Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for November 2018

Total of 251 entries : 1-25 76-100 101-125 126-150 151-175 176-200 201-225 226-250 ... 251-251
Showing up to 25 entries per page: fewer | more | all
[151] arXiv:1811.10868 [pdf, other]
Title: Sapiens Chain: A Blockchain-based Cybersecurity Framework
Yu Han, Zhongru Wang, Qiang Ruan, Binxing Fang
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:1811.10945 [pdf, other]
Title: A Real-Time Remote IDS Testbed for Connected Vehicles
Valentin Zieglmeier, Severin Kacianka, Thomas Hutzelmann, Alexander Pretschner
Comments: Peer-reviewed version accepted for publication in the proceedings of the 34th ACM/SIGAPP Symposium On Applied Computing (SAC'19)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[153] arXiv:1811.11039 [pdf, other]
Title: 3PS - Online Privacy through Group Identities
Pol Mac Aonghusa, Douglas Leith
Comments: 14 pages
Subjects: Cryptography and Security (cs.CR)
[154] arXiv:1811.11218 [pdf, other]
Title: Undermining User Privacy on Mobile Devices Using AI
Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[155] arXiv:1811.11274 [pdf, other]
Title: The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures
Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu
Subjects: Cryptography and Security (cs.CR)
[156] arXiv:1811.11462 [pdf, other]
Title: Blockchain Enabled Data Marketplace -- Design and Challenges
Prabal Banerjee, Sushmita Ruj
Comments: A version with minor differences has been submitted to IEEE
Subjects: Cryptography and Security (cs.CR)
[157] arXiv:1811.11629 [pdf, other]
Title: Class of scalable parallel and vectorizable pseudorandom number generators based on non-cryptographic RSA exponentiation ciphers
Jetanat Datephanyawat, Paul D. Beale
Comments: 10 pages, 1 figure. arXiv admin note: text overlap with arXiv:1411.2484
Subjects: Cryptography and Security (cs.CR)
[158] arXiv:1811.11645 [pdf, other]
Title: Detecting Token Systems on Ethereum
Michael Fröwis, Andreas Fuchs, Rainer Böhme
Subjects: Cryptography and Security (cs.CR)
[159] arXiv:1811.12028 [pdf, other]
Title: MOBIUS: Model-Oblivious Binarized Neural Networks
Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
Journal-ref: IEEE Access (Volume: 7, Issue:1. 04 September 2019)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[160] arXiv:1811.12040 [pdf, other]
Title: The Power of The Hybrid Model for Mean Estimation
Brendan Avent, Yatharth Dubey, Aleksandra Korolova
Comments: Proceedings on Privacy Enhancing Technologies 2020
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[161] arXiv:1811.12082 [pdf, other]
Title: Joint Service Pricing and Cooperative Relay Communication for Federated Learning
Shaohan Feng, Dusit Niyato, Ping Wang, Dong In Kim, Ying-Chang Liang
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[162] arXiv:1811.12088 [pdf, other]
Title: Functional Analysis Attacks on Logic Locking
Deepak Sirone, Pramod Subramanyan
Subjects: Cryptography and Security (cs.CR)
[163] arXiv:1811.12365 [pdf, other]
Title: (Un)Encrypted Computing and Indistinguishability Obfuscation
Peter T. Breuer, Jonathan P. Bowen
Comments: 2 pages, extended abstract for Principles of Secure Compilation (PriSC'19) at Principles of Programming Languages (POPL'19), Lisbon 2019
Subjects: Cryptography and Security (cs.CR)
[164] arXiv:1811.12620 [pdf, other]
Title: Change Point Models for Real-time V2I Cyber Attack Detection in a Connected Vehicle Environment
Gurcan Comert, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Comments: 7 pages, 1 figure, 2 tables, the 98th Annual Meeting of the Transportation Research Board, January 13-17, 2019
Subjects: Cryptography and Security (cs.CR)
[165] arXiv:1811.12713 [pdf, other]
Title: Security Code Smells in Android ICC
Pascal Gadient, Mohammad Ghafari, Patrick Frischknecht, Oscar Nierstrasz
Comments: Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE), 2018
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[166] arXiv:1811.12740 [pdf, other]
Title: Towards Secure and Efficient Payment Channels
Georgia Avarikioti, Felix Laufenberg, Jakub Sliwinski, Yuyi Wang, Roger Wattenhofer
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[167] arXiv:1811.12775 [pdf, other]
Title: On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market
Max Maass, Nicolas Walter, Dominik Herrmann, Matthias Hollick
Comments: Accepted to Wirtschaftsinformatik 2019
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[168] arXiv:1811.00262 (cross-list from cs.IT) [pdf, other]
Title: Semi-Finite Length Analysis for Information Theoretic Tasks
Masahito Hayashi
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[169] arXiv:1811.00591 (cross-list from stat.AP) [pdf, other]
Title: Defining a Metric Space of Host Logs and Operational Use Cases
Miki E. Verma, Robert A. Bridges
Subjects: Applications (stat.AP); Cryptography and Security (cs.CR)
[170] arXiv:1811.00636 (cross-list from cs.LG) [pdf, other]
Title: Spectral Signatures in Backdoor Attacks
Brandon Tran, Jerry Li, Aleksander Madry
Comments: 16 pages, accepted to NIPS 2018
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[171] arXiv:1811.00741 (cross-list from stat.ML) [pdf, other]
Title: Stronger Data Poisoning Attacks Break Data Sanitization Defenses
Pang Wei Koh, Jacob Steinhardt, Percy Liang
Comments: This paper was first published on arXiv in 2018 and has since been edited for clarity
Journal-ref: Machine Learning, 2021
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[172] arXiv:1811.00866 (cross-list from cs.LG) [pdf, other]
Title: Efficient Neural Network Robustness Certification with General Activation Functions
Huan Zhang, Tsui-Wei Weng, Pin-Yu Chen, Cho-Jui Hsieh, Luca Daniel
Comments: Accepted by NIPS 2018. Huan Zhang and Tsui-Wei Weng contributed equally
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[173] arXiv:1811.01031 (cross-list from cs.LG) [pdf, other]
Title: TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique
Journal-ref: 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), Rhodes, Greece, 2019, pp. 188-193
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[174] arXiv:1811.01057 (cross-list from cs.LG) [pdf, other]
Title: Semidefinite relaxations for certifying robustness to adversarial examples
Aditi Raghunathan, Jacob Steinhardt, Percy Liang
Comments: To appear at NIPS 2018
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[175] arXiv:1811.01213 (cross-list from cs.LG) [pdf, other]
Title: Learning to Defend by Learning to Attack
Haoming Jiang, Zhehui Chen, Yuyang Shi, Bo Dai, Tuo Zhao
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
Total of 251 entries : 1-25 76-100 101-125 126-150 151-175 176-200 201-225 226-250 ... 251-251
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack