We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 87 entries: 1-25 | 26-50 | 51-75 | 76-87 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 19 Oct 2021 (showing first 25 of 32 entries)

[1]  arXiv:2110.09207 [pdf, other]
Title: SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay
Comments: 9 pages, 14 figures, IEEE Conference on Communications and Network Security October 2021
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2110.09162 [pdf, other]
Title: Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment
Comments: To be published in Proceedings of 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[3]  arXiv:2110.09160 [pdf, other]
Title: DE-RSTC: A rational secure two-party computation protocol based on direction entropy
Authors: Juan Ma, Yuling Chen
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2110.08971 [pdf, other]
Title: Long Passphrases: Potentials and Limits
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2110.08883 [pdf, other]
Title: Blockchain Enabled Secure Authentication for Unmanned Aircraft Systems
Comments: Accepted for publication in IEEE GlobalCom as a workshop paper
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[6]  arXiv:2110.08848 [pdf, other]
Title: HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[7]  arXiv:2110.08779 [pdf]
Title: A robust watermarking algorithm for medical images
Comments: 12 pages, 13 figures, 5 tables, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 20, No. 3, December 2020, pp. 1601~1612, ISSN: 2502-4752, pp1601-1612
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2110.08777 [pdf]
Title: A Novel Watermarking Approach for Protecting Image Integrity based on a Hybrid Security Technique
Comments: 9 pages, 4 figures, 4 tables, International Journal of Computer Applications, Vol. 178, No.30, 14-22 July 2019, ISSN 0975-8887
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2110.08697 [pdf, other]
Title: Improving Dither Modulation based Robust Steganography by Overflow Suppression
Comments: submitted to IEEE TDSC on 18-Mar-2021
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2110.08673 [pdf, other]
Title: Scaling Blockchains: Can Elected Committees Help?
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); General Economics (econ.GN); Trading and Market Microstructure (q-fin.TR)
[11]  arXiv:2110.08671 [pdf, other]
Title: Blockchain and Federated Edge Learning for Privacy-Preserving Mobile Crowdsensing
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[12]  arXiv:2110.08662 [pdf, other]
Title: An Effective Attack Scenario Construction Model based on Attack Steps and Stages Identification
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2110.08517 [pdf, other]
Title: Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services
Journal-ref: Annual Computer Security Applications Conference (ACSAC '21), December 6--10, 2021, Virtual Event, USA
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2110.08447 [pdf, other]
Title: TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
Authors: Chandramouli Amarnath (Georgia Tech), Aishwarya H. Balwani (Georgia Tech), Kwondo Ma (Georgia Tech), Abhijit Chatterjee (Georgia Tech)
Comments: 10 pages, 2 reference pages, 2 appendix pages, 14 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[15]  arXiv:2110.08422 [pdf, other]
Title: Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
Journal-ref: Proceedings of the Privacy Enhancing Technologies Symposium (PoPETS), volume 2022, issue 1
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2110.08324 [pdf, other]
Title: Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17]  arXiv:2110.09495 (cross-list from cs.LG) [pdf, other]
Title: Protecting Anonymous Speech: A Generative Adversarial Network Methodology for Removing Stylistic Indicators in Text
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[18]  arXiv:2110.09469 (cross-list from quant-ph) [pdf, ps, other]
Title: Hybrid PUF: A Novel Way to Enhance the Security of Classical PUFs
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[19]  arXiv:2110.09437 (cross-list from cs.CY) [pdf, other]
Title: Ctrl-Shift: How Privacy Sentiment Changed from 2019 to 2021
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[20]  arXiv:2110.09008 (cross-list from cs.LG) [pdf, other]
Title: When Are Linear Stochastic Bandits Attackable?
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[21]  arXiv:2110.08983 (cross-list from cs.PL) [pdf, other]
Title: An Empirical Study of Protocols in Smart Contracts
Comments: 10 pages. In HATRA 2021
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[22]  arXiv:2110.08932 (cross-list from cs.LG) [pdf, other]
Title: Poisoning Attacks on Fair Machine Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[23]  arXiv:2110.08821 (cross-list from cs.SD) [pdf, other]
Title: Storage and Authentication of Audio Footage for IoAuT Devices Using Distributed Ledger Technology
Comments: 11 pages, 3 Figures, 1 code listing
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[24]  arXiv:2110.08760 (cross-list from cs.LG) [pdf, other]
Title: Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications
Comments: The short version of this paper has been published in the IEEE International Conference on Data Mining (ICDM) 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[25]  arXiv:2110.08712 (cross-list from cs.LG) [pdf, other]
Title: Black-box Adversarial Attacks on Network-wide Multi-step Traffic State Prediction Models
Comments: Accepted to IEEE International Conference on Intelligent Transportation Systems (ITSC), 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[ total of 87 entries: 1-25 | 26-50 | 51-75 | 76-87 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2110, contact, help  (Access key information)