Security and Privacy Practices of Top Websites in the East African Community (EAC)
Comments: 8 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[97]  arXiv:2110.06657 [pdf]
Title: SmashEx: Smashing SGX Enclaves Using Exceptions
Comments: Accepted to ACM CCS 2021
Subjects: Cryptography and Security (cs.CR)
[98]  arXiv:2110.06904 [pdf, ps, other]
Title: Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
Comments: 18 pages
Journal-ref: USENIX Security Symposium 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[99]  arXiv:2110.07009 [pdf, other]
Title: Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[100]  arXiv:2110.07157 [pdf, other]
Title: Bandwidth Utilization Side-Channel on ML Inference Accelerators
Subjects: Cryptography and Security (cs.CR)
[101]  arXiv:2110.07366 [pdf, other]
Title: Privacy Impact Assessment: Comparing methodologies with a focus on practicality
Journal-ref: NordSec 2019. Lecture Notes in Computer Science, vol 11875. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[102]  arXiv:2110.07449 [pdf, other]
Title: zk-Fabric, a Polylithic Syntax Zero Knowledge Joint Proof System
Comments: 6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[103]  arXiv:2110.07450 [pdf, other]
Title: Bugs in our Pockets: The Risks of Client-Side Scanning
Comments: 46 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[104]  arXiv:2110.07462 [pdf, other]
Title: On Adversarial Vulnerability of PHM algorithms: An Initial Study
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[105]  arXiv:2110.07505 [pdf, other]
Title: AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy
Comments: To Appear in the ACM Conference on Computer and Communications Security (CCS) 2021
Subjects: Cryptography and Security (cs.CR)
[106]  arXiv:2110.07534 [pdf, other]
Title: Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO
Subjects: Cryptography and Security (cs.CR)
[107]  arXiv:2110.07771 [pdf, other]
Title: Assessing Risks and Modeling Threats in the Internet of Things
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[108]  arXiv:2110.07826 [pdf]
Title: Machine Learning Algorithms In User Authentication Schemes
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[109]  arXiv:2110.07832 [pdf]
Title: A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[110]  arXiv:2110.07954 [pdf, other]
Title: HTTPA: HTTPS Attestable Protocol
Comments: 10 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[111]  arXiv:2110.08113 [pdf, other]
Title: Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2110.08139 [pdf, other]
Title: Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Comments: Accepted on 3 Sept 2021 to appear at the Network and Distributed System Security Symposium (NDSS) 2022
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2110.08177 [pdf, other]
Title: The Privacy-preserving Padding Problem: Non-negative Mechanisms for Conservative Answers with Differential Privacy
Comments: 20 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[114]  arXiv:2110.08247 [pdf, other]
Title: Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks
Comments: Work in progress
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[115]  arXiv:2110.08324 [pdf, other]
Title: Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[116]  arXiv:2110.08422 [pdf, other]
Title: Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
Journal-ref: Proceedings of the Privacy Enhancing Technologies Symposium (PoPETS), volume 2022, issue 1
Subjects: Cryptography and Security (cs.CR)
[117]  arXiv:2110.08447 [pdf, other]
Title: TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
Authors: Chandramouli Amarnath (Georgia Tech), Aishwarya H. Balwani (Georgia Tech), Kwondo Ma (Georgia Tech), Abhijit Chatterjee (Georgia Tech)
Comments: 10 pages, 2 reference pages, 2 appendix pages, 14 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[118]  arXiv:2110.08517 [pdf, other]
Title: Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services
Journal-ref: Annual Computer Security Applications Conference (ACSAC '21), December 6--10, 2021, USA
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2110.08662 [pdf, other]
Title: An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2110.08671 [pdf, other]
Title: Blockchain and Federated Edge Learning for Privacy-Preserving Mobile Crowdsensing
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 346 entries: 1-25 | 21-45 | 46-70 | 71-95 | 96-120 | 121-145 | 146-170 | 171-195 | ... | 346 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2209, contact, help  (Access key information)