Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for May 2020

Total of 349 entries : 1-50 101-150 151-200 201-250 251-300 301-349
Showing up to 50 entries per page: fewer | more | all
[251] arXiv:2005.03310 (cross-list from cs.MM) [pdf, other]
Title: Interval type-2 fuzzy logic system based similarity evaluation for image steganography
Zubair Ashraf, Mukul Lata Roy, Pranab K.Muhuri, Q. M. Danish Lohani
Journal-ref: Heliyon 6(5) (2020) e03771
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[252] arXiv:2005.03318 (cross-list from cs.NI) [pdf, other]
Title: A Review of Computer Vision Methods in Network Security
Jiawei Zhao, Rahat Masood, Suranga Seneviratne
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[253] arXiv:2005.03482 (cross-list from cs.LG) [pdf, other]
Title: AN-GCN: An Anonymous Graph Convolutional Network Defense Against Edge-Perturbing Attack
Ao Liu, Beibei Li, Tao Li, Pan Zhou, Rui wang
Comments: 15 pages, 11 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[254] arXiv:2005.03518 (cross-list from quant-ph) [pdf, other]
Title: Two Efficient Measurement Device Independent Quantum Dialogue Protocols
Nayana Das, Goutam Paul
Journal-ref: International Journal of Quantum Information 18.07 (2020): 2050038
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[255] arXiv:2005.04272 (cross-list from cs.LG) [pdf, other]
Title: Towards Robustness against Unsuspicious Adversarial Examples
Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik
Comments: v2.0
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[256] arXiv:2005.04343 (cross-list from cs.CY) [pdf, other]
Title: How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt
Gabriel Kaptchuk, Daniel G. Goldstein, Eszter Hargittai, Jake Hofman, Elissa M. Redmiles
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[257] arXiv:2005.04513 (cross-list from eess.SY) [pdf, other]
Title: Intelligent GPS Spoofing Attack Detection in Power Grids
Mohammad Sabouri, Sara Siamak, Maryam Dehghani, Mohsen Mohammadi, Mohammad Hassan Asemani
Subjects: Systems and Control (eess.SY); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[258] arXiv:2005.04519 (cross-list from cs.DC) [pdf, other]
Title: PriLok: Citizen-protecting distributed epidemic tracing
Paulo Esteves-Verissimo, Jérémie Decouchant, Marcus Völp, Alireza Esfahani, Rafal Graczyk
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[259] arXiv:2005.04563 (cross-list from cs.LG) [pdf, other]
Title: Efficient Privacy Preserving Edge Computing Framework for Image Classification
Omobayode Fagbohungbe, Sheikh Rufsan Reza, Xishuang Dong, Lijun Qian
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV); Machine Learning (stat.ML)
[260] arXiv:2005.04722 (cross-list from cs.PL) [pdf, other]
Title: Dynamic IFC Theorems for Free!
Maximilian Algehed, Jean-Philippe Bernardy, Catalin Hritcu
Comments: CSF 2021 final version
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[261] arXiv:2005.04763 (cross-list from cs.LG) [pdf, other]
Title: Private Stochastic Convex Optimization: Optimal Rates in Linear Time
Vitaly Feldman, Tomer Koren, Kunal Talwar
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[262] arXiv:2005.04826 (cross-list from quant-ph) [pdf, other]
Title: Simpler Proofs of Quantumness
Zvika Brakerski, Venkata Koppula, Umesh Vazirani, Thomas Vidick
Comments: TQC 2020
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[263] arXiv:2005.05289 (cross-list from quant-ph) [pdf, other]
Title: Secure Software Leasing
Prabhanjan Ananth, Rolando L. La Placa
Comments: 53 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[264] arXiv:2005.05415 (cross-list from eess.SY) [pdf, other]
Title: Towards a Decentralized Digital Engineering Assets Marketplace: Empowered by Model-based Systems Engineering and Distributed Ledger Technology
Jinzhi Lu, Xiaochen Zheng, Zhenchao Hu, Huisheng Zhang, Dimitris Kiritsis
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[265] arXiv:2005.05521 (cross-list from cs.GT) [pdf, other]
Title: A Difficulty in Controlling Blockchain Mining Costs via Cryptopuzzle Difficulty
Venkata Sriram Siddhardh Nadendla, Lav R. Varshney
Comments: 8 pages. This is a working draft and can potentially have errors. Any feedback will be greatly appreciated and will be acknowledged in the updated version
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[266] arXiv:2005.05571 (cross-list from cs.CY) [pdf, other]
Title: Ransomware in Windows and Android Platforms
Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu
Comments: 21 pages, 7 figures, 5 tables
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[267] arXiv:2005.05944 (cross-list from cs.PL) [pdf, other]
Title: CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle
Akram El-Korashy, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, Frank Piessens
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[268] arXiv:2005.06023 (cross-list from cs.CV) [pdf, other]
Title: Increased-confidence adversarial examples for deep learning counter-forensics
Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[269] arXiv:2005.06043 (cross-list from cs.DC) [pdf, other]
Title: Serdab: An IoT Framework for Partitioning Neural Networks Computation across Multiple Enclaves
Tarek Elgamal, Klara Nahrstedt
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[270] arXiv:2005.06107 (cross-list from cs.CV) [pdf, other]
Title: Adversarial examples are useful too!
Ali Borji
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[271] arXiv:2005.06115 (cross-list from cs.LO) [pdf, other]
Title: Probabilistic Hyperproperties with Nondeterminism
Erika Abraham, Ezio Bartocci, Borzoo Bonakdarpour, Oyendrila Dobe
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR); Formal Languages and Automata Theory (cs.FL)
[272] arXiv:2005.06149 (cross-list from cs.LG) [pdf, other]
Title: DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses
Yaxin Li, Wei Jin, Han Xu, Jiliang Tang
Comments: Adversarial attacks and defenses, Pytorch library
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[273] arXiv:2005.06154 (cross-list from cs.DB) [pdf, other]
Title: Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data
Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta
Comments: This version has been accepted in ACM Transactions on Management Information Systems. The final published version of this paper may differ from this accepted version. A preliminary version of this paper [arXiv:1812.09233] was accepted and presented in IEEE ICDE 2019
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Retrieval (cs.IR)
[274] arXiv:2005.06227 (cross-list from cs.PL) [pdf, other]
Title: eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei
Comments: Accepted for CCS 2020
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[275] arXiv:2005.06432 (cross-list from quant-ph) [pdf, other]
Title: Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits
Gorjan Alagic, Zvika Brakerski, Yfke Dulek, Christian Schaffner
Comments: v2: Add the notion of decomposable public keys, which allows our impossibility to hold without assuming circular security for QFHE. We also fix an auxiliary lemma (2.9 in v2) where a square root was missing (this does not influence the main result)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[276] arXiv:2005.06595 (cross-list from cs.NI) [pdf, other]
Title: Performance Analysis of the Hybrid IoT Security Model of MQTT and UMA
Khalid S. Aloufi, Omar H. Alhazmi
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[277] arXiv:2005.06610 (cross-list from cs.CY) [pdf, html, other]
Title: Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations
Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa
Comments: Accepted for publication at The 29th International Conference on Computer Communications and Networks (ICCCN 2020)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Statistical Finance (q-fin.ST)
[278] arXiv:2005.06665 (cross-list from cs.DC) [pdf, other]
Title: Scaling Blockchains Without Giving up Decentralization and Security
Gianmaria Del Monte, Diego Pennino, Maurizio Pizzonia
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[279] arXiv:2005.06716 (cross-list from cs.LG) [pdf, other]
Title: Prive-HD: Privacy-Preserved Hyperdimensional Computing
Behnam Khaleghi, Mohsen Imani, Tajana Rosing
Comments: Accepted in Design Automation Conference (DAC) 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[280] arXiv:2005.07338 (cross-list from cs.DC) [pdf, other]
Title: New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges
Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu
Comments: Invited paper to the IEEE IoT Journal
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[281] arXiv:2005.07347 (cross-list from cs.LG) [pdf, other]
Title: Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness
Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu
Comments: Correct the some details of the theorems and proofs
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[282] arXiv:2005.07595 (cross-list from cs.DC) [pdf, other]
Title: A Peer-to-Peer Distributed Secured Sustainable Large Scale Identity Document Verification System With BitTorrent Network And Hash Function
Khan Mohammad Rashedun-Naby
Comments: 8 pages, 3 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[283] arXiv:2005.07776 (cross-list from cs.LG) [pdf, other]
Title: Efficient Federated Learning over Multiple Access Channel with Differential Privacy Constraints
Amir Sonee, Stefano Rini
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (stat.ML)
[284] arXiv:2005.07866 (cross-list from stat.ML) [pdf, other]
Title: Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data
Deepesh Data, Suhas Diggavi
Comments: 57 pages, 2 figures
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[285] arXiv:2005.07890 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private ADMM for Convex Distributed Learning: Improved Accuracy via Multi-Step Approximation
Zonghao Huang, Yanmin Gong
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[286] arXiv:2005.07998 (cross-list from cs.LG) [pdf, other]
Title: Encryption Inspired Adversarial Defense for Visual Classification
MaungMaung AprilPyone, Hitoshi Kiya
Comments: To be appeared on 27th IEEE International Conference on Image Processing (ICIP 2020)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[287] arXiv:2005.08087 (cross-list from cs.CV) [pdf, other]
Title: Universal Adversarial Perturbations: A Survey
Ashutosh Chaubey, Nikhil Agrawal, Kavya Barnwal, Keerat K. Guliani, Pramod Mehta
Comments: 20 pages, 17 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[288] arXiv:2005.08147 (cross-list from cs.IR) [pdf, other]
Title: Attacking Black-box Recommendations via Copying Cross-domain User Profiles
Wenqi Fan, Tyler Derr, Xiangyu Zhao, Yao Ma, Hui Liu, Jianping Wang, Jiliang Tang, Qing Li
Comments: In Proceedings of 37th IEEE International Conference on Data Engineering (ICDE 2021, Full paper)
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[289] arXiv:2005.08164 (cross-list from cs.IR) [pdf, other]
Title: Attacking Recommender Systems with Augmented User Profiles
Chen Lin, Si Chen, Hui Li, Yanghua Xiao, Lianyun Li, Qian Yang
Comments: CIKM 2020. 10 pages, 2 figures
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[290] arXiv:2005.08210 (cross-list from cs.IT) [pdf, other]
Title: Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise
Onur Günlü
Comments: To appear in the IEEE Transactions on Information Forensics and Security
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Multimedia (cs.MM); Signal Processing (eess.SP)
[291] arXiv:2005.08300 (cross-list from nlin.CG) [pdf, other]
Title: Exploring Semi-bent Boolean Functions Arising from Cellular Automata
Luca Mariot, Martina Saletta, Alberto Leporati, Luca Manzoni
Comments: 12 pages, 1 figure, submitted to ACRI 2020
Subjects: Cellular Automata and Lattice Gases (nlin.CG); Cryptography and Security (cs.CR)
[292] arXiv:2005.08321 (cross-list from cs.LG) [pdf, other]
Title: Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks
Mahdieh Abbasi, Arezoo Rajabi, Christian Gagne, Rakesh B. Bobba
Comments: Published by Springer in the Lecture Notes in Artificial Intelligence
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[293] arXiv:2005.08337 (cross-list from cs.CV) [pdf, other]
Title: A Survey on Unknown Presentation Attack Detection for Fingerprint
Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra
Comments: Submitted to 3rd International Conference on Intelligent Technologies and Applications INTAP 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[294] arXiv:2005.08364 (cross-list from cs.NI) [pdf, other]
Title: Attack-aware Security Function Chain Reordering
Lukas Iffländer, Nishant Rawtani, Lukas Beierlieb, Nicolas Fella, Klaus-Dieter Lange, Samuel Kounev
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[295] arXiv:2005.08370 (cross-list from cs.CY) [pdf, other]
Title: A socio-technical framework for digital contact tracing
Ricardo Vinuesa, Andreas Theodorou, Manuela Battaglini, Virginia Dignum
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[296] arXiv:2005.08427 (cross-list from cs.CY) [pdf, other]
Title: Security Survey and Analysis of Vote-by-Mail Systems
Jenny Blessing, Julian Gomez, McCoy Patiño, Tran Nguyen
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[297] arXiv:2005.08479 (cross-list from cs.LG) [pdf, other]
Title: Large-Scale Secure XGB for Vertical Federated Learning
Wenjing Fang, Derun Zhao, Jin Tan, Chaochao Chen, Chaofan Yu, Li Wang, Lei Wang, Jun Zhou, Benyu Zhang
Comments: accepted by cikm21
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[298] arXiv:2005.08651 (cross-list from math.NT) [pdf, other]
Title: Binary sequences derived from differences of consecutive quadratic residues
Arne Winterhof, Zibi Xiao
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[299] arXiv:2005.08679 (cross-list from cs.LG) [pdf, other]
Title: An Overview of Privacy in Machine Learning
Emiliano De Cristofaro
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (stat.ML)
[300] arXiv:2005.08922 (cross-list from cs.CY) [pdf, other]
Title: DHP Framework: Digital Health Passports Using Blockchain -- Use case on international tourism during the COVID-19 pandemic
Constantinos Marios Angelopoulos, Amalia Damianou, Vasilios Katos
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
Total of 349 entries : 1-50 101-150 151-200 201-250 251-300 301-349
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack