We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 121 entries: 1-90 | 91-121 ]
[ showing 90 entries per page: fewer | more | all ]

Tue, 6 Jun 2023

[1]  arXiv:2306.03054 [pdf, other]
Title: Discriminative Adversarial Privacy: Balancing Accuracy and Membership Privacy in Neural Networks
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[2]  arXiv:2306.03013 [pdf, other]
Title: Hiding in Plain Sight: Disguising Data Stealing Attacks in Federated Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2306.02895 [pdf, other]
Title: Evading Black-box Classifiers Without Breaking Eggs
Comments: Code at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[4]  arXiv:2306.02785 [pdf, other]
Title: Modular zk-Rollup On-Demand
Comments: url : this https URL
Journal-ref: Journal of Network and Computer Applications, 2023, 103678, ISSN 1084-8045,
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2306.02715 [pdf, other]
Title: Federated Intrusion Detection System based on Deep Belief Networks
Comments: 14 pages, 5 figues, 3 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[6]  arXiv:2306.02642 [pdf, other]
Title: Efficient Algorithms for Modeling SBoxes Using MILP
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2306.02612 [pdf]
Title: Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia
Comments: 8 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[8]  arXiv:2306.02473 [pdf, other]
Title: Anomaly Detection Techniques in Smart Grid Systems: A Review
Comments: 7 pages, 3 figures and conference paper (accepted for publication in 2023 IEEE World AI IOT Congress (AIIOT)
Journal-ref: 2023 IEEE World AI IOT Congress (AIIOT)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9]  arXiv:2306.02384 [pdf, other]
Title: Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2306.02378 [pdf, other]
Title: Encryption by using base-n systems with many characters
Authors: Armin Hoenen
Comments: 12 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[11]  arXiv:2306.02270 [pdf, other]
Title: Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2306.02256 [pdf, other]
Title: Less is More: Revisiting Gaussian Mechanism for Differential Privacy
Authors: Tianxi Ji, Pan Li
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2306.02131 [pdf, ps, other]
Title: Exploring the Environmental Benefits of In-Process Isolation for Software Resilience
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[14]  arXiv:2306.02111 [pdf, other]
Title: Simulating Noisy Quantum Circuits for Cryptographic Algorithms
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[15]  arXiv:2306.01996 [pdf, other]
Title: BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2306.01989 [pdf, other]
Title: Optimized Vectorization Implementation of CRYSTALS-Dilithium
Comments: 13 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[17]  arXiv:2306.01983 [pdf]
Title: Mitigating Backdoor Attack Via Prerequisite Transformation
Authors: Han Gao
Comments: 7 pages,7 figures,2 tables
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[18]  arXiv:2306.01953 [pdf, other]
Title: Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[19]  arXiv:2306.01862 [pdf, other]
Title: Systemic Risk and Vulnerability Analysis of Multi-cloud Environments
Comments: 27 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2306.01809 [pdf, other]
Title: Adversarial Attack Based on Prediction-Correction
Comments: This manuscript was submitted to CVPR 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[21]  arXiv:2306.01762 [pdf, other]
Title: Pre-trained transformer for adversarial purification
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[22]  arXiv:2306.01754 [pdf, other]
Title: Transformer-based Vulnerability Detection in Code at EditTime: Zero-shot, Few-shot, or Fine-tuning?
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[23]  arXiv:2306.01751 [pdf, ps, other]
Title: Differential Privacy with Random Projections and Sign Random Projections
Authors: Ping Li, Xiaoyun Li
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[24]  arXiv:2306.02677 (cross-list from cs.LG) [pdf, other]
Title: A Privacy-Preserving Federated Learning Approach for Kernel methods
Comments: Preprint version of the full paper with supplementary material
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[25]  arXiv:2306.02587 (cross-list from cs.LG) [pdf, other]
Title: Jammer classification with Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[26]  arXiv:2306.02563 (cross-list from cs.LG) [pdf, other]
Title: Large-Scale Distributed Learning via Private On-Device Locality-Sensitive Hashing
Comments: 18 pages, 10 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[27]  arXiv:2306.02496 (cross-list from cs.DC) [pdf, other]
Title: Hawk: DevOps-driven Transparency and Accountability in Cloud Native Systems
Comments: preprint, accepted for the 16th IEEE International Conference on Cloud Computing 2023, IEEE Cloud 2023
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Software Engineering (cs.SE)
[28]  arXiv:2306.02487 (cross-list from cs.AI) [pdf, other]
Title: Discussion Paper: The Threat of Real Time Deepfakes
Journal-ref: FRANKOVITS, Guy; YISROEL, Mirsky. Discussion Paper: The Threat of Real Time Deepfakes. In: Proceedings of the 2st Workshop on Security Implications of Deepfakes and Cheapfakes. 2023
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[29]  arXiv:2306.02368 (cross-list from cs.LG) [pdf, other]
Title: Revisiting Data-Free Knowledge Distillation with Poisoned Teachers
Comments: Accepted to ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[30]  arXiv:2306.02179 (cross-list from cs.GT) [pdf, other]
Title: Buying Time: Latency Racing vs. Bidding in Fair Transaction Ordering
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[31]  arXiv:2306.02165 (cross-list from cs.AI) [pdf, other]
Title: Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[32]  arXiv:2306.02002 (cross-list from cs.LG) [pdf, other]
Title: Can Directed Graph Neural Networks be Adversarially Robust?
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[33]  arXiv:2306.01886 (cross-list from cs.DC) [pdf, other]
Title: Auditable data structures: theory and applications
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)

Mon, 5 Jun 2023

[34]  arXiv:2306.01655 [pdf, other]
Title: Poisoning Network Flow Classifiers
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[35]  arXiv:2306.01616 [pdf, other]
Title: Blockchain Model for Environment/Infrastructure Monitoring in Cloud-Enabled High-Altitude Platform Systems
Comments: 53 pages, 17 figures, 3 tables, accepted by Elsevier Vehicular Communications on May 26, 2023
Subjects: Cryptography and Security (cs.CR)
[36]  arXiv:2306.01401 [pdf, ps, other]
Title: Network Agnostic MPC with Statistical Security
Subjects: Cryptography and Security (cs.CR)
[37]  arXiv:2306.01364 [pdf, other]
Title: Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation
Comments: Accepted to IJCAI 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[38]  arXiv:2306.01356 [pdf, other]
Title: FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking
Subjects: Cryptography and Security (cs.CR)
[39]  arXiv:2306.01317 [pdf, other]
Title: Compatibility and Timing Attacks for JPEG Steganalysis
Authors: Etienne Levecque (CRIStAL), Patrick Bas (CRIStAL), Jan Butora (CRIStAL)
Comments: Workshop on Information Hiding and Multimedia Security, ACM, Jun 2023, Chicago, United States
Subjects: Cryptography and Security (cs.CR)
[40]  arXiv:2306.01299 [pdf, other]
Title: Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[41]  arXiv:2306.01241 [pdf, ps, other]
Title: Committee Moderation on Encrypted Messaging Platforms
Comments: Presented at the 44th IEEE Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2306.01684 (cross-list from cs.LG) [pdf, other]
Title: Harnessing large-language models to generate private synthetic text
Comments: 25 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[43]  arXiv:2306.01613 (cross-list from cs.LG) [pdf, other]
Title: Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization
Comments: Accepted to IEEE Transactions on Neural Networks and Learning Systems. arXiv admin note: text overlap with arXiv:2003.00040
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[44]  arXiv:2306.01545 (cross-list from cs.CL) [pdf, other]
Title: PassGPT: Password Modeling and (Guided) Generation with Large Language Models
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[45]  arXiv:2306.01471 (cross-list from cs.CL) [pdf, other]
Title: Guiding Text-to-Text Privatization by Syntax
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[46]  arXiv:2306.01400 (cross-list from cs.LG) [pdf, other]
Title: Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[47]  arXiv:2306.01342 (cross-list from cs.LG) [pdf, other]
Title: Covert Communication Based on the Poisoning Attack in Federated Learning
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[48]  arXiv:2306.01322 (cross-list from cs.LG) [pdf, other]
Title: Privacy Distillation: Reducing Re-identification Risk of Multimodal Diffusion Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[49]  arXiv:2306.01272 (cross-list from cs.CV) [pdf, other]
Title: DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[50]  arXiv:2306.01181 (cross-list from cs.LG) [pdf, other]
Title: TMI! Finetuned Models Leak Private Information from their Pretraining Data
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[51]  arXiv:2306.01143 (cross-list from cs.LG) [pdf, other]
Title: Federated Graph Learning for Low Probability of Detection in Wireless Ad-Hoc Networks
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)

Fri, 2 Jun 2023

[52]  arXiv:2306.00934 [pdf, other]
Title: Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[53]  arXiv:2306.00766 [pdf, other]
Title: Impact of using a privacy model on smart buildings data for CO2 prediction
Subjects: Cryptography and Security (cs.CR)
[54]  arXiv:2306.00674 [pdf]
Title: CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[55]  arXiv:2306.00623 [pdf, other]
Title: Physical Attacks on the Railway System
Subjects: Cryptography and Security (cs.CR)
[56]  arXiv:2306.00610 [pdf, other]
Title: Spying on the Spy: Security Analysis of Hidden Cameras
Comments: 19 pages. Conference: NSS 2023: 17th International Conference on Network and System Security
Subjects: Cryptography and Security (cs.CR)
[57]  arXiv:2306.00589 [pdf, other]
Title: ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships
Comments: 16 pages, 3 figures, IEEE Transactions on Technology and Society
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[58]  arXiv:2306.00553 [pdf, other]
Title: EduChain: A Blockchain-based Education Data Management System
Journal-ref: CBCC 2020. Communications in Computer and Information Science, vol 1305. Springer, Singapore
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[59]  arXiv:2306.00462 [pdf]
Title: Harnessing the Potential of Blockchain in DevOps: A Framework for Distributed Integration and Development
Comments: pages 10, figures 6
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2306.00419 [pdf, other]
Title: Challenges and Remedies to Privacy and Security in AIGC: Exploring the Potential of Privacy Computing, Blockchain, and Beyond
Comments: 43 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[61]  arXiv:2306.00377 [pdf]
Title: Developing and Building Ontologies in Cyber Security
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[62]  arXiv:2306.00314 [pdf]
Title: Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach
Comments: 17 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[63]  arXiv:2306.00284 [pdf]
Title: Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Quantum Physics (quant-ph)
[64]  arXiv:2306.00234 [pdf, other]
Title: Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed
Comments: 7 pages, 10 figures, Conference paper, Accepted in publication for 2023 IEEE World AI IoT Congress (AIIoT)
Journal-ref: 2023 IEEE World AI IoT Congress (AIIoT) Conference
Subjects: Cryptography and Security (cs.CR)
[65]  arXiv:2306.00136 [pdf]
Title: A Holistic Framework for Safeguarding of SMEs-A Case Study
Comments: A modified version of this work has been submitted to the Workshop IOSEC 2023 in the context of the 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN) and published in IEEE Xplore
Journal-ref: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 2023, pp. 1-5,
Subjects: Cryptography and Security (cs.CR)
[66]  arXiv:2306.00133 [pdf, ps, other]
Title: A Note On Interpreting Canary Exposure
Comments: short note, edited to add a sentence on independence of canary losses, including adding Pillutla et al
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[67]  arXiv:2306.00095 [pdf]
Title: Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System
Comments: 6 pages, 12 figures. Published in IEEE Global Communications Conference (GLOBECOM), 2022
Journal-ref: 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 6091-6096
Subjects: Cryptography and Security (cs.CR)
[68]  arXiv:2306.00920 (cross-list from cs.LG) [pdf, other]
Title: Better Private Linear Regression Through Better Private Feature Selection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[69]  arXiv:2306.00816 (cross-list from cs.CV) [pdf, other]
Title: Robust Backdoor Attack with Visible, Semantic, Sample-Specific, and Compatible Triggers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[70]  arXiv:2306.00794 (cross-list from cs.SD) [pdf, other]
Title: SlothSpeech: Denial-of-service Attack Against Speech Recognition Models
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[71]  arXiv:2306.00694 (cross-list from cs.SE) [pdf, other]
Title: UNGOML: Automated Classification of unsafe Usages in Go
Comments: 13 pages, accepted at the 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR 2023)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[72]  arXiv:2306.00687 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review
Comments: 38 pages, 11 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[73]  arXiv:2306.00578 (cross-list from cs.LG) [pdf, other]
Title: Does Black-box Attribute Inference Attacks on Graph Neural Networks Constitute Privacy Risk?
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[74]  arXiv:2306.00353 (cross-list from stat.ML) [pdf, other]
Title: Constructing Semantics-Aware Adversarial Examples with Probabilistic Perspective
Comments: 17 pages, 14 figures
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[75]  arXiv:2306.00308 (cross-list from cs.PL) [pdf, other]
Title: A Formal Model for Secure Multiparty Computation
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[76]  arXiv:2306.00240 (cross-list from cs.SE) [pdf, other]
Title: Trusting code in the wild: A social network-based centrality rating for developers in the Rust ecosystem
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[77]  arXiv:2306.00127 (cross-list from cs.LG) [pdf, other]
Title: Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning
Comments: Accepted at ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[78]  arXiv:2306.00044 (cross-list from cs.LG) [pdf, ps, other]
Title: How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Comments: Interspeech 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[79]  arXiv:2306.00042 (cross-list from cs.LG) [pdf, other]
Title: Graph-based methods coupled with specific distributional distances for adversarial attack detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)

Thu, 1 Jun 2023 (showing first 11 of 18 entries)

[80]  arXiv:2305.19897 [pdf, ps, other]
Title: Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[81]  arXiv:2305.19855 [pdf, other]
Title: Lattice-Aided Extraction of Spread-Spectrum Hidden Data
Comments: 10 pages
Subjects: Cryptography and Security (cs.CR)
[82]  arXiv:2305.19813 [pdf, other]
Title: Aggregated Zero-knowledge Proof and Blockchain-Empowered Authentication for Autonomous Truck Platooning
Comments: Accepted for publication in IEEE Transactions on Intelligent Transportation Systems
Subjects: Cryptography and Security (cs.CR)
[83]  arXiv:2305.19797 [pdf, other]
Title: A Hybrid Blockchain-Edge Architecture for Electronic Health Records Management with Attribute-based Cryptographic Mechanisms
Comments: Accepted for publication in IEEE Transactions on Network and Service Management (TNSM)
Subjects: Cryptography and Security (cs.CR)
[84]  arXiv:2305.19776 [pdf, other]
Title: Off-By-One Implementation Error in J-UNIWARD
Authors: Benedikt Lorch
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[85]  arXiv:2305.19760 [pdf, other]
Title: You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[86]  arXiv:2305.19756 [pdf, other]
Title: Concentrated Geo-Privacy
Authors: Yuting Liang, Ke Yi
Subjects: Cryptography and Security (cs.CR); Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
[87]  arXiv:2305.19586 [pdf, other]
Title: CryptOpt: Automatic Optimization of Straightline Code
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Programming Languages (cs.PL); Software Engineering (cs.SE)
[88]  arXiv:2305.19514 [pdf, other]
Title: Efficiency-Improved Inter-Rollup Transfer System Leveraging Batch Settlement Methods
Comments: 13 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[89]  arXiv:2305.19490 [pdf]
Title: Adoption of Blockchain Platform for Security Enhancement in Energy Transaction
Comments: 11 Pages, 6 Figures
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[90]  arXiv:2305.19487 [pdf, other]
Title: SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation
Subjects: Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
[ total of 121 entries: 1-90 | 91-121 ]
[ showing 90 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2306, contact, help  (Access key information)