We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 27

[ total of 89 entries: 1-25 | 3-27 | 28-52 | 53-77 | 78-89 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 23 Mar 2023 (continued, showing last 13 of 18 entries)

[28]  arXiv:2303.12397 [pdf, other]
Title: Edge Deep Learning Model Protection via Neuron Authorization
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[29]  arXiv:2303.12367 [pdf, other]
Title: AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices
Comments: 7 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC)
[30]  arXiv:2303.12361 [pdf, other]
Title: Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Comments: 7 pages, 3 figures, 1 table
Journal-ref: 13th ACM Conference on Data and Application Security and Privacy (CODASPY '23), April 24-26, 2023
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[31]  arXiv:2303.12340 [pdf, ps, other]
Title: Insecure by Design in the Backbone of Critical Infrastructure
Comments: IEEE/ACM Workshop on the Internet of Safe Things 2023
Subjects: Cryptography and Security (cs.CR)
[32]  arXiv:2303.12278 [pdf, other]
Title: X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[33]  arXiv:2303.12658 (cross-list from cs.CV) [pdf, other]
Title: Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Comments: arXiv admin note: text overlap with arXiv:2204.10779
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[34]  arXiv:2303.12481 (cross-list from cs.LG) [pdf, other]
Title: Revisiting DeepFool: generalization and improvement
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[35]  arXiv:2303.12363 (cross-list from cs.LG) [pdf]
Title: Distribution-restrained Softmax Loss for the Model Robustness
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[36]  arXiv:2303.12249 (cross-list from cs.CV) [pdf, other]
Title: State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[37]  arXiv:2303.12247 (cross-list from cs.CV) [pdf, other]
Title: Exploring the Benefits of Visual Prompting in Differential Privacy
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[38]  arXiv:2303.12233 (cross-list from cs.LG) [pdf, other]
Title: Secure Aggregation in Federated Learning is not Private: Leaking User Data at Large Scale through Model Modification
Comments: 20 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[39]  arXiv:2303.12175 (cross-list from cs.CV) [pdf, other]
Title: Black-box Backdoor Defense via Zero-shot Image Purification
Comments: 11 pages, 2 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[40]  arXiv:2303.12132 (cross-list from cs.CL) [pdf, other]
Title: Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense
Comments: 41 pages (without references), 13 figures; public report of Cyber-Defence Campus
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)

Wed, 22 Mar 2023 (showing first 12 of 13 entries)

[41]  arXiv:2303.11972 [pdf]
Title: A Post Quantum Key Agreement Protocol Based on a Modified Matrix Power Function over a Rectangular Matrices Semiring
Comments: 6 pages, 20 references
Subjects: Cryptography and Security (cs.CR)
[42]  arXiv:2303.11760 [pdf, other]
Title: Real-Time Cyberattack Detection with Offline and Online Learning
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[43]  arXiv:2303.11751 [pdf, other]
Title: Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks
Comments: The paper is accepted and will be published in the IEEE/ACM CCGrid 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR)
[44]  arXiv:2303.11745 [pdf, other]
Title: Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study
Comments: The paper is accepted and will be published in the IEEE ICC 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2303.11595 [pdf, other]
Title: Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Comments: Accepted to CVPR2023
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2303.11575 [pdf, other]
Title: "I Want the Payment Process to be Cool'': Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[47]  arXiv:2303.11511 [pdf, other]
Title: STDLens: Model Hijacking-resilient Federated Learning for Object Detection
Comments: CVPR 2023. Source Code: this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[48]  arXiv:2303.11492 [pdf, other]
Title: TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[49]  arXiv:2303.11470 [pdf, other]
Title: Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM)
[50]  arXiv:2303.11772 (cross-list from cs.NI) [pdf, other]
Title: Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Comments: Accepted for USENIX Security '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[51]  arXiv:2303.11643 (cross-list from cs.LG) [pdf, other]
Title: Manipulating Transfer Learning for Property Inference
Comments: Accepted to CVPR 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[52]  arXiv:2303.11585 (cross-list from quant-ph) [pdf, ps, other]
Title: Experimental Phase-Matching Quantum Key Distribution without Intensity Modulation
Comments: Comments are welcome!
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[ total of 89 entries: 1-25 | 3-27 | 28-52 | 53-77 | 78-89 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)