Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for February 2020

Total of 294 entries : 1-25 ... 101-125 126-150 151-175 176-200 201-225 226-250 251-275 ... 276-294
Showing up to 25 entries per page: fewer | more | all
[176] arXiv:2002.12837 [pdf, other]
Title: Testimonium: A Cost-Efficient Blockchain Relay
Philipp Frauenthaler, Marten Sigwart, Christof Spanring, Stefan Schulte
Subjects: Cryptography and Security (cs.CR)
[177] arXiv:2002.00050 (cross-list from cs.IT) [pdf, other]
Title: A direct proof of APN-ness of the Kasami functions
Claude Carlet, Kwang Ho Kim, Sihem Mesnager
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[178] arXiv:2002.00087 (cross-list from cs.IT) [pdf, other]
Title: Exact and Robust Reconstructions of Integer Vectors Based on Multidimensional Chinese Remainder Theorem (MD-CRT)
Li Xiao, Xiang-Gen Xia, Yu-Ping Wang
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Number Theory (math.NT)
[179] arXiv:2002.00179 (cross-list from cs.CV) [pdf, other]
Title: AdvJND: Generating Adversarial Examples with Just Noticeable Difference
Zifei Zhang, Kai Qiao, Lingyun Jiang, Linyuan Wang, Bin Yan
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[180] arXiv:2002.00192 (cross-list from quant-ph) [pdf, other]
Title: A Quantum-based Database Query Scheme for Privacy Preservation in Cloud Environment
Wenjie Liu, Peipei Gao, Zhihao Liu, Hanwu Chen, Maojun Zhang
Comments: 14 pages, 8 figures
Journal-ref: Security and Communication Networks, 2019
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[181] arXiv:2002.00211 (cross-list from cs.LG) [pdf, other]
Title: Learning to Detect Malicious Clients for Robust Federated Learning
Suyi Li, Yong Cheng, Wei Wang, Yang Liu, Tianjian Chen
Comments: 7 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[182] arXiv:2002.00464 (cross-list from quant-ph) [pdf, other]
Title: Full-Blind Delegating Private Quantum Computation
Wen-Jie Liu, Zhen-Yu Chen, Jin-Suo Liu, Zhao-Feng Su, Lian-Hua Chi
Comments: 9 figures, 13 pages
Journal-ref: Cmc-Computers Materials & Continua, 2018, vol. 56, no. 2, pp. 211-223
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[183] arXiv:2002.00506 (cross-list from eess.SY) [pdf, other]
Title: SARSA(0) Reinforcement Learning over Fully Homomorphic Encryption
Jihoon Suh, Takashi Tanaka
Comments: 7 pages, 2 figures, submitted to SICE ISCS 2021; replaced with supplementary paragraphs added and format change for the correct publishing medium
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[184] arXiv:2002.00559 (cross-list from cs.IT) [pdf, other]
Title: Info-Commit: Information-Theoretic Polynomial Commitment
Saeid Sahraei, Salman Avestimehr, Ramy E. Ali
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[185] arXiv:2002.00760 (cross-list from cs.CL) [pdf, other]
Title: FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications
Dou Goodman, Lv Zhonghou, Wang minghua
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[186] arXiv:2002.00801 (cross-list from cs.AI) [pdf, other]
Title: CryptoSPN: Privacy-preserving Sum-Product Network Inference
Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting
Comments: Accepted for publication at ECAI'20. Please cite the conference version of this paper
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[187] arXiv:2002.00918 (cross-list from cs.HC) [pdf, other]
Title: BeCAPTCHA: Detecting Human Behavior in Smartphone Interaction using Multiple Inbuilt Sensors
Alejandro Acien, Aythami Morales, Julian Fierrez, Ruben Vera-Rodriguez, Ivan Bartolome
Comments: AAAI-20 Workshop on Artificial Intelligence for Ciber Security (AICS), New York, NY, USA, February 2020. AICS-2020 Workshop
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[188] arXiv:2002.00934 (cross-list from cs.CY) [pdf, other]
Title: Stop Tracking Me Bro! Differential Tracking Of User Demographics On Hyper-partisan Websites
Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis
Comments: Published at The Web Conference 2020 (WWW 2020). Please cite the WWW version
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[189] arXiv:2002.00937 (cross-list from stat.ML) [pdf, other]
Title: Radioactive data: tracing through training
Alexandre Sablayrolles, Matthijs Douze, Cordelia Schmid, Hervé Jégou
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[190] arXiv:2002.00944 (cross-list from math.OC) [pdf, other]
Title: Differential Privacy for Stackelberg Games
Ferdinando Fioretto, Lesia Mitridati, Pascal Van Hentenryck
Comments: arXiv admin note: substantial text overlap with arXiv:1911.10178
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[191] arXiv:2002.01374 (cross-list from cs.DC) [pdf, other]
Title: Ant Routing scalability for the Lightning Network
Cyril Grunspan, Gabriel Lehéricy, Ricardo Pérez-Marco
Comments: 26 pagew, 3 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[192] arXiv:2002.01469 (cross-list from cs.CV) [pdf, other]
Title: Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups
Sohrab Ferdowsi, Behrooz Razeghi, Taras Holotyak, Flavio P. Calmon, Slava Voloshynovskiy
Comments: Accepted as an oral presentation for ICASSP 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[193] arXiv:2002.01582 (cross-list from cs.DB) [pdf, other]
Title: A workload-adaptive mechanism for linear queries under local differential privacy
Ryan McKenna, Raj Kumar Maity, Arya Mazumdar, Gerome Miklau
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[194] arXiv:2002.01810 (cross-list from cs.LG) [pdf, other]
Title: Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study
David Mickisch, Felix Assion, Florens Greßner, Wiebke Günther, Mariele Motta
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[195] arXiv:2002.01969 (cross-list from cs.GT) [pdf, other]
Title: Partially Observable Games for Secure Autonomy
Mohamadreza Ahmadi, Arun A. Viswanathan, Michel D. Ingham, Kymie Tan, Aaron D. Ames
Subjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL); Multiagent Systems (cs.MA)
[196] arXiv:2002.02007 (cross-list from cs.LG) [pdf, other]
Title: Defending Adversarial Attacks via Semantic Feature Manipulation
Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen
Comments: arXiv admin note: text overlap with arXiv:2001.06640 and text overlap with arXiv:1705.09064 by other authors
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[197] arXiv:2002.02088 (cross-list from cs.LG) [pdf, other]
Title: Secure Social Recommendation based on Secret Sharing
Chaochao Chen, Liang Li, Bingzhe Wu, Cheng Hong, Li Wang, Jun Zhou
Comments: Accepted by ECAI'20
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[198] arXiv:2002.02175 (cross-list from eess.SP) [pdf, other]
Title: An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Yao Deng, Xi Zheng, Tianyi Zhang, Chen Chen, Guannan Lou, Miryung Kim
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[199] arXiv:2002.02196 (cross-list from cs.LG) [pdf, other]
Title: AI-GAN: Attack-Inspired Generation of Adversarial Examples
Tao Bai, Jun Zhao, Jinlin Zhu, Shoudong Han, Jiefeng Chen, Bo Li, Alex Kot
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[200] arXiv:2002.02413 (cross-list from eess.IV) [pdf, other]
Title: StegColNet: Steganalysis based on an ensemble colorspace approach
Shreyank N Gowda, Chun Yuan
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
Total of 294 entries : 1-25 ... 101-125 126-150 151-175 176-200 201-225 226-250 251-275 ... 276-294
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack