Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for August 2019

Total of 237 entries
Showing up to 2000 entries per page: fewer | more | all
[1] arXiv:1908.00200 [pdf, other]
Title: KiloGrams: Very Large N-Grams for Malware Classification
Edward Raff, William Fleming, Richard Zak, Hyrum Anderson, Bill Finlayson, Charles Nicholas, Mark McLean
Comments: Appearing in LEMINCS @ KDD'19, August 5th, 2019, Anchorage, Alaska, United States
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[2] arXiv:1908.00324 [pdf, other]
Title: Optimal Deployments of Defense Mechanisms for the Internet of Things
Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[3] arXiv:1908.00327 [pdf, other]
Title: Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things
Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, Dong Seong Kim
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:1908.00417 [pdf, other]
Title: A compression based framework for the detection of anomalies in heterogeneous data sources
Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández, David Arroyo
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:1908.00427 [pdf, other]
Title: Bitcoin Security under Temporary Dishonest Majority
Georgia Avarikioti, Lukas Kaeppeli, Yuyi Wang, Roger Wattenhofer
Comments: In Proceedings of Financial Cryptography and Data Security 2019
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:1908.00592 [pdf, other]
Title: The House That Knows You: User Authentication Based on IoT Data
Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh
Comments: 11 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:1908.00686 [pdf, other]
Title: Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection
Di Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:1908.00732 [pdf, other]
Title: Road Context-aware Intrusion Detection System for Autonomous Cars
Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang
Comments: This manuscript presents an intrusion detection system that makes use of road context for autonomous cars
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[9] arXiv:1908.00740 [pdf, other]
Title: Secure Calibration for Safety-Critical IoT: Traceability for Safety Resilience
Ryan Shah, Michael McIntee, Shishir Nagaraja, Sahil Bhandary, Prerna Arote, Joy Kuri
Comments: 21 pages, 4 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[10] arXiv:1908.00929 [pdf, other]
Title: A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems
Loic Lesavre, Priam Varin, Peter Mell, Michael Davidson, James Shook
Comments: 62 pages, U.S. National Institute of Standards and Technology (NIST) Cybersecurity White Paper
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:1908.01051 [pdf, other]
Title: Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem
Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, Thomas Charvat
Comments: 12 pages, 5 figures, Advances in Financial Technologies (AFT 2019)
Subjects: Cryptography and Security (cs.CR)
[12] arXiv:1908.01262 [pdf, other]
Title: A systematic review of fuzzing based on machine learning techniques
Yan Wang, Peng Jia, Luping Liu, Jiayong Liu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13] arXiv:1908.01489 [pdf, other]
Title: The Impact of Developer Experience in Using Java Cryptography
Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz
Comments: The ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[14] arXiv:1908.01549 [pdf, other]
Title: How to Kill Symbolic Deobfuscation for Free; or Unleashing the Potential of Path-Oriented Protections
Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion
Comments: 17 pages + 7 pages of references and annexes
Subjects: Cryptography and Security (cs.CR)
[15] arXiv:1908.01551 [pdf, other]
Title: Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[16] arXiv:1908.01763 [pdf, other]
Title: TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, Dawn Song
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17] arXiv:1908.01897 [pdf, other]
Title: On the security of ballot marking devices
Dan S. Wallach
Comments: Major revision relative to the August draft
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:1908.01928 [pdf, other]
Title: AppMine: Behavioral Analytics for Web Application Vulnerability Detection
Indranil Jana, Alina Oprea
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:1908.02110 [pdf, other]
Title: Threshold Changeable Secret Sharing Scheme and Its Application to Group Authentication
Fuyou Miao, Yue Yu, Keju Meng, Wenchao Huang, Yan Xiong
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:1908.02118 [pdf, other]
Title: A Public Network Trace of a Control and Automation System
Gorby Kabasele Ndonda, Ramin Sadre
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[21] arXiv:1908.02204 [pdf, other]
Title: Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks
Avinash Sudhodanan, Soheil Khodayari, Juan Caballero
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:1908.02205 [pdf, other]
Title: After You, Please: Browser Extensions Order Attacks and Countermeasures
Pablo Picazo-Sanchez, Juan Tapiador, Gerardo Schneider
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:1908.02261 [pdf, other]
Title: Who's Tracking Sensitive Domains?
Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[24] arXiv:1908.02327 [pdf, other]
Title: Proof of All: Verifiable Computation in a Nutshell
Mario Alessandro Barbara
Comments: 71 pages, 1 figure, MSc. Thesis Eötvös Loránd University (in collaboration with University of Twente through European Institue of Technology Master School scholarship)
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:1908.02392 [pdf, other]
Title: Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids
Subhash Lakshminarayana, E. Veronica Belmega, H. Vincent Poor
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[26] arXiv:1908.02443 [pdf, other]
Title: Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts
Rujia Li, David Galindo, Qi Wang
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:1908.02444 [pdf, other]
Title: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:1908.02449 [pdf, other]
Title: Open Dataset of Phishing and Tor Hidden Services Screen-captures
Vincent Falconieri
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:1908.02487 [pdf, other]
Title: Secure Open Federation of IoT Platforms Through Interledger Technologies -- The SOFIE Approach
Dmitrij Lagutin, Francesco Bellesini, Tommaso Bragatto, Alessio Cavadenti, Vincenzo Croce, Yki Kortesniemi, Helen C. Leligou, Yannis Oikonomidis, George C. Polyzos, Giuseppe Raveduto, Francesca Santori, Panagiotis Trakadas, Matteo Verber
Comments: 5 pages. European Conference on Networking and Communications 2019 (EuCNC 2019)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[30] arXiv:1908.02524 [pdf, other]
Title: Cross-Router Covert Channels
Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren
Comments: Presented at WOOT 2019 - this https URL
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:1908.02553 [pdf, other]
Title: Security measurement of a medical communication scheme based on chaos and DNA coding
Lei Chen, Chengqing Li, Chao Li
Comments: 17 pages, 9 figures, 8 tables
Journal-ref: Journal of Visual Communication and Image Representation, vol. 83, art. no. 103424, 2022
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:1908.02658 [pdf, other]
Title: Random Directional Attack for Fooling Deep Neural Networks
Wenjian Luo, Chenwang Wu, Nan Zhou, Li Ni
Comments: 13pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[33] arXiv:1908.02784 [pdf, other]
Title: Multi-owner Secure Encrypted Search Using Searching Adversarial Networks
Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu
Comments: The 18th International Conference on Cryptology and Network Security. Fixed minor issues with the conference version, such as spelling errors and ambiguities in the content description
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[34] arXiv:1908.02941 [pdf, other]
Title: VisJSClassificator -- Manual Visual Collaborative Classification Graph-based Tool
Vincent Falconieri
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[35] arXiv:1908.02946 [pdf, other]
Title: Bootstrapping a stable computation token
Jason Teutsch, Sami Mäkelä, Surya Bakshi
Comments: 2 figures
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Theoretical Economics (econ.TH)
[36] arXiv:1908.03260 [pdf, other]
Title: De-anonymization Attacks on Neuroimaging Datasets
Vikram Ravindra, Ananth Grama
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV); Neurons and Cognition (q-bio.NC)
[37] arXiv:1908.03296 [pdf, other]
Title: That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers
Sean Oesch, Scott Ruoti
Comments: Appearing at USENIX Security 2020
Subjects: Cryptography and Security (cs.CR)
[38] arXiv:1908.03369 [pdf, other]
Title: Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems
Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe
Comments: 16 pages, to appear in the 36th Annual Computer Security Applications Conference (ACSAC 2020)
Journal-ref: In the 36th Annual Computer Security Applications Conference (ACSAC 2020)
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:1908.03383 [pdf, other]
Title: Advanced profiling for probabilistic Prime+Probe attacks and covert channels in ScatterCache
Antoon Purnal, Ingrid Verbauwhede
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:1908.03443 [pdf, other]
Title: Tracking Temporal Evolution of Network Activity for Botnet Detection
Kapil Sinha, Arun Viswanathan, Julian Bunn
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41] arXiv:1908.03446 [pdf, other]
Title: Privacy-Aware Distributed Mobility Choice Modelling over Blockchain
David Lopez, Bilal Farooq
Comments: Accepted in the proceedings of IEEE International Smart Cities Conference
Subjects: Cryptography and Security (cs.CR); Econometrics (econ.EM)
[42] arXiv:1908.03449 [pdf, other]
Title: Carl-Hauser -- Open Source Image Matching Algorithms Benchmarking Framework
Vincent Falconieri
Subjects: Cryptography and Security (cs.CR)
[43] arXiv:1908.03536 [pdf, other]
Title: Security in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges
Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez, Michael Taynnan Barros, Sasitharan Balasubramaniam
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[44] arXiv:1908.03632 [pdf, other]
Title: Emotionless: Privacy-Preserving Speech Analysis for Voice Assistants
Ranya Aloufi, Hamed Haddadi, David Boyle
Comments: 5 pages, 4 figures, privacy Preserving Machine Learning Workshop, CCS 2019
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS); Machine Learning (stat.ML)
[45] arXiv:1908.03638 [pdf, other]
Title: Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded Systems
Wei Zhou, Le Guan, Peng Liu, Yuqing Zhang
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[46] arXiv:1908.03640 [pdf, other]
Title: Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)
Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse
Comments: 13 pages
Journal-ref: 20th World Conference on Information Security Applications (WISA 2019)
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Computers and Society (cs.CY); Machine Learning (cs.LG)
[47] arXiv:1908.03668 [pdf, other]
Title: Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Sahan Ahmad, SM Zobaed, Raju Gottumukkala, Mohsen Amini Salehi
Comments: High Performance Computing and Communications (HPCC '19)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[48] arXiv:1908.03715 [pdf, other]
Title: Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics
Zhili Chen, Xiaoli Kan, Shun Zhang, Lin Chen, Yan Xu, Hong Zhong
Comments: 13 pages,12 figures
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[49] arXiv:1908.03718 [pdf, other]
Title: Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose
Zhili Chen
Journal-ref: Crypto 2016 submission
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:1908.03748 [pdf, other]
Title: Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
Kyung Ho Park, Eunjo Lee, Huy Kang Kim
Comments: 10 pages, 1 figure, 5 tables, In Proceedings of the 20th World Conference on Information Security and Applications (WISA) 2019
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[51] arXiv:1908.03819 [pdf, other]
Title: RISC-V: #AlphanumericShellcoding
Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache
Comments: 25 pages, originally published at WOOT'19
Subjects: Cryptography and Security (cs.CR)
[52] arXiv:1908.03898 [pdf, other]
Title: Digitally Mutating NV-FPGAs into Physically Clone-Resistant Units
Ayoub Mars, Wael Adi
Comments: 16 pages, 17 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:1908.03925 [pdf, other]
Title: A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects
Satwik Patnaik, Mohammed Ashraf, Ozgur Sinanoglu, Johann Knechtel
Comments: Accepted for IEEE TETC
Subjects: Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[54] arXiv:1908.03964 [pdf, other]
Title: Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices
Matthias Niedermaier, Martin Striegel, Felix Sauer, Dominik Merli, Georg Sigl
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:1908.03995 [pdf, other]
Title: Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon
Farhad Farokhi
Journal-ref: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)
Subjects: Cryptography and Security (cs.CR); Theoretical Economics (econ.TH); Signal Processing (eess.SP); Systems and Control (eess.SY)
[56] arXiv:1908.03999 [pdf, other]
Title: Retrofitting a two-way peg between blockchains
Jason Teutsch, Michael Straka, Dan Boneh
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO); Theoretical Economics (econ.TH)
[57] arXiv:1908.04014 [pdf, other]
Title: Douglas-Quaid -- Open Source Image Matching Library
Vincent Falconieri
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[58] arXiv:1908.04133 [pdf, other]
Title: A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices
Matthias Niedermaier, Dominik Merli, Georg Sigl
Journal-ref: 2019 8th Mediterranean Conference on Embedded Computing (MECO)
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:1908.04172 [pdf, other]
Title: nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:1908.04193 [pdf, other]
Title: Identifying and characterizing ZMap scans: a cryptanalytic approach
Johan Mazel, Rémi Strullu
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:1908.04451 [pdf, other]
Title: Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices
Abdulrahman Alreshidi
Comments: International Journal of Computer Science and Telecommunications [Volume 9, Issue 6, November 2018]
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[62] arXiv:1908.04502 [pdf, other]
Title: A Simple and Intuitive Algorithm for Preventing Directory Traversal Attacks
Michael Flanders
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:1908.04507 [pdf, other]
Title: A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses
Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu
Comments: 29 pages
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:1908.04613 [pdf, other]
Title: Blockchain Tree for eHealth
Sergii Kushch, Silvio Ranise, Giada Sciarretta
Journal-ref: 2019 IEEE Global Conference on Internet of Things (GCIoT), Dubai, United Arab Emirates, 2019, pp. 1-5
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:1908.04756 [pdf, other]
Title: A scalable verification solution for blockchains
Jason Teutsch, Christian Reitwießner
Subjects: Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[66] arXiv:1908.04856 [pdf, other]
Title: Exploit Prediction Scoring System (EPSS)
Jay Jacobs, Sasha Romanosky, Benjamin Edwards, Michael Roytman, Idris Adjerid
Comments: 25 pages, 8 figures, 7 tables, Presented at Blackhat 2019
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:1908.04867 [pdf, other]
Title: Post-Incident Audits on Cyber Insurance Discounts
Sakshyam Panda, Daniel W Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:1908.04920 [pdf, other]
Title: Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability
Shaowei Wang, Jiachun Du, Wei Yang, Xinrong Diao, Zichun Liu, Yiwen Nie, Liusheng Huang, Hongli Xu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[69] arXiv:1908.04947 [pdf, other]
Title: Risk-Limiting Tallies
Wojciech Jamroga, Peter B. Roenne, Peter Y. A. Ryan, Philip B. Stark
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Applications (stat.AP)
[70] arXiv:1908.04954 [pdf, other]
Title: Taking a Lesson from Quantum Particles for Statistical Data Privacy
Farhad Farokhi
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Quantum Physics (quant-ph)
[71] arXiv:1908.04960 [pdf, other]
Title: ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
SM Zobaed, Sahan Ahmad, Raju Gottumukkala, Mohsen Amini Salehi
Comments: High Performance Computing and Communications (HPCC '19)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72] arXiv:1908.04998 [pdf, other]
Title: Interpretable Encrypted Searchable Neural Networks
Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu
Comments: The Second International Conference on Machine Learning for Cyber Security (ML4CS 2019). Keyword: Searchable Encryption; Searchable Neural Networks; Probabilistic Learning; Adversarial Learning; Automatic Weight Update
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[73] arXiv:1908.05004 [pdf, other]
Title: Stop the Open Data Bus, We Want to Get Off
Chris Culnane, A/Benjamin I. P. Rubinstein, A/Vanessa Teague
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:1908.05012 [pdf, other]
Title: Side-Channel Aware Fuzzing
Philip Sperl, Konstantin Böttinger
Comments: The final authenticated version is available online at: this https URL
Journal-ref: K. Sako et al. (Eds.): ESORICS 2019, LNCS 11735, pp. 1-20, 2019
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:1908.05021 [pdf, other]
Title: Complexity of universal access structures
Laszlo Csirmaz
Journal-ref: Information Processing Letters, Volume 112 Issue 4, February, 2012, Pages 149-152
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[76] arXiv:1908.05077 [pdf, other]
Title: Fog Computing Systems: State of the Art, Research Issues and Future Trends, with a Focus on Resilience
Jose Moura, David Hutchison
Comments: 38 pages, 3 figures, 5 tables, 192 references, this version was resubmitted to a journal
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[77] arXiv:1908.05127 [pdf, other]
Title: Breaking the encryption scheme of the Moscow Internet voting system
Pierrick Gaudry (CARAMBA), Alexander Golovnev
Comments: This work is a merger of arXiv:1908.09170 and arXiv:1908.05127
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:1908.05310 [pdf, other]
Title: Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Ruffin White, Gianluca Caiazza, Chenxu Jiang, Xinyue Ou, Zhiyue Yang, Agostino Cortesi, Henrik Christensen
Comments: 10 pages, 7 figures, 1 algorithm, 10 sections plus references
Journal-ref: Workshop on Software Security for Internet of Things (SSIoT) at IEEE EuroS&P 2019
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[79] arXiv:1908.05354 [pdf, other]
Title: Large-Scale-Exploit of GitHub Repository Metadata and Preventive Measures
David Knothe, Frederick Pietschmann
Comments: Added references
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:1908.05366 [pdf, other]
Title: Systematization of Knowledge and Implementation: Short Identity-Based Signatures
Diptendu M. Kar, Indrajit Ray
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:1908.05459 [pdf, other]
Title: Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences
Sami Kairajärvi, Andrei Costin, Timo Hämäläinen
Comments: 11 pages, 4 figures, 11 tables, 2 listings
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:1908.05570 [pdf, other]
Title: Straggling for Covert Message Passing on Complete Graphs
Pei Peng, Nikolas Melissaris, Emina Soljanin, Bill Lee, Huafeng Fan, Anton Maliev
Comments: This paper is accepted by "57th Annual Allerton Conference on Communication, Control, and Computing"
Subjects: Cryptography and Security (cs.CR)
[83] arXiv:1908.05759 [pdf, other]
Title: Similarity-based Android Malware Detection Using Hamming Distance of Static Binary Features
Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti
Comments: 20 pages, 8 figures, 11 tables, FGCS Elsevier journal
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[84] arXiv:1908.05897 [pdf, other]
Title: All About Phishing: Exploring User Research through a Systematic Literature Review
Sanchari Das, Andrew Kim, Zachary Tingle, Christena Nippert-Eng
Comments: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[85] arXiv:1908.05901 [pdf, other]
Title: Evaluating User Perception of Multi-Factor Authentication: A Systematic Review
Sanchari Das, Bingxing Wang, Zachary Tingle, L. Jean Camp
Comments: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[86] arXiv:1908.05902 [pdf, other]
Title: MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content
Sanchari Das, Bingxing Wang, L. Jean Camp
Comments: Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[87] arXiv:1908.05945 [pdf, other]
Title: Toward an Attribute-Based Digital Identity Modeling for Privacy Preservation
Ibou Sene
Subjects: Cryptography and Security (cs.CR)
[88] arXiv:1908.05994 [pdf, other]
Title: The Next 700 Policy Miners: A Universal Method for Building Policy Miners
Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin
Comments: Full version of the paper accepted to CCS'19
Subjects: Cryptography and Security (cs.CR)
[89] arXiv:1908.06148 [pdf, other]
Title: FiFTy: Large-scale File Fragment Type Identification using Neural Networks
Govind Mittal, Pawel Korus, Nasir Memon
Comments: Paper accepted for publication in the IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[90] arXiv:1908.06891 [pdf, other]
Title: Weil descent and cryptographic trilinear maps
Ming-Deh A. Huang
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[91] arXiv:1908.06921 [pdf, other]
Title: 3D Marketplace: Distributed Attestation of 3D Designs on Blockchain
Sofia Belikovetsky, Oded Leiba, Asaf Shabtai, Yuval Elovici
Subjects: Cryptography and Security (cs.CR)
[92] arXiv:1908.06964 [pdf, other]
Title: PPT: New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues. A Set of Three Companion Manuscripts
Dhananjay Phatak, Alan T. Sherman, Steven D. Houston, Andrew Henry
Comments: a set of 3 companion articles.217 (two hundred and seventeen) pages including everything = table of contents, list of figures, list of tables and an acknowledgment at the end. There is no watermark or highlighted text. Only color is in hyper-links and figures
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS); Symbolic Computation (cs.SC); Number Theory (math.NT)
[93] arXiv:1908.06967 [pdf, other]
Title: Detection of Shilling Attack Based on T-distribution on the Dynamic Time Intervals in Recommendation Systems
Wanqiao Yuan, Yingyuan Xiao, Xu Jiao, Wenguang Zheng, Zihao Ling
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[94] arXiv:1908.06968 [pdf, other]
Title: A Novel Kalman Filter Based Shilling Attack Detection Algorithm
Xin Liu, Yingyuan Xiao, Xu Jiao, Wenguang Zheng, Zihao Ling
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[95] arXiv:1908.06970 [pdf, other]
Title: Agent-based (BDI) modeling for automation of penetration testing
Ge Chu, Alexei Lisitsa
Subjects: Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[96] arXiv:1908.06972 [pdf, other]
Title: PrivFT: Private and Fast Text Classification with Homomorphic Encryption
Ahmad Al Badawi, Luong Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung
Comments: 13 pages, 3 figures, 4 tables, 5 Algorithms
Journal-ref: IEEE Access, 2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[97] arXiv:1908.07000 [pdf, other]
Title: Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian
Comments: USENIX Security 2020 camera-ready version, Code available at: this https URL
Subjects: Cryptography and Security (cs.CR)
[98] arXiv:1908.07159 [pdf, other]
Title: MicroTEE: Designing TEE OS Based on the Microkernel Architecture
Dongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan
Comments: 8 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[99] arXiv:1908.07366 [pdf, other]
Title: The Uniformed Patroller Game
Steve Alpern, Paul Chleboun, Stamatios Katsikas
Comments: arXiv admin note: substantial text overlap with arXiv:1908.01859
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[100] arXiv:1908.07458 [pdf, other]
Title: Undeniable signatures based on isogenies of supersingular hyperelliptic curves
Ramsès Fernàndez-València
Comments: arXiv admin note: text overlap with arXiv:1907.00475
Subjects: Cryptography and Security (cs.CR)
[101] arXiv:1908.07581 [pdf, other]
Title: Realistic versus Rational Secret Sharing
Yvo Desmedt, Arkadii Slinko
Comments: This is a preliminary version of a paper accepted for GameSec 2019
Subjects: Cryptography and Security (cs.CR); Theoretical Economics (econ.TH)
[102] arXiv:1908.07701 [pdf, other]
Title: A Novel Privacy-Preserving Deep Learning Scheme without Using Cryptography Component
Chin-Yu Sun, Allen C.-H. Wu, TingTing Hwang
Comments: Submit to CAEE
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[103] arXiv:1908.07828 [pdf, other]
Title: IoT Supply Chain Security: Overview, Challenges, and the Road Ahead
Muhammad Junaid Farooq, Quanyan Zhu
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[104] arXiv:1908.07835 [pdf, other]
Title: Memory Forensic Analysis of MQTT Devices
Anal Shah, Palak Rajdev, Jaidip Kotak
Comments: 4 pages, 7 figures, 2 tables
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:1908.07886 [pdf, other]
Title: Detecting Fraudulent Accounts on Blockchain: A Supervised Approach
Michal Ostapowicz, Kamil Żbikowski
Subjects: Cryptography and Security (cs.CR)
[106] arXiv:1908.07915 [pdf, other]
Title: Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation
Takahiro Maekawa, Ayana Kawamura, Takayuki Nakachi, Hitoshi Kiya
Comments: to be published in IEICE Trans. Fundamentals. arXiv admin note: substantial text overlap with arXiv:1809.07055
Subjects: Cryptography and Security (cs.CR)
[107] arXiv:1908.07976 [pdf, other]
Title: A Multi-level Clustering Approach for Anonymizing Large-Scale Physical Activity Data
Pooja Parameshwarappa (1), Zhiyuan Chen (1), Gunes Koru (1) ((1) University of Maryland Baltimore County)
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:1908.08112 [pdf, other]
Title: Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control
Maanak Gupta, James Benson, Farhan Patwa, Ravi Sandhu
Subjects: Cryptography and Security (cs.CR)
[109] arXiv:1908.08503 [pdf, other]
Title: Blockchain based access control systems: State of the art and challenges
Sara Rouhani, Ralph Deters
Comments: accepted in IEEE/WIC/ACM International Conference on Web Intelligence
Subjects: Cryptography and Security (cs.CR)
[110] arXiv:1908.08605 [pdf, other]
Title: Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey
Purathani Praitheeshan, Lei Pan, Jiangshan Yu, Joseph Liu, Robin Doss
Comments: 21 pages, 9 figures
Subjects: Cryptography and Security (cs.CR)
[111] arXiv:1908.08737 [pdf, other]
Title: Design choices for productive, secure, data-intensive research at scale in the cloud
Diego Arenas, Jon Atkins, Claire Austin, David Beavan, Alvaro Cabrejas Egea, Steven Carlysle-Davies, Ian Carter, Rob Clarke, James Cunningham, Tom Doel, Oliver Forrest, Evelina Gabasova, James Geddes, James Hetherington, Radka Jersakova, Franz Kiraly, Catherine Lawrence, Jules Manser, Martin T. O'Reilly, James Robinson, Helen Sherwood-Taylor, Serena Tierney, Catalina A. Vallejos, Sebastian Vollmer, Kirstie Whitaker
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:1908.08744 [pdf, other]
Title: Building Critical Applications using Microservices
Christof Fetzer
Comments: 4 pages, 2 figures
Journal-ref: IEEE Security Privacy, Vol 14, No 6, 2016
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:1908.09032 [pdf, other]
Title: Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption
Vipin Singh Sehrawat, Yvo Desmedt
Comments: This is the full version of the paper that appears in Cryptology and Network Security 2019, LNCS, Springer, Volume 11829, pp. 3-23
Journal-ref: Cryptology and Network Security 2019, LNCS, Springer, Volume 11829, pp. 3-23
Subjects: Cryptography and Security (cs.CR)
[114] arXiv:1908.09058 [pdf, other]
Title: Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges
Dinh C Nguyen, Pubudu N Pathirana, Ming Ding, Aruna Seneviratne
Comments: Accepted by IEEE Communications Surveys & Tutorials, 29 pages
Subjects: Cryptography and Security (cs.CR)
[115] arXiv:1908.09085 [pdf, other]
Title: Adaptive Group-based Zero Knowledge Proof-Authentication Protocol (AGZKP-AP) in Vehicular Ad Hoc Networks
Amar A. Rasheed, Rabi N. Mahapatra, Felix G. Hamza-Lup
Journal-ref: IEEE Intelligent Transportation Systems (2019)
Subjects: Cryptography and Security (cs.CR)
[116] arXiv:1908.09165 [pdf, other]
Title: Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information
Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[117] arXiv:1908.09168 [pdf, other]
Title: A Novel Method to Generate Key-Dependent S-Boxes with Identical Algebraic Properties
Ahmad Y. Al-Dweik, Iqtadar Hussain, Moutaz S. Saleh, M. T. Mustafa
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[118] arXiv:1908.09170 [pdf, other]
Title: An Attack on the the Encryption Scheme of the Moscow Internet Voting System
Alexander Golovnev
Comments: This paper has been superseded by arXiv:1908.05127v2 (merged from arXiv:1908.09170 and arXiv:1908.05127)
Subjects: Cryptography and Security (cs.CR)
[119] arXiv:1908.09204 [pdf, other]
Title: Precise system-wide concatic malware unpacking
David Korczynski
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:1908.09210 [pdf, other]
Title: That's Not Me! Designing Fictitious Profiles to Answer Security Questions
Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage
Comments: 5
Journal-ref: USENIX Symposium on Usable Privacy and Security (SOUPS), August 11-13, 2019 Santa Clara, CA, USA
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[121] arXiv:1908.09232 [pdf, other]
Title: Internet of Things Enabled Policing Processes
Francesco Schiliro
Comments: arXiv admin note: text overlap with arXiv:1412.6638, arXiv:1612.03277 by other authors
Journal-ref: Master Thesis, June 2019
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[122] arXiv:1908.09343 [pdf, other]
Title: HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu
Comments: An extended version of the material published in ACM CCS 2019
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:1908.09407 [pdf, other]
Title: SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing
Josef Danial, Debayan Das, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:1908.09422 [pdf, other]
Title: Feedback linearly extended discrete functions
Claude Gravel, Daniel Panario
Comments: Accepted on October 4th, 2021 in Journal of Algebra and its Applications (World Scientific Publishing)
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[125] arXiv:1908.09444 [pdf, other]
Title: Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks
Monowar Hasan, Sibin Mohan
Comments: 2nd Workshop on the Internet of Things Security and Privacy - Iot S&P'19, November 15, 2019, London, United Kingdom. ACM ISBN: 978-1-4503-6838-4/19/11
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[126] arXiv:1908.09557 [pdf, other]
Title: OpenVoting: Recoverability from Failures in Dual Voting
Prashant Agrawal, Kabir Tomer, Abhinav Nakarmi, Mahabir Prasad Jhanwar, Subodh Sharma, Subhashis Banerjee
Journal-ref: E-Vote-ID 2023. Lecture Notes in Computer Science, vol 14230
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[127] arXiv:1908.09564 [pdf, other]
Title: Towards Blockchain-enabled Searchable Encryption
Qiang Tang
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:1908.09585 [pdf, other]
Title: Towards a Supply Chain Management System for Counterfeit Mitigation using Blockchain and PUF
Leonardo Aniello, Basel Halak, Peter Chai, Riddhi Dhall, Mircea Mihalea, Adrian Wilczynski
Comments: 33 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[129] arXiv:1908.09894 [pdf, other]
Title: Airport Cyber Security and Cyber Resilience Controls
Alex R Mathew
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[130] arXiv:1908.09902 [pdf, other]
Title: Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: An analysis of real-world data
Elad Yom-Tov, Nir Levy, Amir Rubin
Comments: 9 pages, 2 figure, 2 tables
Subjects: Cryptography and Security (cs.CR)
[131] arXiv:1908.09935 [pdf, other]
Title: No Peeking through My Windows: Conserving Privacy in Personal Drones
Alem Fitwi, Yu Chen, Sencun Zhu
Comments: To be presented at The Fifth IEEE Annual International Smart Cities Conference (ISC2 2019), Casablanca, Morocco, October 2019
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[132] arXiv:1908.10020 [pdf, other]
Title: Again, random numbers fall mainly in the planes: xorshift128+ generators
Hiroshi Haramoto, Makoto Matsumoto
Subjects: Cryptography and Security (cs.CR)
[133] arXiv:1908.10033 [pdf, other]
Title: IoT Notary: Sensor Data Attestation in Smart Environment
Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani
Comments: Accepted in IEEE International Symposium on Network Computing and Applications (NCA), 2019
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR)
[134] arXiv:1908.10141 [pdf, other]
Title: Eclipsing Ethereum Peers with False Friends
Sebastian Henningsen, Daniel Teunis, Martin Florian, Björn Scheuermann
Comments: Extended version of the original publication in: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[135] arXiv:1908.10167 [pdf, other]
Title: A characterisation of system-wide propagation in the malware landscape
David Korczynski
Subjects: Cryptography and Security (cs.CR)
[136] arXiv:1908.10201 [pdf, other]
Title: Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems
Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Yu Zhou, Guohua Shen, Changbo Ke
Subjects: Cryptography and Security (cs.CR)
[137] arXiv:1908.10229 [pdf, other]
Title: A Security-Aware Access Model for Data-Driven EHR System
Ngoc Hong Tran, Thien-An Nguyen-Ngoc, Nhien-An Le-Khac, M-Tahar Kechadi
Comments: 13 pages, 12 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[138] arXiv:1908.10271 [pdf, other]
Title: TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction
Yi Zeng, Zihao Qi, Wencheng Chen, Yanzhe Huang, Xingxin Zheng, Han Qiu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[139] arXiv:1908.10320 [pdf, other]
Title: Authenticated Hand-Over Algorithm for Group Communication
Yucel Aydin, Gunes Karabulut Kurt, Enver Ozdemır
Subjects: Cryptography and Security (cs.CR)
[140] arXiv:1908.10321 [pdf, other]
Title: Authentication and Hand-Over Algorithms for IoT Group
Yucel Aydin, Gunes Karabulut Kurt, Enver Ozdemır
Subjects: Cryptography and Security (cs.CR)
[141] arXiv:1908.10497 [pdf, other]
Title: On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode
Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu
Subjects: Cryptography and Security (cs.CR)
[142] arXiv:1908.10558 [pdf, other]
Title: On Inferring Training Data Attributes in Machine Learning Models
Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar
Comments: Accepted by PPML'19, a CCS workshop. Submission of 4-pages bar references, and appendix V2: Update in dataset splitting, and comments on related works
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[143] arXiv:1908.10730 [pdf, other]
Title: Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices
Peter M. VanNostrand, Ioannis Kyriazis, Michelle Cheng, Tian Guo, Robert J. Walls
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[144] arXiv:1908.10781 [pdf, other]
Title: An Eye for an Eye: Economics of Retaliation in Mining Pools
Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim
Comments: This paper is accepted to ACM AFT 2019
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[145] arXiv:1908.10944 [pdf, other]
Title: Immutable Log Storage as a Service
William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy Miranskyy
Journal-ref: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings , 2019
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[146] arXiv:1908.11010 [pdf, other]
Title: Cyber security insights into self-proclaimed virtual world hackers
Nicholas Patterson, Michael Hobbs, Frank Jiang, Lei Pan
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR)
[147] arXiv:1908.11096 [pdf, other]
Title: Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation
Masahiro Kamimura, Naoto Yanai, Shingo Okamura, Jason Paul Cruz
Journal-ref: IEEE Access (Volume: 8, Issue:1. 20 January 2020)
Subjects: Cryptography and Security (cs.CR)
[148] arXiv:1908.11315 [pdf, other]
Title: How Much Does GenoGuard Really "Guard"? An Empirical Analysis of Long-Term Security for Genomic Data
Bristena Oprisanu, Christophe Dessimoz, Emiliano De Cristofaro
Journal-ref: Proceedings of the 18th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2019)
Subjects: Cryptography and Security (cs.CR)
[149] arXiv:1908.11358 [pdf, other]
Title: On the Power of Multiple Anonymous Messages
Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker
Comments: 70 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[150] arXiv:1908.11451 [pdf, other]
Title: Fairness-Aware Process Mining
Mahnaz Sadat Qafari, Wil van der Aalst
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[151] arXiv:1908.11515 [pdf, other]
Title: Improving Utility and Security of the Shuffler-based Differential Privacy
Tianhao Wang, Bolin Ding, Min Xu, Zhicong Huang, Cheng Hong, Jingren Zhou, Ninghui Li, Somesh Jha
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[152] arXiv:1908.11538 [pdf, other]
Title: IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain
Rourab Paul, Nimisha Ghosh, Suman Sau, Amlan Chakrabarti, Prasant Mahapatra
Comments: Manuscript
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[153] arXiv:1908.11568 [pdf, other]
Title: Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud
Aastha Mehta, Mohamed Alzayat, Roberta de Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg
Subjects: Cryptography and Security (cs.CR)
[154] arXiv:1908.11680 [pdf, other]
Title: Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation
Robert Buhren, Christian Werling, Jean-Pierre Seifert
Subjects: Cryptography and Security (cs.CR)
[155] arXiv:1908.11752 [pdf, other]
Title: Manipulation of Perceived Politeness in a Web-based Email Discourse Through a Malicious Browser Extension
Filipo Sharevski, Paige Treebridge, Jessica Westbrook
Journal-ref: ACM New Security Paradigms Workshop NSPW 2019
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[156] arXiv:1908.11808 [pdf, other]
Title: On the Ethereum Blockchain Structure: a Complex Networks Theory Perspective
Stefano Ferretti, Gabriele D'Angelo
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[157] arXiv:1908.11810 [pdf, other]
Title: StairDag: Cross-DAG Validation For Scalable BFT Consensus
Quan Nguyen, Andre Cronje, Michael Kong, Alex Kampa, George Samman
Comments: arXiv admin note: substantial text overlap with arXiv:1907.03655
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[158] arXiv:1908.11811 [pdf, other]
Title: Agent-based Simulation of Blockchains
Edoardo Rosa, Gabriele D'Angelo, Stefano Ferretti
Comments: Proceedings of the 19-th Asia Simulation Conference (AsiaSim 2019)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA)
[159] arXiv:1908.00195 (cross-list from cs.LG) [pdf, other]
Title: Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam
Comments: 15 pages; 20 figures; 3 tables; preprint of a paper accepted for publication in IEEE Trans. Cognitive Commun. Netw
Journal-ref: IEEE Trans. Cognitive Commun. Netw., vol. 7, no. 1, pp. 239-254, Mar. 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP); Machine Learning (stat.ML)
[160] arXiv:1908.00226 (cross-list from cs.IT) [pdf, other]
Title: Pilot-Based Channel Estimation Design in Covert Wireless Communication
Tingzhen Xu, Linlin Sun, Shihao Yan, Jinsong Hu, Feng Shu
Comments: 6 pages, 3 figures
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[161] arXiv:1908.00635 (cross-list from cs.NI) [pdf, other]
Title: Black-box Adversarial ML Attack on Modulation Classification
Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[162] arXiv:1908.00666 (cross-list from cs.CY) [pdf, other]
Title: Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related To The Medical Internet Of Things (MIoT)
George W. Jackson Jr., Shawon Rahman
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[163] arXiv:1908.00780 (cross-list from stat.ML) [pdf, other]
Title: Differential Privacy for Sparse Classification Learning
Puyu Wang, Hai Zhang
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[164] arXiv:1908.01059 (cross-list from cs.LG) [pdf, other]
Title: Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation
Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA); Systems and Control (eess.SY); Machine Learning (stat.ML)
[165] arXiv:1908.01127 (cross-list from quant-ph) [pdf, other]
Title: Generalized security analysis framework for continuous-variable quantum key distribution
Vladyslav C. Usenko
Comments: 4 pages, 2 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[166] arXiv:1908.01165 (cross-list from cs.LG) [pdf, other]
Title: Exploring the Robustness of NMT Systems to Nonsensical Inputs
Akshay Chaturvedi, Abijith KP, Utpal Garain
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[167] arXiv:1908.01219 (cross-list from cs.LG) [pdf, other]
Title: On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[168] arXiv:1908.01297 (cross-list from cs.SI) [pdf, other]
Title: A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models
Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Wenwu Zhu, Junzhou Huang
Comments: Accepted by the AAAI 2020
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[169] arXiv:1908.01405 (cross-list from cs.NI) [pdf, other]
Title: Programmable In-Network Security for Context-aware BYOD Policies
Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[170] arXiv:1908.01454 (cross-list from cs.SD) [pdf, other]
Title: V2S attack: building DNN-based voice conversion from automatic speaker verification
Taiki Nakamura, Yuki Saito, Shinnosuke Takamichi, Yusuke Ijima, Hiroshi Saruwatari
Comments: 5 pages, 2 figures, accepted for The 10th ISCA Speech Synthesis Workshop (SSW10)
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[171] arXiv:1908.01483 (cross-list from cs.MM) [pdf, other]
Title: Image Steganography using Gaussian Markov Random Field Model
Wenkang Su, Jiangqun Ni, Yuanfeng Pan, Xianglei Hu, Yun-Qing Shi
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[172] arXiv:1908.01979 (cross-list from eess.SY) [pdf, other]
Title: Non-Invasive Reverse Engineering of Finite State Machines Using Power Analysis and Boolean Satisfiability
Harsh Vamja, Richa Agrawal, Ranga Vemuri
Comments: Black-box Analysis, Finite State Machines, Power Analysis, Reverse Engineering, Satisfiability Checking, Proceedings of the 2019 IEEE International Midwest Symposium on Circuits and Systems
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[173] arXiv:1908.02108 (cross-list from cs.NI) [pdf, other]
Title: WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services
Michael J. May, Kevin D. Lux, Carl A. Gunter
Comments: 18 pages, 17 figures, followup work to WSEmail: Secure Internet Messaging Based on Web Services in IEEE International Conference on Web Services (ICWS) 2005. Extended version of article to appear in Service Oriented Computing and Applications
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[174] arXiv:1908.02203 (cross-list from cs.LG) [pdf, other]
Title: Model Agnostic Defence against Backdoor Attacks in Machine Learning
Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay
Comments: IEEE Transactions on Reliability, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[175] arXiv:1908.02997 (cross-list from cs.LG) [pdf, other]
Title: Local Differential Privacy for Deep Learning
M.A.P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[176] arXiv:1908.03080 (cross-list from math.OC) [pdf, other]
Title: A Privacy-preserving Method to Optimize Distributed Resource Allocation
Olivier Beaude, Pascal Benchimol, Stéphane Gaubert, Paulin Jacquot, Nadia Oudjane
Comments: 35 pages, revised version accepted for publication in SIAM journal on Optimization (SIOPT)
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[177] arXiv:1908.03270 (cross-list from cs.LG) [pdf, other]
Title: Uncheatable Machine Learning Inference
Mustafa Canim, Ashish Kundu, Josh Payne
Comments: Work-in-progress. 6 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[178] arXiv:1908.03436 (cross-list from quant-ph) [pdf, other]
Title: Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu
Comments: 43+11 pages, 18 figures, v2: minor changes, extended version of the published paper
Journal-ref: TCC 2019, pp. 282-311
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[179] arXiv:1908.03503 (cross-list from cs.HC) [pdf, other]
Title: Making GDPR Usable: A Model to Support Usability Evaluations of Privacy
Johanna Johansen, Simone Fischer-Hübner
Comments: 41 pages, 2 figures, 1 table, and appendixes
Journal-ref: In IFIP Advances in Information and Communication Technology, vol 576. Springer (2020)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[180] arXiv:1908.03560 (cross-list from cs.LG) [pdf, other]
Title: On the Adversarial Robustness of Neural Networks without Weight Transport
Mohamed Akrout
Comments: Accepted for the workshop on Real Neurons & Hidden Units at NeurIPS 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[181] arXiv:1908.03566 (cross-list from cs.LG) [pdf, other]
Title: That which we call private
Úlfar Erlingsson, Ilya Mironov, Ananth Raghunathan, Shuang Song
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[182] arXiv:1908.03625 (cross-list from quant-ph) [pdf, other]
Title: Continuous-Variable Quantum Key Distribution with a Real Local Oscillator and without Auxiliary Signals
Sebastian Kleis, Max Rueckmann, Christian G. Schaeffer
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP); Optics (physics.optics)
[183] arXiv:1908.03724 (cross-list from cs.DS) [pdf, other]
Title: Slide Reduction, Revisited---Filling the Gaps in SVP Approximation
Divesh Aggarwal, Jianwei Li, Phong Q. Nguyen, Noah Stephens-Davidowitz
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[184] arXiv:1908.04263 (cross-list from math.NT) [pdf, other]
Title: Computation of Jacobi sums of order l^2 and 2l^2 with prime l
Md. Helal Ahmed, Jagmohan Tanti, Sumant Pushp
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Rings and Algebras (math.RA)
[185] arXiv:1908.04295 (cross-list from econ.TH) [pdf, other]
Title: Interactive coin offerings
Jason Teutsch, Vitalik Buterin, Christopher Brown
Subjects: Theoretical Economics (econ.TH); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[186] arXiv:1908.04355 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Neural Pruning with Latent Vulnerability Suppression
Divyam Madaan, Jinwoo Shin, Sung Ju Hwang
Comments: Accepted to ICML 2020. Code available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[187] arXiv:1908.04486 (cross-list from cs.DS) [pdf, other]
Title: Private Rank Aggregation under Local Differential Privacy
Ziqi Yan, Gang Li, Jiqiang Liu
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[188] arXiv:1908.05156 (cross-list from cs.DC) [pdf, other]
Title: Aleph: Efficient Atomic Broadcast in Asynchronous Networks with Byzantine Nodes
Adam Gągol, Damian Leśniak, Damian Straszak, Michał Świętek
Comments: Accepted for presentation at AFT'19
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[189] arXiv:1908.05185 (cross-list from cs.CV) [pdf, other]
Title: Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once
Jiangfan Han, Xiaoyi Dong, Ruimao Zhang, Dongdong Chen, Weiming Zhang, Nenghai Yu, Ping Luo, Xiaogang Wang
Comments: Accepted by ICCV 2019
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[190] arXiv:1908.05584 (cross-list from quant-ph) [pdf, other]
Title: Quantum preprocessing for information-theoretic security in two-party computation
Li Yu
Comments: 24 pages, 2 figures. Simplified Protocol 2. Reduced the cost estimate for Scheme 2. Text revisions in Sections 2-4
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[191] arXiv:1908.05725 (cross-list from cs.LG) [pdf, other]
Title: Trustable and Automated Machine Learning Running with Blockchain and Its Applications
Tao Wang, Xinmin Wu, Taiping He
Comments: 10 pages, KDD 2019 AutoML workshop. arXiv admin note: text overlap with arXiv:1903.08801
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[192] arXiv:1908.06062 (cross-list from cs.CV) [pdf, other]
Title: Adversarial shape perturbations on 3D point clouds
Daniel Liu, Ronald Yu, Hao Su
Comments: 18 pages, accepted to the 2020 ECCV workshop on Adversarial Robustness in the Real World, source code available at this https url: this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Image and Video Processing (eess.IV); Machine Learning (stat.ML)
[193] arXiv:1908.06068 (cross-list from cs.ET) [pdf, other]
Title: Covert Computation in Self-Assembled Circuits
Angel A. Cantu, Austin Luchsinger, Robert Schweller, Tim Wylie
Comments: Short version published at the 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019)
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR)
[194] arXiv:1908.06086 (cross-list from cs.CY) [pdf, other]
Title: A Reliable IoT-Based Embedded Health Care System for Diabetic Patients
Zeyad A. Al-Odat, Sudarshan K. Srinivasan, Eman M. Al-Qtiemat, Sana Shuja
Comments: 11 pages. arXiv admin note: text overlap with arXiv:1812.02357
Journal-ref: International Journal On Advances in Internet Technology 2019
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[195] arXiv:1908.06210 (cross-list from eess.SP) [pdf, other]
Title: On the Adversarial Robustness of Subspace Learning
Fuwei Li, Lifeng Lai, Shuguang Cui
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[196] arXiv:1908.06281 (cross-list from cs.LG) [pdf, other]
Title: Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks
Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft
Comments: ICLR 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[197] arXiv:1908.06750 (cross-list from cs.CV) [pdf, other]
Title: A Kings Ransom for Encryption: Ransomware Classification using Augmented One-Shot Learning and Bayesian Approximation
Amir Atapour-Abarghouei, Stephen Bonner, Andrew Stephen McGough
Comments: Submitted to 2019 IEEE International Conference on Big Data
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[198] arXiv:1908.06757 (cross-list from cs.AR) [pdf, other]
Title: Boosting the Bounds of Symbolic QED for Effective Pre-Silicon Verification of Processor Cores
Karthik Ganesan, Srinivasa Shashank Nuthakki
Comments: arXiv admin note: withdrawn by arXiv administrators due to incomplete author list
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[199] arXiv:1908.06893 (cross-list from cs.CL) [pdf, other]
Title: Automated email Generation for Targeted Attacks using Natural Language
Avisha Das, Rakesh Verma
Comments: 8 pages, Workshop on Text Analytics for Cybersecurity and Online Safety 2018 (Co-located with Language Resources and Evaluation Conference 2018)
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[200] arXiv:1908.07329 (cross-list from cs.NI) [pdf, other]
Title: Data Analysis of Wireless Networks Using Classification Techniques
Daniel Rosa Canêdo, Alexandre Ricardo Soares Romariz
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[201] arXiv:1908.07558 (cross-list from cs.LG) [pdf, other]
Title: Transferring Robustness for Graph Neural Network Against Poisoning Attacks
Xianfeng Tang, Yandong Li, Yiwei Sun, Huaxiu Yao, Prasenjit Mitra, Suhang Wang
Comments: Accepted by WSDM 2020. Code and data: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
[202] arXiv:1908.07567 (cross-list from cs.DC) [pdf, other]
Title: Eunomia: A Permissionless Parallel Chain Protocol Based on Logical Clock
Jianyu Niu
Comments: 19 pages, 5 figures, technical report
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[203] arXiv:1908.07573 (cross-list from cs.DC) [pdf, other]
Title: Securing HPC using Federated Authentication
Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Michael Houle, Matthew Hubbell, Michael Jones, Anna Klein, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddharth Samsi, Charles Yee, Albert Reuther, Jeremy Kepner
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[204] arXiv:1908.07643 (cross-list from cs.LG) [pdf, other]
Title: AdaCliP: Adaptive Clipping for Private SGD
Venkatadheeraj Pichapati, Ananda Theertha Suresh, Felix X. Yu, Sashank J. Reddi, Sanjiv Kumar
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[205] arXiv:1908.07667 (cross-list from cs.LG) [pdf, other]
Title: Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks
Ka-Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu
Comments: To appear in IEEE BigData 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[206] arXiv:1908.07829 (cross-list from cs.OH) [pdf, other]
Title: DNA based Network Model and Blockchain
A.M. El-Edkawy, M.A. El-Dosuky, Taher Hamza
Subjects: Other Computer Science (cs.OH); Cryptography and Security (cs.CR)
[207] arXiv:1908.07882 (cross-list from cs.LG) [pdf, other]
Title: Generalization in Generative Adversarial Networks: A Novel Perspective from Privacy Protection
Bingzhe Wu, Shiwan Zhao, ChaoChao Chen, Haoyang Xu, Li Wang, Xiaolu Zhang, Guangyu Sun, Jun Zhou
Comments: Accepted by NeurIPS 2019
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[208] arXiv:1908.07899 (cross-list from cs.CL) [pdf, other]
Title: Evaluating Defensive Distillation For Defending Text Processing Neural Networks Against Adversarial Examples
Marcus Soll, Tobias Hinz, Sven Magg, Stefan Wermter
Comments: Published at the International Conference on Artificial Neural Networks (ICANN) 2019
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[209] arXiv:1908.07968 (cross-list from cs.IR) [pdf, other]
Title: Assessing the Impact of a User-Item Collaborative Attack on Class of Users
Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra
Comments: 5 pages, RecSys2019, The 1st Workshop on the Impact of Recommender Systems with ACM RecSys 2019
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[210] arXiv:1908.08016 (cross-list from cs.LG) [pdf, other]
Title: Testing Robustness Against Unforeseen Adversaries
Max Kaufmann, Daniel Kang, Yi Sun, Steven Basart, Xuwang Yin, Mantas Mazeika, Akul Arora, Adam Dziedzic, Franziska Boenisch, Tom Brown, Jacob Steinhardt, Dan Hendrycks
Comments: Datasets available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[211] arXiv:1908.08143 (cross-list from quant-ph) [pdf, other]
Title: Flexible quantum tokens in spacetime
Adrian Kent, Damián Pitalúa-García
Comments: Accepted manuscript. To appear in Physical Review A
Journal-ref: Phys. Rev. A 101, 022309 (2020)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[212] arXiv:1908.08144 (cross-list from stat.AP) [pdf, other]
Title: They may look and look, yet not see: BMDs cannot be tested adequately
Philip B. Stark, Ran Xie
Subjects: Applications (stat.AP); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[213] arXiv:1908.08649 (cross-list from stat.ML) [pdf, other]
Title: Adversary-resilient Distributed and Decentralized Statistical Inference and Machine Learning: An Overview of Recent Advances Under the Byzantine Threat Model
Zhixiong Yang, Arpita Gang, Waheed U. Bajwa
Comments: 24 pages, 6 figures, 2 tables; Published in IEEE Signal Processing Magazine, May 2020 (Special Issue on "Machine Learning From Distributed, Streaming Data")
Journal-ref: IEEE Signal Processing Mag., vol. 37, no. 3, pp. 146-159, May 2020
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Signal Processing (eess.SP)
[214] arXiv:1908.08889 (cross-list from quant-ph) [pdf, other]
Title: Semi-Quantum Money
Roy Radian, Or Sattath
Comments: 81 pages LaTeX; new discussions and figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[215] arXiv:1908.09015 (cross-list from cs.DC) [pdf, other]
Title: Towards Secure and Decentralized Sharing of IoT Data
Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame, Claudio Soriente
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[216] arXiv:1908.09485 (cross-list from cs.IR) [pdf, other]
Title: Successive Point-of-Interest Recommendation with Local Differential Privacy
Jong Seon Kim, Jong Wook Kim, Yon Dohn Chung
Comments: This paper has been accepted to IEEE Access
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[217] arXiv:1908.09878 (cross-list from cs.SE) [pdf, other]
Title: Slither: A Static Analysis Framework For Smart Contracts
Josselin Feist, Gustavo Grieco, Alex Groce
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[218] arXiv:1908.09888 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Tensor Factorization for Collaborative Health Data Analysis
Jing Ma, Qiuchen Zhang, Jian Lou, Joyce C. Ho, Li Xiong, Xiaoqian Jiang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[219] arXiv:1908.09927 (cross-list from cs.NI) [pdf, other]
Title: Integration of the Captive Portal paradigm with the 802.1X architecture
Nuno Marques, André Zúquete, João Paulo Barraca
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[220] arXiv:1908.09970 (cross-list from cs.LG) [pdf, other]
Title: Private Stochastic Convex Optimization with Optimal Rates
Raef Bassily, Vitaly Feldman, Kunal Talwar, Abhradeep Thakurta
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[221] arXiv:1908.10048 (cross-list from cs.HC) [pdf, other]
Title: Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR
Dominique Machuletz, Rainer Böhme
Journal-ref: Proceedings on Privacy Enhancing Technologies 2020
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[222] arXiv:1908.10258 (cross-list from cs.AI) [pdf, other]
Title: Infochain: A Decentralized, Trustless and Transparent Oracle on Blockchain
Naman Goel, Cyril van Schreven, Aris Filos-Ratsikas, Boi Faltings
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[223] arXiv:1908.10268 (cross-list from cs.DB) [pdf, other]
Title: Answering Summation Queries for Numerical Attributes under Differential Privacy
Yikai Wu, David Pujol, Ios Kotsogiannis, Ashwin Machanavajjhala
Comments: TPDP 2019, 7 pages
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[224] arXiv:1908.10362 (cross-list from eess.SP) [pdf, other]
Title: Physical Layer Key Generation in 5G Wireless Networks
Long Jiao, Ning Wang, Pu Wang, Amir Alipour-Fanid, Jie Tang, Kai Zeng
Comments: This work has been accepted by the IEEE Wireless Communications Magzine
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[225] arXiv:1908.10498 (cross-list from cs.LG) [pdf, other]
Title: Detection of Backdoors in Trained Classifiers Without Access to the Training Set
Zhen Xiang, David J. Miller, George Kesidis
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[226] arXiv:1908.10530 (cross-list from cs.LG) [pdf, other]
Title: Rényi Differential Privacy of the Sampled Gaussian Mechanism
Ilya Mironov, Kunal Talwar, Li Zhang
Comments: 14 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[227] arXiv:1908.10630 (cross-list from cs.DC) [pdf, other]
Title: Blockchain-based Personal Data Management: From Fiction to Solution
Nguyen Truong, Kai Sun, Yike Guo
Comments: 8 pages, 5 figures; accepted to be published as full paper at IEEE International Symposium on Network Computing and Applications (NCA 2019)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[228] arXiv:1908.10839 (cross-list from cs.IT) [pdf, other]
Title: Efficient Decoding of Interleaved Low-Rank Parity-Check Codes
Julian Renner, Thomas Jerkovits, Hannes Bartz
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[229] arXiv:1908.10898 (cross-list from cs.MM) [pdf, other]
Title: A steganographic approach based on the chaotic fractional map and in the DCT domain
A. Soria-Lorente, E. Pérez-Michel, E. Avila-Domenech
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[230] arXiv:1908.11132 (cross-list from cs.LO) [pdf, other]
Title: Technical report of "The Knowledge Base Paradigm Applied to Delegation Revocation"
Marcos Cramer, Zohreh Baniasadi, Pieter Van Hertum
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[231] arXiv:1908.11143 (cross-list from cs.OS) [pdf, other]
Title: SGX-LKL: Securing the Host OS Interface for Trusted Execution
Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A. Sartakov, Peter Pietzuch
Subjects: Operating Systems (cs.OS); Cryptography and Security (cs.CR)
[232] arXiv:1908.11227 (cross-list from cs.PL) [pdf, other]
Title: VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, Hakjoo Oh
Comments: To appear in the IEEE Symposium on Security & Privacy, May 2020
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[233] arXiv:1908.11229 (cross-list from stat.ML) [pdf, other]
Title: White-box vs Black-box: Bayes Optimal Strategies for Membership Inference
Alexandre Sablayrolles, Matthijs Douze, Yann Ollivier, Cordelia Schmid, Hervé Jégou
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234] arXiv:1908.11230 (cross-list from cs.LG) [pdf, other]
Title: Defeating Misclassification Attacks Against Transfer Learning
Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang
Comments: This paper has been published in IEEE Transactions on Dependable and Secure Computing. this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[235] arXiv:1908.11366 (cross-list from cs.IT) [pdf, other]
Title: Improved Storage for Efficient Private Information Retrieval
Karim Banawan, Batuhan Arasli, Sennur Ulukus
Comments: ITW 2019
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Databases (cs.DB)
[236] arXiv:1908.11435 (cross-list from cs.LG) [pdf, other]
Title: Improving Adversarial Robustness via Attention and Adversarial Logit Pairing
Dou Goodman, Xingjian Li, Ji Liu, Dejing Dou, Tao Wei
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[237] arXiv:1908.11779 (cross-list from cs.DC) [pdf, other]
Title: Analyzing Cyber-Physical Systems from the Perspective of Artificial Intelligence
Eric M.S.P. Veith, Lars Fischer, Martin Tröschel, Astrid Nieße
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
Total of 237 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack