Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for February 2017

Total of 94 entries
Showing up to 2000 entries per page: fewer | more | all
[76] arXiv:1702.03681 (cross-list from cs.NI) [pdf, other]
Title: Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets
Kishore Angrishi
Comments: First draft with 17 pages and 15 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[77] arXiv:1702.03791 (cross-list from cs.SD) [pdf, other]
Title: DNN Filter Bank Cepstral Coefficients for Spoofing Detection
Hong Yu, Zheng-Hua Tan, Zhanyu Ma, Jun Guo
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[78] arXiv:1702.04143 (cross-list from cs.NI) [pdf, other]
Title: TruSDN: Bootstrapping Trust in Cloud Network Infrastructure
Nicolae Paladi, Christian Gehrmann
Comments: SecureComm 2016 12th EAI International Conference on Security and Privacy in Communication Networks October 10-12, 2016 Guangzhou, People's Republic of China
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[79] arXiv:1702.04420 (cross-list from quant-ph) [pdf, other]
Title: Quantum Privacy-Preserving Data Analytics
Shenggang Ying, Mingsheng Ying, Yuan Feng
Comments: 50 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Databases (cs.DB)
[80] arXiv:1702.05148 (cross-list from stat.ML) [pdf, other]
Title: Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies
Elizabeth Hou, Kumar Sricharan, Alfred O. Hero
Journal-ref: IEEE Transactions on Information Forensics and Security ( Volume: 13, Issue: 6, June 2018 )
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81] arXiv:1702.05607 (cross-list from cs.DB) [pdf, other]
Title: End-to-End Differentially-Private Parameter Tuning in Spatial Histograms
Maryam Fanaeepour, Benjamin I. P. Rubinstein
Comments: 13 pages, 11 figures
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[82] arXiv:1702.05760 (cross-list from cs.DS) [pdf, other]
Title: Hypercube LSH for approximate near neighbors
Thijs Laarhoven
Comments: 18 pages, 4 figures
Journal-ref: 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017), pp. 7:1-7:20, 2017
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Computational Geometry (cs.CG); Cryptography and Security (cs.CR)
[83] arXiv:1702.05983 (cross-list from cs.LG) [pdf, other]
Title: Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN
Weiwei Hu, Ying Tan
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[84] arXiv:1702.05997 (cross-list from cs.SE) [pdf, other]
Title: Refinement-based Specification and Security Analysis of Separation Kernels
Yongwang Zhao, David Sanan, Fuyuan Zhang, Yang Liu
Comments: manuscript of accepted paper by IEEE Transactions on Dependable and Secure Computing
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[85] arXiv:1702.06270 (cross-list from cs.CY) [pdf, other]
Title: Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data
Fengli Xu, Zhen Tu, Yong Li, Pengyu Zhang, Xiaoming Fu, Depeng Jin
Comments: 10 pages, 11 figures, accepted in WWW 2017
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[86] arXiv:1702.06595 (cross-list from cs.SY) [pdf, other]
Title: FIRED: Frequent Inertial Resets with Diversification for Emerging Commodity Cyber-Physical Systems
Miguel Arroyo, Hidenori Kobayashi, Simha Sethumadhavan, Junfeng Yang
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[87] arXiv:1702.06612 (cross-list from math.CO) [pdf, other]
Title: Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets
Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson
Comments: 13 pages
Subjects: Combinatorics (math.CO); Cryptography and Security (cs.CR)
[88] arXiv:1702.06763 (cross-list from cs.LG) [pdf, other]
Title: DeepCloak: Masking Deep Neural Network Models for Robustness Against Adversarial Samples
Ji Gao, Beilun Wang, Zeming Lin, Weilin Xu, Yanjun Qi
Comments: adversarial samples, deep neural network
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[89] arXiv:1702.06827 (cross-list from cs.SY) [pdf, other]
Title: Towards Secure and Safe Appified Automated Vehicles
Yunhan Jack Jia, Ding Zhao, Qi Alfred Chen, Z. Morley Mao
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[90] arXiv:1702.07103 (cross-list from cs.PL) [pdf, other]
Title: Discriminating Traces with Time
Saeid Tizpaz-Niari, Pavol Cerny, Bor-Yuh Evan Chang, Sriram Sankaranarayanan, Ashutosh Trivedi
Comments: Published in TACAS 2017
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Machine Learning (cs.LG); Software Engineering (cs.SE)
[91] arXiv:1702.07107 (cross-list from math.NT) [pdf, other]
Title: The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives
H. Gopalakrishna Gadiyar, R. Padma
Comments: 8 pages
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[92] arXiv:1702.07136 (cross-list from cs.NI) [pdf, other]
Title: A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures
Furrakh Shahzad, Maruf Pasha, Arslan Ahmad
Journal-ref: International Journal of Computer Science and Information Security, Vol. 14, No. 12, December 2016
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[93] arXiv:1702.07740 (cross-list from quant-ph) [pdf, other]
Title: Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography
Mario Milicevic, Chen Feng, Lei M. Zhang, P. Glenn Gulak
Comments: 23 pages, 22 figures, 4 tables, 97 references
Journal-ref: npj Quantum Information, vol. 4, article number: 21 (2018)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[94] arXiv:1702.08582 (cross-list from cs.SY) [pdf, other]
Title: Private and Secure Coordination of Match-Making for Heavy-Duty Vehicle Platooning
Farhad Farokhi, Iman Shames, Karl H. Johansson
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
Total of 94 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack