We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 43

[ total of 89 entries: 1-25 | 19-43 | 44-68 | 69-89 ]
[ showing 25 entries per page: fewer | more | all ]

Wed, 22 Mar 2023 (continued, showing last 10 of 13 entries)

[44]  arXiv:2303.11745 [pdf, other]
Title: Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study
Comments: The paper is accepted and will be published in the IEEE ICC 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[45]  arXiv:2303.11595 [pdf, other]
Title: Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution
Comments: Accepted to CVPR2023
Subjects: Cryptography and Security (cs.CR)
[46]  arXiv:2303.11575 [pdf, other]
Title: "I Want the Payment Process to be Cool'': Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[47]  arXiv:2303.11511 [pdf, other]
Title: STDLens: Model Hijacking-resilient Federated Learning for Object Detection
Comments: CVPR 2023. Source Code: this https URL
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[48]  arXiv:2303.11492 [pdf, other]
Title: TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[49]  arXiv:2303.11470 [pdf, other]
Title: Did You Train on My Dataset? Towards Public Dataset Protection with Clean-Label Backdoor Watermarking
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multimedia (cs.MM)
[50]  arXiv:2303.11772 (cross-list from cs.NI) [pdf, other]
Title: Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Comments: Accepted for USENIX Security '23
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[51]  arXiv:2303.11643 (cross-list from cs.LG) [pdf, other]
Title: Manipulating Transfer Learning for Property Inference
Comments: Accepted to CVPR 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[52]  arXiv:2303.11585 (cross-list from quant-ph) [pdf, ps, other]
Title: Experimental Phase-Matching Quantum Key Distribution without Intensity Modulation
Comments: Comments are welcome!
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[53]  arXiv:2303.11350 (cross-list from cs.IT) [pdf, other]
Title: Secure Integrated Sensing and Communication
Comments: arXiv admin note: substantial text overlap with arXiv:2202.10790
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Systems and Control (eess.SY)

Tue, 21 Mar 2023 (showing first 15 of 25 entries)

[54]  arXiv:2303.11282 [pdf, other]
Title: A Comparative Analysis of Port Scanning Tool Efficacy
Authors: Jason M. Pittman
Comments: 7 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[55]  arXiv:2303.11220 [pdf, other]
Title: Smartphones with UWB: Evaluating the Accuracy and Reliability of UWB Ranging
Comments: 16 pages, 14 figures
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[56]  arXiv:2303.11198 [pdf]
Title: A set of semantic data flow diagrams and its security analysis based on ontologies and knowledge graphs
Authors: Andrei Brazhuk
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[57]  arXiv:2303.11143 [pdf, other]
Title: Adversarial Attacks against Binary Similarity Systems
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[58]  arXiv:2303.11079 [pdf, other]
Title: Differentially Private Algorithms for Synthetic Power System Datasets
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Optimization and Control (math.OC)
[59]  arXiv:2303.10955 [pdf, ps, other]
Title: Attacks Against Security Context in 5G Network
Comments: The 6th International Symposium on Mobile Internet Security (MobiSec 22)
Subjects: Cryptography and Security (cs.CR)
[60]  arXiv:2303.10877 [pdf]
Title: Practical Solutions in Fully Homomorphic Encryption -- A Survey Analyzing Existing Acceleration Methods
Comments: 18 pages, 7 figures
Subjects: Cryptography and Security (cs.CR)
[61]  arXiv:2303.10795 [pdf, other]
Title: iRogue: Identifying Rogue Behavior from App Reviews
Subjects: Cryptography and Security (cs.CR)
[62]  arXiv:2303.10628 [pdf, other]
Title: Geometric Stability Estimates For 3D-Object Encryption Through Permutations and Rotations
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[63]  arXiv:2303.10594 [pdf, other]
Title: AdaptGuard: Defending Against Universal Attacks for Model Adaptation
Comments: 15 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[64]  arXiv:2303.10555 [pdf, other]
Title: Revisiting LiDAR Spoofing Attack Capabilities against Object Detection: Improvements, Measurement, and New Attack
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[65]  arXiv:2303.10517 [pdf, other]
Title: Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[66]  arXiv:2303.10500 [pdf, other]
Title: Blockchain-Based, Confidentiality-Preserving Orchestration of Collaborative Workflows
Subjects: Cryptography and Security (cs.CR)
[67]  arXiv:2303.10473 [pdf]
Title: Report of the Medical Image De-Identification (MIDI) Task Group -- Best Practices and Recommendations
Comments: 131 pages
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[68]  arXiv:2303.10399 [pdf, other]
Title: FedRight: An Effective Model Copyright Protection for Federated Learning
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[ total of 89 entries: 1-25 | 19-43 | 44-68 | 69-89 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2303, contact, help  (Access key information)