Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for January 2018

Total of 170 entries : 1-25 26-50 51-75 76-100 101-125 ... 151-170
Showing up to 25 entries per page: fewer | more | all
[26] arXiv:1801.02062 [pdf, other]
Title: SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Md Nahid Hossain, Sadegh M Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R Sekar, Scott Stoller, VN Venkatakrishnan
Comments: 26th USENIX Security Symposium (USENIX Security 2017)
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1801.02069 [pdf, other]
Title: Privacy-Preserving Aggregate Queries for Optimal Location Selection
Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy
Comments: IEEE Transactions on Dependable and Secure Computing, 2017
Journal-ref: IEEE Transactions on Dependable and Secure Computing, 16(2), 329-343, 2019
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1801.02265 [pdf, other]
Title: Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright
Comments: To appear in the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1801.02318 [pdf, other]
Title: HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection
Li Chen, Salmin Sultana, Ravi Sahita
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[30] arXiv:1801.02330 [pdf, other]
Title: Evaluation of Machine Learning Algorithms for Intrusion Detection System
Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh
Journal-ref: Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[31] arXiv:1801.02332 [pdf, other]
Title: Behavioural Analytics: Beyond Risk-based MFA
Roy Henha Eyono
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1801.02381 [pdf, other]
Title: Benchmarking Crimes: An Emerging Threat in Systems Security
Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:1801.02430 [pdf, other]
Title: A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition
Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi
Journal-ref: Mehran University Research Journal of Engineering and Technology, Mehran University Research Journal of Engineering and Technology, 2018, 37 (1), pp.59-68. http://publications.muet.edu.pk/index.php/muetrj/article/view/100/50
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Quantitative Methods (q-bio.QM)
[34] arXiv:1801.02440 [pdf, other]
Title: How to find a GSMem malicious activity via an AI approach
WeiJun Zhu, ShaoHuan Ban, YongWen Fan
Comments: 4 pages, 4 figures. We'd like to thank arXiv for giving us a chance to correct some typos in previous version of this paper. For examples, the words "FNR" and "FPR" in Fig.4 are marked incorrectly. And they should be replaced with each other. In addition, the experimental result obtained by a BP neural network is another typo in Fig.4. In this version, we check them carefully and correct them
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:1801.02610 [pdf, other]
Title: Generating Adversarial Examples with Adversarial Networks
Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song
Comments: Accepted to IJCAI2018
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[36] arXiv:1801.02612 [pdf, other]
Title: Spatially Transformed Adversarial Examples
Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[37] arXiv:1801.02685 [pdf, other]
Title: P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing
Ehab Zaghloul, Kai Zhou, Jian Ren
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1801.02742 [pdf, other]
Title: A Large Scale Investigation of Obfuscation Use in Google Play
Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1801.02746 [pdf, other]
Title: Fusion of ANN and SVM Classifiers for Network Attack Detection
Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi
Comments: Accepted and presented at the 18th international conference on Sciences and Techniques of Automatic control and computer engineering STA'2017
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[40] arXiv:1801.02780 [pdf, other]
Title: Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos
Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang
Comments: Extended abstract accepted for the 1st Deep Learning and Security Workshop; 5 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41] arXiv:1801.02789 [pdf, other]
Title: An efficient and secure two-party key agreement protocol based on chaotic maps
Nahid Yahyapoor, Hamed Yaghoobian, Manijeh Keshtgari
Comments: 1 figure, 20 Pages
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:1801.02837 [pdf, other]
Title: Malware detection techniques for mobile devices
Bela Amro
Comments: 11 pages, 6 figures
Journal-ref: International Journal of Mobile Network Communications & Telematics ( IJMNCT), vol 7, 2015
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:1801.02850 [pdf, other]
Title: Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
Yongshuai Liu, Jiyu Chen, Hao Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[44] arXiv:1801.02950 [pdf, other]
Title: Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly
Comments: 1ST Deep Learning and Security Workshop (co-located with the 39th IEEE Symposium on Security and Privacy)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[45] arXiv:1801.03074 [pdf, other]
Title: Game of Drones - Detecting Streamed POI from Encrypted FPV Channel
Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici
Comments: this https URL
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:1801.03218 [pdf, other]
Title: IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
Zheng Zhou, Weiming Zhang, Nenghai Yu
Comments: 11 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:1801.03239 [pdf, other]
Title: Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[48] arXiv:1801.03294 [pdf, other]
Title: A First Look at Identity Management Schemes on the Blockchain
Paul Dunphy, Fabien A.P. Petitcolas
Comments: To appear in IEEE Security and Privacy Magazine special issue on "Blockchain Security and Privacy" in 2018
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:1801.03528 [pdf, other]
Title: Applications of Blockchain Technology beyond Cryptocurrency
Mahdi H. Miraz, Maaruf Ali
Journal-ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-6, Vol. 2, No. 1, 1st January 2018, Available: http://aetic.theiaer.org/archive/v2n1/p1.pdf
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1801.03597 [pdf, other]
Title: Secrecy by Witness-Functions on Increasing Protocols
Jaouhar Fattahi, Mohamed Mejri, Hanane Houmani
Journal-ref: The 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2014
Subjects: Cryptography and Security (cs.CR)
Total of 170 entries : 1-25 26-50 51-75 76-100 101-125 ... 151-170
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack