We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 89 entries: 1-50 | 51-89 ]
[ showing 50 entries per page: fewer | more | all ]

Fri, 24 Mar 2023

[1]  arXiv:2303.13372 [pdf, other]
Title: Adversarial Robustness of Learning-based Static Malware Classifiers
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[2]  arXiv:2303.13211 [pdf, other]
Title: Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor Poisoned Samples in DNNs
Comments: Accepted at CVPRW (The Art of Robustness)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[3]  arXiv:2303.13204 [pdf, other]
Title: A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2303.13075 [pdf, ps, other]
Title: Security Analysis on Social Media Networks via STRIDE Model
Comments: The 19th International Conference on Networking and Services (ICNS 2023), pp. 28-33, IARIA, 2023
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2303.13073 [pdf, other]
Title: BlockFW -- Towards Blockchain-based Rule-Sharing Firewall
Comments: The 16th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2022), pp. 70-75, IARIA 2022
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[6]  arXiv:2303.13050 [pdf, other]
Title: Building Resilient Web 3.0 with Quantum Information Technologies and Blockchain: An Ambilateral View
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2303.12947 [pdf]
Title: Deep Attention Recognition for Attack Identification in 5G UAV scenarios: Novel Architecture and End-to-End Evaluation
Comments: 17 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[8]  arXiv:2303.12944 [pdf, other]
Title: Use of Federated Learning and Blockchain towards Securing Financial Services
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[9]  arXiv:2303.12942 [pdf, other]
Title: A Survey on Explainable Artificial Intelligence for Network Cybersecurity
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Networking and Internet Architecture (cs.NI)
[10]  arXiv:2303.12940 [pdf, other]
Title: Cryptocurrency wallets: assessment and security
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[11]  arXiv:2303.12939 [pdf, other]
Title: Managing Cyber Risk, a Science in the Making
Comments: 28 pages, 3 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[12]  arXiv:2303.12817 [pdf, other]
Title: IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing
Comments: 13 pages, Accepted for publication at The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[13]  arXiv:2303.12811 [pdf, other]
Title: SignCRF: Scalable Channel-agnostic Data-driven Radio Authentication System
Comments: 11 pages, 13 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[14]  arXiv:2303.13408 (cross-list from cs.CL) [pdf, other]
Title: Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense
Comments: Preprint (27 pages). Code, models, data will be added to this https URL
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[15]  arXiv:2303.13307 (cross-list from cs.HC) [pdf, other]
Title: Don't Peek at My Chart: Privacy-preserving Visualization for Mobile Devices
Comments: 14 pages, 15 figures
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[16]  arXiv:2303.13059 (cross-list from eess.SY) [pdf, other]
Title: Optimal Security Parameter for Encrypted Control Systems Against Eavesdropper and Malicious Server
Comments: 17 pages, 4 figures. arXiv admin note: text overlap with arXiv:2210.08846
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[17]  arXiv:2303.12993 (cross-list from cs.CV) [pdf, other]
Title: Backdoor Defense via Adaptively Splitting Poisoned Dataset
Comments: Accepted by CVPR 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[18]  arXiv:2303.12952 (cross-list from cs.LG) [pdf, other]
Title: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversarial Networks
Comments: To appear in the Proceedings of PAKDD 2023 (27th Pacific-Asia Conference on Knowledge Discovery and Data Mining)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[19]  arXiv:2303.12921 (cross-list from cs.LG) [pdf, ps, other]
Title: Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization
Comments: STOC 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[20]  arXiv:2303.12891 (cross-list from cs.LG) [pdf, other]
Title: Feature Reduction Method Comparison Towards Explainability and Efficiency in Cybersecurity Intrusion Detection Systems
Comments: Published in 2022 21st IEEE International Conference on Machine Learning and Applications. 8 pages. 5 figures
Journal-ref: IEEE.ICMLA 21 (2022) 1326-1333
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[21]  arXiv:2303.12812 (cross-list from cs.LG) [pdf, other]
Title: A Comparison of Graph Neural Networks for Malware Classification
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[22]  arXiv:2303.12800 (cross-list from cs.NI) [pdf, other]
Title: IoT Device Identification Based on Network Communication Analysis Using Deep Learning
Comments: J Ambient Intell Human Comput (2022)
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Thu, 23 Mar 2023

[23]  arXiv:2303.12612 [pdf, other]
Title: LoadLord: Loading on the Fly to Defend Against Code-Reuse Attacks
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2303.12589 [pdf, ps, other]
Title: Do Backdoors Assist Membership Inference Attacks?
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2303.12536 [pdf]
Title: BlockChain and Decentralized Apps
Subjects: Cryptography and Security (cs.CR)
[26]  arXiv:2303.12525 [pdf, other]
Title: A survey of hardware-based malware detection approach
Comments: 6 pages, 2 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[27]  arXiv:2303.12429 [pdf, other]
Title: Man vs the machine: The Struggle for Effective Text Anonymisation in the Age of Large Language Models
Subjects: Cryptography and Security (cs.CR)
[28]  arXiv:2303.12397 [pdf, other]
Title: Edge Deep Learning Model Protection via Neuron Authorization
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29]  arXiv:2303.12367 [pdf, other]
Title: AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC)
[30]  arXiv:2303.12361 [pdf, other]
Title: Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Comments: 7 pages, 3 figures, 1 table
Journal-ref: 13th ACM Conference on Data and Application Security and Privacy (CODASPY '23), April 24-26, 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[31]  arXiv:2303.12340 [pdf, ps, other]
Title: Insecure by Design in the Backbone of Critical Infrastructure
Comments: IEEE/ACM Workshop on the Internet of Safe Things 2023
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2303.12278 [pdf, other]
Title: X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[33]  arXiv:2303.12658 (cross-list from cs.CV) [pdf, other]
Title: Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Comments: arXiv admin note: text overlap with arXiv:2204.10779
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[34]  arXiv:2303.12481 (cross-list from cs.LG) [pdf, other]
Title: Revisiting DeepFool: generalization and improvement
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[35]  arXiv:2303.12363 (cross-list from cs.LG) [pdf]
Title: Distribution-restrained Softmax Loss for the Model Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[36]  arXiv:2303.12249 (cross-list from cs.CV) [pdf, other]
Title: State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[37]  arXiv:2303.12247 (cross-list from cs.CV) [pdf, other]
Title: Exploring the Benefits of Visual Prompting in Differential Privacy
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38]  arXiv:2303.12233 (cross-list from cs.LG) [pdf, other]
Title: Secure Aggregation in Federated Learning is not Private: Leaking User Data at Large Scale through Model Modification
Comments: 20 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[39]  arXiv:2303.12175 (cross-list from cs.CV) [pdf, other]
Title: Black-box Backdoor Defense via Zero-shot Image Purification
Comments: 11 pages, 2 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[40]  arXiv:2303.12132 (cross-list from cs.CL) [pdf, other]
Title: Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense
Comments: 41 pages (without references), 13 figures; public report of Cyber-Defence Campus
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 22 Mar 2023 (showing first 10 of 13 entries)

[41]  arXiv:2303.11972 [pdf]
Title: A Post Quantum Key Agreement Protocol Based on a Modified Matrix Power Function over a Rectangular Matrices Semiring
Comments: 6 pages, 20 references
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2303.11760 [pdf, other]
Title: Real-Time Cyberattack Detection with Offline and Online Learning
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[43]  arXiv:2303.11751 [pdf, other]
Title: Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks
Comments: The paper is accepted and will be published in the IEEE/ACM CCGrid 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2303.11745 [pdf, other]
Title: Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study
Comments: The paper is accepted and will be published in the IEEE ICC 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2303.11595 [pdf, other]
Title: Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Comments: Accepted to CVPR2023
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2303.11575 [pdf, other]
Title: "I Want the Payment Process to be Cool'': Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[47]  arXiv:2303.11511 [pdf, other]
Title: STDLens: Model Hijacking-resilient Federated Learning for Object Detection
Comments: CVPR 2023. Source Code: this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[48]  arXiv:2303.11492 [pdf, other]
Title: TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[49]  arXiv:2303.11470 [pdf, other]
Title: Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM)
[50]  arXiv:2303.11772 (cross-list from cs.NI) [pdf, other]
Title: Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Comments: Accepted for USENIX Security '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[ total of 89 entries: 1-50 | 51-89 ]
[ showing 50 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)