We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 85 entries: 1-57 | 58-85 ]
[ showing 57 entries per page: fewer | more | all ]

Thu, 23 Mar 2023

[1]  arXiv:2303.12612 [pdf, other]
Title: LoadLord: Loading on the Fly to Defend Against Code-Reuse Attacks
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2303.12589 [pdf, ps, other]
Title: Do Backdoors Assist Membership Inference Attacks?
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2303.12536 [pdf]
Title: BlockChain and Decentralized Apps
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2303.12525 [pdf, other]
Title: A survey of hardware-based malware detection approach
Comments: 6 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2303.12429 [pdf, other]
Title: Man vs the machine: The Struggle for Effective Text Anonymisation in the Age of Large Language Models
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2303.12397 [pdf, other]
Title: Edge Deep Learning Model Protection via Neuron Authorization
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[7]  arXiv:2303.12367 [pdf, other]
Title: AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC)
[8]  arXiv:2303.12361 [pdf, other]
Title: Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Comments: 7 pages, 3 figures, 1 table
Journal-ref: 13th ACM Conference on Data and Application Security and Privacy (CODASPY '23), April 24-26, 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[9]  arXiv:2303.12340 [pdf, ps, other]
Title: Insecure by Design in the Backbone of Critical Infrastructure
Comments: IEEE/ACM Workshop on the Internet of Safe Things 2023
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2303.12278 [pdf, other]
Title: X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[11]  arXiv:2303.12658 (cross-list from cs.CV) [pdf, other]
Title: Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Comments: arXiv admin note: text overlap with arXiv:2204.10779
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[12]  arXiv:2303.12481 (cross-list from cs.LG) [pdf, other]
Title: Revisiting DeepFool: generalization and improvement
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[13]  arXiv:2303.12363 (cross-list from cs.LG) [pdf]
Title: Distribution-restrained Softmax Loss for the Model Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[14]  arXiv:2303.12249 (cross-list from cs.CV) [pdf, other]
Title: State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[15]  arXiv:2303.12247 (cross-list from cs.CV) [pdf, other]
Title: Exploring the Benefits of Visual Prompting in Differential Privacy
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[16]  arXiv:2303.12233 (cross-list from cs.LG) [pdf, other]
Title: Secure Aggregation in Federated Learning is not Private: Leaking User Data at Large Scale through Model Modification
Comments: 20 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[17]  arXiv:2303.12175 (cross-list from cs.CV) [pdf, other]
Title: Black-box Backdoor Defense via Zero-shot Image Purification
Comments: 11 pages, 2 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[18]  arXiv:2303.12132 (cross-list from cs.CL) [pdf, other]
Title: Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense
Comments: 41 pages (without references), 13 figures; public report of Cyber-Defence Campus
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 22 Mar 2023

[19]  arXiv:2303.11972 [pdf]
Title: A Post-Quantum Key Agreement Protocol Based on a Modified Matrix-Power Function over a Rectangular Matrices Semiring
Comments: 6 pages, 20 references
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2303.11760 [pdf, other]
Title: Real-Time Cyberattack Detection with Offline and Online Learning
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[21]  arXiv:2303.11751 [pdf, other]
Title: Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks
Comments: The paper is accepted and will be published in the IEEE/ACM CCGrid 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2303.11745 [pdf, other]
Title: Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study
Comments: The paper is accepted and will be published in the IEEE ICC 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[23]  arXiv:2303.11595 [pdf, other]
Title: Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Comments: Accepted to CVPR2023
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2303.11575 [pdf, other]
Title: "I Want the Payment Process to be Cool'': Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[25]  arXiv:2303.11511 [pdf, other]
Title: STDLens: Model Hijacking-resilient Federated Learning for Object Detection
Comments: CVPR 2023. Source Code: this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[26]  arXiv:2303.11492 [pdf, other]
Title: TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[27]  arXiv:2303.11470 [pdf, other]
Title: Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM)
[28]  arXiv:2303.11772 (cross-list from cs.NI) [pdf, other]
Title: Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Comments: Accepted for USENIX Security '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[29]  arXiv:2303.11643 (cross-list from cs.LG) [pdf, other]
Title: Manipulating Transfer Learning for Property Inference
Comments: Accepted to CVPR 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[30]  arXiv:2303.11585 (cross-list from quant-ph) [pdf, ps, other]
Title: Experimental Phase-Matching Quantum Key Distribution without Intensity Modulation
Comments: Comments are welcome!
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[31]  arXiv:2303.11350 (cross-list from cs.IT) [pdf, other]
Title: Secure Integrated Sensing and Communication
Comments: arXiv admin note: substantial text overlap with arXiv:2202.10790
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Systems and Control (eess.SY)

Tue, 21 Mar 2023

[32]  arXiv:2303.11282 [pdf, other]
Title: A Comparative Analysis of Port Scanning Tool Efficacy
Authors: Jason M. Pittman
Comments: 7 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[33]  arXiv:2303.11220 [pdf, other]
Title: Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging
Comments: 16 pages, 14 figures
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[34]  arXiv:2303.11198 [pdf]
Title: A set of semantic data flow diagrams and its security analysis based on ontologies and knowledge graphs
Authors: Andrei Brazhuk
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[35]  arXiv:2303.11143 [pdf, other]
Title: Adversarial Attacks against Binary Similarity Systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[36]  arXiv:2303.11079 [pdf, other]
Title: Differentially Private Algorithms for Synthetic Power System Datasets
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Optimization and Control (math.OC)
[37]  arXiv:2303.10955 [pdf, ps, other]
Title: Attacks Against Security Context in 5G Network
Comments: The 6th International Symposium on Mobile Internet Security (MobiSec 22)
Subjects: Cryptography and Security (cs.CR)
[38]  arXiv:2303.10877 [pdf]
Title: Practical Solutions in Fully Homomorphic Encryption -- A Survey Analyzing Existing Acceleration Methods
Comments: 18 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2303.10795 [pdf, other]
Title: iRogue: Identifying Rogue Behavior from App Reviews
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2303.10628 [pdf, other]
Title: Geometric Stability Estimates For 3D-Object Encryption Through Permutations and Rotations
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[41]  arXiv:2303.10594 [pdf, other]
Title: AdaptGuard: Defending Against Universal Attacks for Model Adaptation
Comments: 15 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[42]  arXiv:2303.10555 [pdf, other]
Title: Revisiting LiDAR Spoofing Attack Capabilities against Object Detection: Improvements, Measurement, and New Attack
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[43]  arXiv:2303.10517 [pdf, other]
Title: Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[44]  arXiv:2303.10500 [pdf, other]
Title: Blockchain-Based, Confidentiality-Preserving Orchestration of Collaborative Workflows
Subjects: Cryptography and Security (cs.CR)
[45]  arXiv:2303.10473 [pdf]
Title: Report of the Medical Image De-Identification (MIDI) Task Group -- Best Practices and Recommendations
Comments: 131 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[46]  arXiv:2303.10399 [pdf, other]
Title: FedRight: An Effective Model Copyright Protection for Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[47]  arXiv:2303.10370 [pdf, other]
Title: How to Model Privacy Threats in the Automotive Domain
Comments: Accepted in 9th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2023)
Subjects: Cryptography and Security (cs.CR)
[48]  arXiv:2303.11242 (cross-list from cs.LG) [pdf, other]
Title: Make Landscape Flatter in Differentially Private Federated Learning
Comments: CVPR2023, 18 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[49]  arXiv:2303.11157 (cross-list from cs.GT) [pdf, other]
Title: Differentially Private Games via Payoff Perturbation
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[50]  arXiv:2303.11102 (cross-list from cs.SE) [pdf, other]
Title: Challenges of Producing Software Bill Of Materials for Java
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[51]  arXiv:2303.11040 (cross-list from cs.CV) [pdf, other]
Title: Benchmarking Robustness of 3D Object Detection to Common Corruptions in Autonomous Driving
Comments: CVPR 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[52]  arXiv:2303.10874 (cross-list from cs.CY) [pdf]
Title: Building a Resilient Cybersecurity Posture: A Framework for Leveraging Prevent, Detect and Respond Functions and Law Enforcement Collaboration
Comments: 7 pages, 1 figure
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[53]  arXiv:2303.10837 (cross-list from cs.LG) [pdf, other]
Title: FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[54]  arXiv:2303.10824 (cross-list from cs.CV) [pdf, other]
Title: k-SALSA: k-anonymous synthetic averaging of retinal images via local style alignment
Comments: European Conference on Computer Vision (ECCV), 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[55]  arXiv:2303.10509 (cross-list from cs.CY) [pdf, ps, other]
Title: Risk-Limiting Audits for Condorcet Elections
Comments: 15 pages, accepted for Voting'23
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[56]  arXiv:2303.10303 (cross-list from cs.LG) [pdf, other]
Title: The Challenge of Differentially Private Screening Rules
Comments: 5 pages, 2 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 20 Mar 2023 (showing first 1 of 11 entries)

[57]  arXiv:2303.09893 [pdf, other]
Title: Moving Target Defense for Service-oriented Mission-critical Networks
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[ total of 85 entries: 1-57 | 58-85 ]
[ showing 57 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)