Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for June 2020

Total of 353 entries
Showing up to 2000 entries per page: fewer | more | all
[1] arXiv:2006.00076 [pdf, other]
Title: Fast Execute-Only Memory for Embedded Systems
Zhuojia Shen, Komail Dharsee, John Criswell
Comments: 8 pages, 6 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[2] arXiv:2006.00165 [pdf, other]
Title: Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber Physical Systems
Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi
Comments: Preprint version of the published paper
Journal-ref: IEEE Transactions on Reliability, VOL. 71, NO. 2, JUNE 2022
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[3] arXiv:2006.00505 [pdf, other]
Title: Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference
Brandon Reagen, Wooseok Choi, Yeongil Ko, Vincent Lee, Gu-Yeon Wei, Hsien-Hsin S. Lee, David Brooks
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2006.00514 [pdf, other]
Title: New Code-Based Cryptosystem with Arbitrary Error Vectors
Fedor Ivanov, Eugenii Krouk
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2006.00529 [pdf, other]
Title: A review of information security aspects of the emerging COVID-19 contact tracing mobile phone applications
Georgios Magklaras, Lucia Nikolaia Lopez Bojorquez
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[6] arXiv:2006.00548 [pdf, other]
Title: Evaluation of biometric user authentication using an ensemble classifier with face and voice recognition
Firas Abbaas, Gursel Serpen
Comments: 11 pages, 8 Figures and 14 Tables. Accepted for publication in Journal of Information Assurance and Security
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:2006.00577 [pdf, other]
Title: Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them
Alessandro Ecclesie Agazzi
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[8] arXiv:2006.00653 [pdf, other]
Title: The QQUIC Transport Protocol: Quantum assisted UDP Internet Connections
Peng Yan, Nengkun Yu
Comments: Comments are welcome
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Quantum Physics (quant-ph)
[9] arXiv:2006.00676 [pdf, other]
Title: G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System
Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Miguel Alonso Jr
Comments: 10 pages, 4 figures, accepted in IEEE COMPSAC-2020
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[10] arXiv:2006.00790 [pdf, other]
Title: Smartphone Sensors for Modeling Human-Computer Interaction: General Outlook and Research Datasets for User Authentication
Alejandro Acien, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez
Journal-ref: IEEE Intl. Workshop on Consumer Devices and Systems (CDS), 2020, Madrid, Spain
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2006.00860 [pdf, other]
Title: Adversarial Attacks on Classifiers for Eye-based User Modelling
Inken Hagestedt (1), Michael Backes (1), Andreas Bulling (2) ((1) CISPA Helmholtz Center for Information Security, (2) University of Stuttgart)
Comments: 9 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[12] arXiv:2006.01043 [pdf, other]
Title: BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements
Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang
Comments: To appear in Annual Computer Security Applications Conference (ACSAC) 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13] arXiv:2006.01072 [pdf, other]
Title: GHAST: Breaking Confirmation Delay Barrier in Nakamoto Consensus via Adaptive Weighted Blocks
Chenxing Li, Fan Long, Guang Yang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[14] arXiv:2006.01181 [pdf, other]
Title: Security Smells in Android
Mohammad Ghafari, Pascal Gadient, Oscar Nierstrasz
Comments: 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[15] arXiv:2006.01264 [pdf, other]
Title: An End-to-End Encryption Solution for Enterprise Content Applications
Chaoting Xuan
Comments: 6 pages (includes references)
Subjects: Cryptography and Security (cs.CR)
[16] arXiv:2006.01300 [pdf, other]
Title: DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks
Hanieh Hashemi, Yongqin Wang, Murali Annavaram
Subjects: Cryptography and Security (cs.CR)
[17] arXiv:2006.01342 [pdf, other]
Title: A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks
Warit Sirichotedumrong, Hitoshi Kiya
Comments: To be appeared on 28th European Signal Processing Conference (EUSIPCO 2020)
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[18] arXiv:2006.01418 [pdf, other]
Title: Time-Dilation Attacks on the Lightning Network
Antoine Riard, Gleb Naumenko
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2006.01427 [pdf, other]
Title: LaKSA: A Probabilistic Proof-of-Stake Protocol
Daniel Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou
Subjects: Cryptography and Security (cs.CR)
[20] arXiv:2006.01442 [pdf, other]
Title: Real time Detection of Spectre and Meltdown Attacks Using Machine Learning
Bilal Ali Ahmad
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2006.01449 [pdf, other]
Title: Less is More: Robust and Novel Features for Malicious Domain Detection
Chen Hajaj, Nitay Hason, Nissim Harel, Amit Dvir
Comments: 30 pages, 7 figures, 10 tables
Subjects: Cryptography and Security (cs.CR)
[22] arXiv:2006.01607 [pdf, other]
Title: Probability theory and public-key cryptography
Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2006.01722 [pdf, other]
Title: Threat Detection and Investigation with System-level Provenance Graphs: A Survey
Zhenyuan Li, Qi Alfred Chen, Runqing Yang, Yan Chen
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:2006.01751 [pdf, other]
Title: MusicID: A Brainwave-based User Authentication System for Internet of Things
Jinani Sooriyaarachchi, Suranga Seneviratne, Kanchana Thilakarathna, Albert Y. Zomaya
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[25] arXiv:2006.01818 [pdf, other]
Title: Securing Your Collaborative Jupyter Notebooks in the Cloud using Container and Load Balancing Services
Haw-minn Lu, Adrian Kwong, Jose Unpingco
Comments: Accepted and submitted to 19th Python in Science Conference. (SciPy 2020)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[26] arXiv:2006.01849 [pdf, other]
Title: Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques -- An Experiment
Joel Chacon, Sean McKeown, Richard Macfarlane
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:2006.01939 [pdf, other]
Title: A New Chaos and Permutation Based Algorithm for Image and Video Encryption
Chinmaya Patnayak, Pradipta Roy, Bibekanand Patnaik
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM); Image and Video Processing (eess.IV)
[28] arXiv:2006.01977 [pdf, other]
Title: Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions
Vidal Attias, Luigi Vigneri, Vassil Dimitrov
Journal-ref: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 1-6
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[29] arXiv:2006.01994 [pdf, other]
Title: Dynamic Merkle B-tree with Efficient Proofs
Chase Smith, Alex Rusnak
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[30] arXiv:2006.02147 [pdf, other]
Title: An Authenticated Key Scheme over Elliptic Curves for Topological Networks
Riccardo Aragona, Roberto Civino, Norberto Gavioli, Marco Pugliese
Subjects: Cryptography and Security (cs.CR)
[31] arXiv:2006.02231 [pdf, other]
Title: A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store
Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon
Comments: arXiv admin note: substantial text overlap with arXiv:1804.09882
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE)
[32] arXiv:2006.02398 [pdf, other]
Title: SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu
Comments: In Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS 2020)
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:2006.02456 [pdf, other]
Title: A Distributed Trust Framework for Privacy-Preserving Machine Learning
Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan
Comments: To be published in the proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020
Journal-ref: 17th International Conference TrustBus 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[34] arXiv:2006.02562 [pdf, other]
Title: Implementation of password manager with sram-based physical unclonable function
Mohammad Mohammadinodoushan
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:2006.02758 [pdf, other]
Title: Automatic Feature Extraction, Categorization and Detection of Malicious Code in Android Applications
Muhammad Zuhair Qadir, Atif Nisar Jilani, Hassam Ullah Sheikh
Comments: published paper in ijins journal
Journal-ref: International Journal of Information and Network Security (IJINS) 2014
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[36] arXiv:2006.02775 [pdf, other]
Title: Design and Hardware Implementation of a Separable Image Steganographic Scheme Using Public-key Cryptosystem
Salah Harb, M. Omair Ahmad, M.N.S Swamy
Comments: 14 pages, 5 figures, conference
Subjects: Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[37] arXiv:2006.02894 [pdf, other]
Title: Secure Sum Outperforms Homomorphic Encryption in (Current) Collaborative Deep Learning
Derian Boer, Stefan Kramer
Comments: submitted to Journal of Artificial Intelligence
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[38] arXiv:2006.02930 [pdf, other]
Title: Data-Flow-Based Extension of the System-Theoretic Process Analysis for Security (STPA-Sec)
Jinghua Yu, Stefan Wagner, Feng Luo
Comments: 8 pages, 5 figures, submitted to IEEE Systems Journal
Journal-ref: PeerJ Computer Science 7:e362, 2021
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE); Systems and Control (eess.SY)
[39] arXiv:2006.02932 [pdf, other]
Title: Vulnerability Analysis of 2500 Docker Hub Images
Katrine Wist, Malene Helsem, Danilo Gligoroski
Comments: Accepted as a full paper the 19th International Conference on Security & Management (SAM'20), July 27-30, 2020, USA. This is extended summary of the Master Thesis written under the supervision of prof. Danilo Gligoroski by Katrine Wist and Malene Helsem, "An Extensive Analysis of the Current Vulnerability Landscape in Docker Hub Images", Norwegian University of Science and Technology (NTNU), 2020
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:2006.02956 [pdf, other]
Title: A Fair, Traceable, Auditable and Participatory Randomization Tool for Legal Systems
Marcos Vinicius M. Silva, Marcos Antonio Simplicio Jr., Roberto Augusto Castellanos Pfeiffer, Julio Michael Stern
Subjects: Cryptography and Security (cs.CR); Other Statistics (stat.OT)
[41] arXiv:2006.03044 [pdf, other]
Title: Unstable Throughput: When the Difficulty Algorithm Breaks
Dragos I. Ilie, Sam M. Werner, Iain Stewart, William J. Knottenbelt
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[42] arXiv:2006.03205 [pdf, other]
Title: Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures
Vijay Varadharajan, Kallol Karmakar, Uday Tupakula, Michael Hitchens
Comments: Submitted to ESORICS 2020 (under review). 24 Pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[43] arXiv:2006.03317 [pdf, other]
Title: Securing IoT Applications using Blockchain: A Survey
Sreelakshmi K. K., Ashutosh Bhatia, Ankit Agrawal
Subjects: Cryptography and Security (cs.CR)
[44] arXiv:2006.03556 [pdf, other]
Title: Knock, Knock. Who's There? On the Security of LG's Knock Codes
Raina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu
Journal-ref: Symposium on Usable Privacy and Security 2020 (SOUPS '20)
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[45] arXiv:2006.03566 [pdf, other]
Title: PASSVM: A Highly Accurate Online Fast Flux Detection System
Basheer Al-Duwairi, Moath Jarrah, Ahmed Shatnawi
Comments: Submitted to Journal of Network and Systems Management
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[46] arXiv:2006.03596 [pdf, other]
Title: Blockchain, Fog and IoT Integrated Framework: Review, Architecture and Evaluation
Tanweer Alam, Mohamed Benaida
Journal-ref: Technology Reports of Kansai University, Vol 62(2), 2020
Subjects: Cryptography and Security (cs.CR)
[47] arXiv:2006.03684 [pdf, other]
Title: Differentially private partition selection
Damien Desfontaines, James Voss, Bryant Gipson, Chinmoy Mandayam
Comments: Accepted for publication in Proceedings on Privacy Enhancing Technologies (PoPETs), issue 2022.1
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[48] arXiv:2006.03707 [pdf, other]
Title: Scientific Calculator for Designing Trojan Detectors in Neural Networks
Peter Bajcsy, Nicholas J. Schaub, Michael Majurski
Comments: Presented at AAAI FSS-20: Artificial Intelligence in Government and Public Sector, Washington, DC, USA
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[49] arXiv:2006.03841 [pdf, other]
Title: Hardware-Software Contracts for Secure Speculation
Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila
Comments: Camera ready version that will appear in the proceedings of the 42nd IEEE Symposium on Security and Privacy (IEEE S&P 2021). A technical report containing a full formalization and proofs of all results is available at arXiv:2006.03841v2
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:2006.03854 [pdf, other]
Title: Bankrupt Covert Channel: Turning Network Predictability into Vulnerability
Dmitrii Ustiugov, Plamen Petrov, M.R. Siavash Katebzadeh, Boris Grot
Comments: Published in WOOT 2020 co-located with USENIX Security 2020
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:2006.03930 [pdf, other]
Title: An Attacker Modeling Framework for the Assessment of Cyber-Physical Systems Security
Christopher Deloglos, Carl Elks, Ashraf Tantawy
Subjects: Cryptography and Security (cs.CR)
[52] arXiv:2006.03986 [pdf, other]
Title: Online Advertising Security: Issues, Taxonomy, and Future Directions
Zahra Pooranian, Mauro Conti, Hamed Haddadi, Rahim Tafazolli
Comments: 31 pages, 13 figures, 4 tables, IEEE Communications Surveys & Tutorials
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[53] arXiv:2006.03995 [pdf, other]
Title: SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher
Keyvan Ramezanpour, Paul Ampadu, William Diehl
Comments: 25 pages, 11 figures, submitted to ACM JETC
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[54] arXiv:2006.04008 [pdf, other]
Title: Steganography GAN: Cracking Steganography with Cycle Generative Adversarial Networks
Nibraas Khan, Ruj Haan, George Boktor, Michael McComas, Ramin Daneshi
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2006.04098 [pdf, other]
Title: Contextualisation of Data Flow Diagrams for security analysis
Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries
Comments: Workshop pre-print
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[56] arXiv:2006.04219 [pdf, other]
Title: AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference
Qian Lou, Song Bian, Lei Jiang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[57] arXiv:2006.04384 [pdf, other]
Title: Distributed Attribute-Based Access Control System Using a Permissioned Blockchain
Sara Rouhani, Rafael Belchior, Rui S. Cruz, Ralph Deters
Subjects: Cryptography and Security (cs.CR)
[58] arXiv:2006.04487 [pdf, other]
Title: Blockchain Consensus and Integrity: Similarities and Learnings from Ancient Literature
Ashish Kundu, Arun Ayachitula, Nagamani Sistla
Comments: Updated title on Arxiv
Journal-ref: Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021}, pages: 303-306
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[59] arXiv:2006.04627 [pdf, other]
Title: A Survey on Split Manufacturing: Attacks, Defenses, and Challenges
Tiago D. Perez, Samuel Pagliarini
Subjects: Cryptography and Security (cs.CR)
[60] arXiv:2006.04654 [pdf, other]
Title: An operational architecture for privacy-by-design in public service applications
Prashant Agrawal, Anubhutie Singh, Malavika Raghavan, Subodh Sharma, Subhashis Banerjee
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[61] arXiv:2006.04693 [pdf, other]
Title: Blockchain-Based Differential Privacy Cost Management System
Leong Mei Han, Yang Zhao, Jun Zhao
Comments: This paper appears in ACM ASIA Conference on Computer and Communications Security (ACMASIACCS) 2020
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[62] arXiv:2006.04695 [pdf, other]
Title: Attacks to Federated Learning: Responsive Web User Interface to Recover Training Data from User Gradients
Hans Albert Lianto, Yang Zhao, Jun Zhao
Comments: This paper appears in ACM ASIA Conference on Computer and Communications Security (ACMASIACCS) 2020
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[63] arXiv:2006.04806 [pdf, other]
Title: SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses
Ruimin Sun, Alejandro Mera, Long Lu, David Choffnes
Comments: 18 pages w/ ref, Sok, PLC, ICS, CPS, attack, formal verification
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2006.05023 [pdf, other]
Title: On the Economics of Offline Password Cracking
Jeremiah Blocki, Ben Harsha, Samson Zhou
Comments: IEEE Symposium on Security and Privacy (S&P) 2018
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:2006.05042 [pdf, other]
Title: A Survey of Cybersecurity of Digital Manufacturing
Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T.S. Bukkapatanam, Nikhil Gupta, Ramesh Karri
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2006.05059 [pdf, other]
Title: Spatial Firewalls: Quarantining Malware Epidemics in Large Scale Massive Wireless Networks
Hesham Elsawy, Mustafa A. Kishk, Mohamed-Slim Alouini
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[67] arXiv:2006.05167 [pdf, other]
Title: Towards Generating Benchmark Datasets for Worm Infection Studies
Sara Asgari, Babak Sadeghiyan
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[68] arXiv:2006.05201 [pdf, other]
Title: A note on anonymous credentials using BLS signatures
Antoine Rondelet
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:2006.05390 [pdf, other]
Title: Democratising blockchain: A minimal agency consensus model
Marcin Abram, David Galindo, Daniel Honerkamp, Jonathan Ward, Jin-Mann Wong
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA)
[70] arXiv:2006.05609 [pdf, other]
Title: Learning With Differential Privacy
Poushali Sengupta, Sudipta Paul, Subhankar Mishra
Comments: 25 pages, Accepted to - ""Handbook of Research on Cyber Crime and Information Privacy"" as a book chapter
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[71] arXiv:2006.05914 [pdf, other]
Title: Mind the GAP: Security & Privacy Risks of Contact Tracing Apps
Lars Baumgärtner (1), Alexandra Dmitrienko (3), Bernd Freisleben (2), Alexander Gruler (2), Jonas Höchst (1 and 2), Joshua Kühlberg (1), Mira Mezini (1), Richard Mitev (1), Markus Miettinen (1), Anel Muhamedagic (1), Thien Duc Nguyen (1), Alvar Penning (2), Dermot Frederik Pustelnik (1), Filipp Roos (3), Ahmad-Reza Sadeghi (1), Michael Schwarz (2), Christian Uhl (2) ((1) TU Darmstadt, (2) Philipps-Universität Marburg, (3) JMU Würzburg)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[72] arXiv:2006.05930 [pdf, other]
Title: A Novel Topology-Guided Attack and Its Countermeasure Towards Secure Logic Locking
Yuqiao Zhang, Ayush Jain, Pinchen Cui, Ziqi Zhou, Ujjwal Guin
Subjects: Cryptography and Security (cs.CR)
[73] arXiv:2006.06036 [pdf, other]
Title: Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems
Federico Franzoni, Ivan Abellan, Vanesa Daza
Comments: 19 pages, 0 figures, Conference: Financial Cryptography and Data Security 2020
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:2006.06045 [pdf, other]
Title: Evaluating the Exploitability of Implicit Interactions in Distributed Systems
Jason Jaskolka
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:2006.06070 [pdf, other]
Title: Optimizing Smart Grid Aggregators and Measuring Degree of Privacy in a Distributed Trust Based Anonymous Aggregation System
Mohammad Saidur Rahman
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[76] arXiv:2006.06079 [pdf, other]
Title: Fast Privacy-Preserving Punch Cards
Saba Eskandarian
Subjects: Cryptography and Security (cs.CR)
[77] arXiv:2006.06122 [pdf, other]
Title: DNS Tunneling: A Deep Learning based Lexicographical Detection Approach
Franco Palau, Carlos Catania, Jorge Guerra, Sebastian Garcia, Maria Rigaki
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[78] arXiv:2006.06148 [pdf, other]
Title: Resiliency by Retrograded Communication- The Revival of Shortwave as a Military Communication Channel
Jan Kallberg, Stephen S. Hamilton
Comments: 3600 words, submitted to IEEE venue 06/10/20 (2020-06-10)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[79] arXiv:2006.06197 [pdf, other]
Title: Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
Fabrice Boudot (XLIM), Pierrick Gaudry (CARAMBA, LORIA), Aurore Guillevic (CARAMBA, LORIA), Nadia Heninger (UC San Diego), Emmanuel Thomé (CARAMBA, LORIA), Paul Zimmermann (CARAMBA, LORIA)
Journal-ref: The 40th Annual International Cryptology Conference (Crypto 2020), Aug 2020, Santa Barbara, USA, United States
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:2006.06290 [pdf, other]
Title: Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout
Thilo Krachenfels, Heiko Lohrke, Jean-Pierre Seifert, Enrico Dietz, Sven Frohmann, Heinz-Wilhelm Hübers
Subjects: Cryptography and Security (cs.CR)
[81] arXiv:2006.06296 [pdf, other]
Title: Fingerprinting Analog IoT Sensors for Secret-Free Authentication
Felix Lorenz, Lauritz Thamsen, Andreas Wilke, Ilja Behnke, Jens Waldmüller-Littke, Ilya Komarov, Odej Kao, Manfred Paeschke
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[82] arXiv:2006.06356 [pdf, other]
Title: Adversarial Attack Vulnerability of Medical Image Analysis Systems: Unexplored Factors
Gerda Bortsova, Cristina González-Gonzalo, Suzanne C. Wetstein, Florian Dubost, Ioannis Katramados, Laurens Hogeweg, Bart Liefers, Bram van Ginneken, Josien P.W. Pluim, Mitko Veta, Clara I. Sánchez, Marleen de Bruijne
Comments: First three authors contributed equally
Journal-ref: Medical Image Analysis. Available online 18 Jun 2021
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Image and Video Processing (eess.IV)
[83] arXiv:2006.06419 [pdf, other]
Title: DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts
Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo
Comments: 10 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:2006.06783 [pdf, other]
Title: Evading Curse of Dimensionality in Unconstrained Private GLMs via Private Gradient Descent
Shuang Song, Thomas Steinke, Om Thakkar, Abhradeep Thakurta
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)
[85] arXiv:2006.06806 [pdf, other]
Title: Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking
Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R.D. (Shawn)Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu, Vivek V. Menon, Matthew French, Peilin Song, Franco Stellari, Gi-Joon Nam, Peter Gadfort, Alric Althoff, Joseph Tostenrude, Saverio Fazzari, Eric Breckenfeld, Kenneth Plaks
Subjects: Cryptography and Security (cs.CR)
[86] arXiv:2006.06993 [pdf, other]
Title: CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring
Shailja Thakur, Carlos Moreno, Sebastian Fischmeister
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2006.07218 [pdf, other]
Title: An Accurate, Scalable and Verifiable Protocol for Federated Differentially Private Averaging
César Sabater, Aurélien Bellet, Jan Ramon
Comments: Accepted to Machine Learning Journal. This arXiv version contains an additional introduction to zero knowledge proofs (Appendix D.2)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG); Machine Learning (stat.ML)
[88] arXiv:2006.07350 [pdf, other]
Title: Exploiting ML algorithms for Efficient Detection and Prevention of JavaScript-XSS Attacks in Android Based Hybrid Applications
Usama Khalid, Muhammad Abdullah, Kashif Inayat
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[89] arXiv:2006.07676 [pdf, other]
Title: EchoIA: Implicit Authentication System Based on User Feedback
Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Sun
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:2006.07697 [pdf, other]
Title: Moving-Target Defense Against Cyber-Physical Attacks in Power Grids via Game Theory
Subhash Lakshminarayana, E. Veronica Belmega, H. Vincent Poor
Comments: arXiv admin note: substantial text overlap with arXiv:1908.02392
Journal-ref: IEEE Transactions on Smart Grid 2021
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Systems and Control (eess.SY)
[91] arXiv:2006.07700 [pdf, other]
Title: Defensive Approximation: Securing CNNs using Approximate Computing
Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh
Comments: ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2021)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[92] arXiv:2006.07709 [pdf, other]
Title: Auditing Differentially Private Machine Learning: How Private is Private SGD?
Matthew Jagielski, Jonathan Ullman, Alina Oprea
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[93] arXiv:2006.07817 [pdf, other]
Title: Topology-aware Differential Privacy for Decentralized Image Classification
Shangwei Guo, Tianwei Zhang, Guowen Xu, Han Yu, Tao Xiang, Yang Liu
Comments: Accepted by TCSVT
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[94] arXiv:2006.07908 [pdf, other]
Title: Launching Stealth Attacks using Cloud
Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[95] arXiv:2006.07914 [pdf, other]
Title: Cloud as an Attack Platform
Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[96] arXiv:2006.08016 [pdf, other]
Title: Equilibrium of Blockchain Miners with Dynamic Asset Allocation
Go Yamamoto, Aron Laszka, Fuhito Kojima
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[97] arXiv:2006.08060 [pdf, other]
Title: Forensic Considerations for the High Efficiency Image File Format (HEIF)
Sean McKeown, Gordon Russell
Comments: 8 pages, conference paper pre-print
Subjects: Cryptography and Security (cs.CR)
[98] arXiv:2006.08064 [pdf, other]
Title: Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks
Keval Doshi, Yasin Yilmaz, Suleyman Uludag
Comments: Submitted to IEEE Transactions on Dependable and Secure Computing
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)
[99] arXiv:2006.08131 [pdf, other]
Title: An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks
Ruixiang Tang, Mengnan Du, Ninghao Liu, Fan Yang, Xia Hu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[100] arXiv:2006.08249 [pdf, other]
Title: The EMV Standard: Break, Fix, Verify
David Basin, Ralf Sasse, Jorge Toro-Pozo
Comments: Accepted for IEEE S&P 2021
Subjects: Cryptography and Security (cs.CR)
[101] arXiv:2006.08255 [pdf, other]
Title: ISMS role in the improvement of digital forensics related process in SOC's
Masoud Hayeri Khyavi
Comments: 8 pages, 4 figures, 1 table
Journal-ref: International Journal of Forensic Engineering and Management, January 2023
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[102] arXiv:2006.08444 [pdf, other]
Title: Taxonomy and Practical Evaluation of Primality Testing Algorithms
Anas AbuDaqa, Amjad Abu-Hassan, Muhammad Imam
Comments: 20 pages, 16 figures
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[103] arXiv:2006.08513 [pdf, other]
Title: Flood & Loot: A Systemic Attack On The Lightning Network
Jona Harris, Aviv Zohar
Subjects: Cryptography and Security (cs.CR)
[104] arXiv:2006.08524 [pdf, other]
Title: A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types
Peter Mell, Assane Gueye
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[105] arXiv:2006.08538 [pdf, other]
Title: Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution
Yan Feng, Baoyuan Wu, Yanbo Fan, Li Liu, Zhifeng Li, Shutao Xia
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[106] arXiv:2006.08598 [pdf, other]
Title: Towards practical differentially private causal graph discovery
Lun Wang, Qi Pang, Dawn Song
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[107] arXiv:2006.08604 [pdf, other]
Title: Vulnerability Coverage for Secure Configuration
Shuvalaxmi Dass, Akbar Siami Namin
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[108] arXiv:2006.08723 [pdf, other]
Title: Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems
Subrato Bharati, Prajoy Podder, M. Rubaiyat Hossain Mondal, Md. Robiul Alam Robel
Comments: 12 pages, 7 figures
Journal-ref: Journal of Information Assurance and Security (ISSN 1554-1010), Volume 15 (2020), pp. 153-164, MIR Labs, www.mirlabs.net/jias/index.html
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Signal Processing (eess.SP)
[109] arXiv:2006.08749 [pdf, other]
Title: Using Amazon Alexa APIs as a Source of Digital Evidence
Clemens Krueger, Sean McKeown
Subjects: Cryptography and Security (cs.CR)
[110] arXiv:2006.08811 [pdf, other]
Title: A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
Charles F. Gonçalves, Daniel S. Menasché, Alberto Avritzer, Nuno Antunes, Marco Vieira
Comments: 2020 Mediterranean Communication and Computer Networking Conference (MedComNet)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[111] arXiv:2006.08817 [pdf, other]
Title: BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems
Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Sun
Comments: 12 pages. arXiv admin note: substantial text overlap with arXiv:1808.00638
Subjects: Cryptography and Security (cs.CR)
[112] arXiv:2006.08839 [pdf, other]
Title: Hash Cracking Benchmarking of Replacement Patterns
Ensar Seker
Subjects: Cryptography and Security (cs.CR)
[113] arXiv:2006.09108 [pdf, other]
Title: An STPA-based Approach for Systematic Security Analysis of In-vehicle Diagnostic and Software Update Systems
Jinghua Yu, Stefan Wagner, Feng Luo
Comments: 6 pages, 7 figures, submitted to FISITA 2020 World Congress
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE); Systems and Control (eess.SY)
[114] arXiv:2006.09171 [pdf, other]
Title: A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs
Pengfei Gao, Hongyi Xie, Fu Song, Taolue Chen
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[115] arXiv:2006.09271 [pdf, other]
Title: A Survey of Machine Learning Methods and Challenges for Windows Malware Classification
Edward Raff, Charles Nicholas
Comments: To appear in NeurIPS 2020 Workshop: ML Retrospectives, Surveys & Meta-Analyses (ML-RSA)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Applications (stat.AP); Machine Learning (stat.ML)
[116] arXiv:2006.09272 [pdf, other]
Title: Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection
Abdallah Moubayed, Emad Aqeeli, Abdallah Shami
Comments: 6 pages, 2 figures, 6 tables, Accepted in 2020 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE 2020)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Machine Learning (stat.ML)
[117] arXiv:2006.09287 [pdf, other]
Title: Building a Collaborative Phone Blacklisting System with Local Differential Privacy
Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad
Comments: 15 pages, 10 figures, 7 algorithms
Subjects: Cryptography and Security (cs.CR)
[118] arXiv:2006.09290 [pdf, other]
Title: Novel Randomized Placement for FPGA Based Robust ROPUF with Improved Uniqueness
Arjun Singh Chauhan, Vineet Sahula, Atanendu Sekhar Mandal
Journal-ref: Journal of Electronic Testing volume 35, pages 581 to 601 (2019)
Subjects: Cryptography and Security (cs.CR)
[119] arXiv:2006.09293 [pdf, other]
Title: An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
Reza Fotohi, Eslam Nazemi, Fereidoon Shams Aliee
Comments: 35 pages, 12 figures, 14 tables, Journal
Journal-ref: Vehicular Communications. 2020 May 28:100267
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:2006.09337 [pdf, other]
Title: Fast Free-text Authentication via Instance-based Keystroke Dynamics
Blaine Ayotte, Mahesh K. Banavar, Daqing Hou, Stephanie Schuckers
Comments: Paper accepted to IEEE Transactions on Biometrics, Behavior, and Identity Science (TBIOM)
Subjects: Cryptography and Security (cs.CR)
[121] arXiv:2006.09475 [pdf, other]
Title: SPEED: Secure, PrivatE, and Efficient Deep learning
Arnaud Grivet Sébert, Rafael Pinot, Martin Zuber, Cédric Gouy-Pailler, Renaud Sirdey
Comments: 32 pages, 3 figures. Mach Learn (2021)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[122] arXiv:2006.09511 [pdf, other]
Title: A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication
Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit, Alexandre Garel
Journal-ref: ACM Transactions on the Web, Volume 16, Issue 1, February 2022, Article 4, pp 1 62
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2006.09531 [pdf, other]
Title: Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices
Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L Jean Camp
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:2006.09532 [pdf, other]
Title: BoMaNet: Boolean Masking of an Entire Neural Network
Anuj Dubey, Rosario Cammarota, Aydin Aysu
Subjects: Cryptography and Security (cs.CR)
[125] arXiv:2006.09615 [pdf, other]
Title: De-Anonymizing Text by Fingerprinting Language Generation
Zhen Sun, Roei Schuster, Vitaly Shmatikov
Comments: NeurIPS 2020
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[126] arXiv:2006.09628 [pdf, other]
Title: Visor: Privacy-Preserving Video Analytics as a Cloud Service
Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, Raluca Ada Popa
Comments: USENIX Security 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[127] arXiv:2006.09769 [pdf, other]
Title: Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners
Andrea Valenza, Gabriele Costa, Alessandro Armando
Comments: Accepted at RAID 2020
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:2006.09809 [pdf, other]
Title: Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick
Comments: To be published at USENIX Security
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[129] arXiv:2006.09990 [pdf, other]
Title: ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols
Stavros Kassaras, Leandros Maglaras
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[130] arXiv:2006.10196 [pdf, other]
Title: MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree
Cong Dong, Zhigang Lu, Zelin Cui, Baoxu Liu, Kai Chen
Comments: Accepted in IEEE Transactions on Information Forensics and Security (TIFS)
Subjects: Cryptography and Security (cs.CR)
[131] arXiv:2006.10280 [pdf, other]
Title: CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies
Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2006.10284 [pdf, other]
Title: GNSS Spoofing Detection via Opportunistic IRIDIUM Signals
Gabriele Oligeri, Savio Sciancalepore, Roberto Di Pietro
Comments: Accepted for the 13th Conference on Security and Privacy in Wireless and Mobile Networks (WISEC), 2020
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[133] arXiv:2006.10289 [pdf, other]
Title: On the Design of Chaos-Based S-boxes
Miroslav Dimitrov
Journal-ref: IEEE Access ( Volume: 8 ), 24 June 2020
Subjects: Cryptography and Security (cs.CR)
[134] arXiv:2006.10306 [pdf, other]
Title: A Survey of COVID-19 Contact Tracing Apps
Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay Jha
Comments: Paper has been accepted for publication in IEEE Access. Currently available on IEEE ACCESS early access (see DOI)
Subjects: Cryptography and Security (cs.CR)
[135] arXiv:2006.10318 [pdf, other]
Title: Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version)
Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen
Comments: This is an extended version of our paper, which appears in USENIX Security 2020. For attack demos, see our project website: this https URL
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[136] arXiv:2006.10587 [pdf, other]
Title: Lightweight Collaborative Anomaly Detection for the IoT using Blockchain
Yisroel Mirsky, Tomer Golomb, Yuval Elovici
Comments: Preprint of accepted publication, June 2020: Journal of Parallel and Distributed Computing, Elsevier, ISSN: 0743-7315
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[137] arXiv:2006.10591 [pdf, other]
Title: Security Considerations for Internet of Things: A Survey
A. Jurcut, T. Niculcea, P. Ranaweera, A. LeKhac
Journal-ref: SN Computer Science (2020) 1:193, Springer Nature Singapore Pte Ltd 2020
Subjects: Cryptography and Security (cs.CR)
[138] arXiv:2006.10615 [pdf, other]
Title: AVClass2: Massive Malware Tag Extraction from AV Labels
Silvia Sebastián, Juan Caballero
Comments: 12 pages, 3 figures
Subjects: Cryptography and Security (cs.CR)
[139] arXiv:2006.10719 [pdf, other]
Title: SwissCovid: a critical analysis of risk assessment by Swiss authorities
Paul-Olivier Dehaye, Joel Reardon
Comments: v2
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[140] arXiv:2006.10861 [pdf, other]
Title: CoinPolice:Detecting Hidden Cryptojacking Attacks with Neural Networks
Ivan Petrov, Luca Invernizzi, Elie Bursztein
Subjects: Cryptography and Security (cs.CR)
[141] arXiv:2006.10915 [pdf, other]
Title: Simulation-Based Digital Twin Development for Blockchain Enabled End-to-End Industrial Hemp Supply Chain Risk Management
Keqi Wang, Wei Xie, Wencen Wu, Bo Wang, Jinxiang Pei, Mike Baker, Qi Zhou
Comments: 11 pages, 2 figures, 2020 Winter Simulation Conference
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[142] arXiv:2006.10933 [pdf, other]
Title: An Empirical Assessment of Global COVID-19 Contact Tracing Applications
Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe
Journal-ref: In proceedings of the 43rd International Conference on Software Engineering (ICSE 2021)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[143] arXiv:2006.10972 [pdf, other]
Title: On the Security of Proofs of Sequential Work in a Post-Quantum World
Jeremiah Blocki, Seunghoon Lee, Samson Zhou
Comments: 45 pages, 4 figures
Subjects: Cryptography and Security (cs.CR)
[144] arXiv:2006.10985 [pdf, other]
Title: Stateless Distributed Ledgers
François Bonnet (TITECH), Quentin Bramas (ICube, ICUBE-Réseaux), Xavier Défago (TITECH)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[145] arXiv:2006.11103 [pdf, other]
Title: Analyzing the Real-World Applicability of DGA Classifiers
Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert
Comments: Accepted at The 15th International Conference on Availability, Reliability and Security (ARES 2020)
Journal-ref: In The 15th International Conference on Availability, Reliability and Security (ARES 2020), ACM, 11 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[146] arXiv:2006.11130 [pdf, other]
Title: Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models
Josh Kalin, David Noever, Gerry Dozier
Comments: 11 pages, 4 figures, 6th International Conference on Data Mining
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[147] arXiv:2006.11165 [pdf, other]
Title: Backdoor Attacks to Graph Neural Networks
Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong
Comments: In ACM SACMAT, 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[148] arXiv:2006.11233 [pdf, other]
Title: Non-repudiable provenance for clinical decision support systems
Elliot Fairweather, Rudolf Wittner, Martin Chapman, Petr Holub, Vasa Curcin
Comments: Accepted at International Provenance & Annotation Workshop (IPAW), June 2020
Subjects: Cryptography and Security (cs.CR)
[149] arXiv:2006.11446 [pdf, other]
Title: MALOnt: An Ontology for Malware Threat Intelligence
Nidhi Rastogi, Sharmishtha Dutta, Mohammed J. Zaki, Alex Gittens, Charu Aggarwal
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
[150] arXiv:2006.11522 [pdf, other]
Title: Access Control Management for Computer-Aided Diagnosis Systems using Blockchain
Mayra Samaniego, Sara Hosseinzadeh Kassani, Cristian Espana, Ralph Deters
Comments: 5 pages, 7 figures, 1 table, 2020 IEEE International Conference on Smart Internet of Things (SmartIoT)
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[151] arXiv:2006.11657 [pdf, other]
Title: Securing Smart Home Edge Devices against Compromised Cloud Servers
Rahmadi Trimananda, Ali Younis, Thomas Kwa, Brian Demsky, Harry Xu
Comments: This is the technical report for the poster abstract titled Poster: Securing Smart Home Devices against Compromised Cloud Servers published at the 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge) 2020
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2006.11801 [pdf, other]
Title: Internet of Threats Introspection in Dynamic Intelligent Virtual Sensing
Victor R. Kebande, Joseph Bugeja, Jan A. Persson
Subjects: Cryptography and Security (cs.CR)
[153] arXiv:2006.11804 [pdf, other]
Title: Photos and Tags: A Method to Evaluate Privacy Behavior
Roba Darwish, Kambiz Ghazinour
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[154] arXiv:2006.11847 [pdf, other]
Title: An image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Temadher Alassiry Al-Maadeed, Iqtadar Hussain, Amir Anees, M. T. Mustafa
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT); Rings and Algebras (math.RA)
[155] arXiv:2006.11928 [pdf, other]
Title: With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models
Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian
Comments: Accepted to IEEE Transactions on Information Forensics and Security (TIFS) 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[156] arXiv:2006.11929 [pdf, other]
Title: Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic
Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier Bellekens
Comments: 20 pages, 6 figures
Journal-ref: Computers & Security 2021
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[157] arXiv:2006.11946 [pdf, other]
Title: Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu
Subjects: Cryptography and Security (cs.CR)
[158] arXiv:2006.11996 [pdf, other]
Title: You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications
Rasoul Jahanshahi, Adam Doupé, Manuel Egele
Comments: Accepted in ASIACCS 2020
Subjects: Cryptography and Security (cs.CR)
[159] arXiv:2006.12018 [pdf, other]
Title: Overlook: Differentially Private Exploratory Visualization for Big Data
Pratiksha Thaker, Mihai Budiu, Parikshit Gopalan, Udi Wieder, Matei Zaharia
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[160] arXiv:2006.12031 [pdf, other]
Title: MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[161] arXiv:2006.12047 [pdf, other]
Title: Verifying Accountability for Unbounded Sets of Participants
Kevin Morio, Robert Künnemann
Comments: 22 pages, Full version of the corresponding CSF 2021 paper
Journal-ref: IEEE CSF 2021, Vol. 1, p. 327-342
Subjects: Cryptography and Security (cs.CR)
[162] arXiv:2006.12056 [pdf, other]
Title: An In-Depth Security Assessment of Maritime Container Terminal Software Systems
Joseph O. Eichenhofer, Elisa Heymann, Barton P. Miller, Arnold Kang
Comments: 18 pages, 9 figures, submitted to IEEE Access
Subjects: Cryptography and Security (cs.CR)
[163] arXiv:2006.12069 [pdf, other]
Title: Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study
Leonardo Horn Iwaya, Aakash Ahmad, M. Ali Babar
Comments: 29 pages, 10 figures, in IEEE Access, 2020
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[164] arXiv:2006.12306 [pdf, other]
Title: Time-Variant Proof-of-Work Using Error-Correction Codes
Sangjun Park, Haeung Choi, Heung-No Lee
Comments: 13pages
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[165] arXiv:2006.12338 [pdf, other]
Title: Differentially Private Convex Optimization with Feasibility Guarantees
Vladimir Dvorkin, Ferdinando Fioretto, Pascal Van Hentenryck, Jalal Kazempour, Pierre Pinson
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC)
[166] arXiv:2006.12352 [pdf, other]
Title: A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
Subjects: Cryptography and Security (cs.CR)
[167] arXiv:2006.12665 [pdf, other]
Title: Blockchain for Academic Credentials
Chaitanya Bapat
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[168] arXiv:2006.12698 [pdf, other]
Title: Security and Privacy Preserving Deep Learning
Saichethan Miriyala Reddy, Saisree Miriyala
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[169] arXiv:2006.12784 [pdf, other]
Title: Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu
Comments: The paper will appear in Usenix Security Symposium 2021
Subjects: Cryptography and Security (cs.CR)
[170] arXiv:2006.12810 [pdf, other]
Title: The uncertainty of Side-Channel Analysis: A way to leverage from heuristics
Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz
Comments: 30 pages, 8 figures
Subjects: Cryptography and Security (cs.CR)
[171] arXiv:2006.12831 [pdf, other]
Title: SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android
Yupeng Hu, Zhe Jin, Wenjia Li, Yang Xiang, Jiliang Zhang
Subjects: Cryptography and Security (cs.CR)
[172] arXiv:2006.13051 [pdf, other]
Title: Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack
Hanrui Wang, Xingbo Dong, Zhe Jin, Andrew Beng Jin Teoh, Massimo Tistarelli
Subjects: Cryptography and Security (cs.CR)
[173] arXiv:2006.13353 [pdf, other]
Title: CacheOut: Leaking Data on Intel CPUs via Cache Evictions
Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom
Subjects: Cryptography and Security (cs.CR)
[174] arXiv:2006.13354 [pdf, other]
Title: A First Look at Privacy Analysis of COVID-19 Contact Tracing Mobile Applications
Muhammad Ajmal Azad, Junaid Arshad, Ali Akmal, Farhan Riaz, Sidrah Abdullah, Muhammad Imran, Farhan Ahmad
Comments: submitted to IEEE IOT JOurnal
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[175] arXiv:2006.13362 [pdf, other]
Title: ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing
Yuxiang Luo, Cheng Zhang, Yunqi Zhang, Chaoshun Zuo, Dong Xuan, Zhiqiang Lin, Adam C. Champion, Ness Shroff
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Sound (cs.SD); Social and Information Networks (cs.SI); Audio and Speech Processing (eess.AS)
[176] arXiv:2006.13364 [pdf, other]
Title: A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission
Md Whaiduzzaman, Md. Razon Hossain, Ahmedur Rahman Shovon, Shanto Roy, Aron Laszka, Rajkumar Buyya, Alistair Barros
Comments: 12 pages, 9 figures, 1 table, 1 algorithm
Subjects: Cryptography and Security (cs.CR)
[177] arXiv:2006.13462 [pdf, other]
Title: DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model
Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li
Comments: Published in IEEE Transactions on Dependable and Secure Computing (TDSC)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[178] arXiv:2006.13499 [pdf, other]
Title: Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack
Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali
Comments: 15 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC); Social and Information Networks (cs.SI)
[179] arXiv:2006.13598 [pdf, other]
Title: A Survey of Published Attacks on Intel SGX
Alexander Nilsson, Pegah Nikbakht Bideh, Joakim Brorsson
Comments: Technical Report
Subjects: Cryptography and Security (cs.CR)
[180] arXiv:2006.13813 [pdf, other]
Title: Lightweight Cryptography for IoT: A State-of-the-Art
Vishal A. Thakor, M.A. Razzaque, Muhammad R. A. Khandaker
Comments: This paper has beend submitted to IEEE Access Journal
Subjects: Cryptography and Security (cs.CR)
[181] arXiv:2006.13920 [pdf, other]
Title: Practical and Verifiable Electronic Sortition
Hsun Lee, Hsu-Chun Hsiao
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[182] arXiv:2006.13981 [pdf, other]
Title: DDoSNet: A Deep-Learning Model for Detecting Network Attacks
Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut
Comments: Published in Proc. IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020
Subjects: Cryptography and Security (cs.CR)
[183] arXiv:2006.13990 [pdf, other]
Title: WikipediaBot: Automated Adversarial Manipulation of Wikipedia Articles
Filipo Sharevski, Peter Jachim
Subjects: Cryptography and Security (cs.CR)
[184] arXiv:2006.14042 [pdf, other]
Title: Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[185] arXiv:2006.14109 [pdf, other]
Title: Scalable Data Classification for Security and Privacy
Paulo Tanaka, Sameet Sapra, Nikolay Laptev
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[186] arXiv:2006.14147 [pdf, other]
Title: FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
M. Caner Tol, Berk Gulmezoglu, Koray Yurtseven, Berk Sunar
Comments: IEEE European Symposium on Security and Privacy 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[187] arXiv:2006.14231 [pdf, other]
Title: A framework of blockchain-based secure and privacy-preserving E-government system
Noe Elisa, Longzhi Yang, Fei Chao, Yi Cao
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR)
[188] arXiv:2006.14234 [pdf, other]
Title: Consortium Blockchain for Security and Privacy-Preserving in E-government Systems
Noe Elisa, Longzhi Yang, Honglei Li, Fei Chao, Nitin Naik
Comments: 9 pages
Subjects: Cryptography and Security (cs.CR)
[189] arXiv:2006.14329 [pdf, other]
Title: Differentially Private Health Tokens for Estimating COVID-19 Risk
David Butler, Chris Hicks, James Bell, Carsten Maple, Jon Crowcroft
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[190] arXiv:2006.14352 [pdf, other]
Title: HARMer: Cyber-attacks Automation and Evaluation
Simon Yusuf Enoch, Zhibin Huang, Chun Yong Moon, Donghwan Lee, Myung Kil Ahn, Dong Seong Kim
Comments: 19 pages, journal
Journal-ref: IEEE Access, 8, 129397-129414 (2020)
Subjects: Cryptography and Security (cs.CR)
[191] arXiv:2006.14765 [pdf, other]
Title: Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity
Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cecile Paris, Surya Nepal, Yang Xiang
Comments: 13 pages (main content) + 4 pages (references and appendix)
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[192] arXiv:2006.14782 [pdf, other]
Title: WorkerRep: Immutable Reputation System For Crowdsourcing Platform Based on Blockchain
Gurpriya Kaur Bhatia, Shubham Gupta, Alpana Dubey, Ponnurangam Kumaraguru
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[193] arXiv:2006.14864 [pdf, other]
Title: Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting
Will Abramson, Nicole E. van Deursen, William J Buchanan
Journal-ref: Blockchain in Healthcare Today, 3 (2020)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[194] arXiv:2006.14890 [pdf, other]
Title: CyRes -- Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract)
Carsten Maple, Peter Davies, Kerstin Eder, Chris Hankin, Greg Chance, Gregory Epiphaniou
Comments: 7 pages, extended abstract
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Robotics (cs.RO); Systems and Control (eess.SY)
[195] arXiv:2006.15007 [pdf, other]
Title: Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite
Aria Shahverdi, Mahammad Shirinov, Dana Dachman-Soled
Comments: Source code : this https URL
Subjects: Cryptography and Security (cs.CR)
[196] arXiv:2006.15074 [pdf, other]
Title: Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses
Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen
Comments: 13 pages, 5 figures, 16 tables
Subjects: Cryptography and Security (cs.CR)
[197] arXiv:2006.15270 [pdf, other]
Title: Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services
Vijay Varadharajan, Uday Tupakula, Kallol Karmakar
Comments: 20 Pages. Submitted to Esorics 2020 (Under Review)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[198] arXiv:2006.15272 [pdf, other]
Title: Software Enabled Security Architecture for Counteracting Attacks in Control Systems
Uday Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar
Comments: 8 Pages
Subjects: Cryptography and Security (cs.CR)
[199] arXiv:2006.15275 [pdf, other]
Title: XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices
Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman
Comments: Keywords: containers, devops, devsecops, grey literature, kubernetes, practices, review, security, systematization of knowledge
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[200] arXiv:2006.15340 [pdf, other]
Title: Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)
Hanan Hindy, Ethan Bayne, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Xavier Bellekens
Comments: 14 pages, 5 figures, to be published in the proceeding of the 12th International Network Conference 2020 (INC2020)
Subjects: Cryptography and Security (cs.CR)
[201] arXiv:2006.15343 [pdf, other]
Title: Leveraging Siamese Networks for One-Shot Intrusion Detection Model
Hanan Hindy, Christos Tachtatzis, Robert Atkinson, David Brosset, Miroslav Bures, Ivan Andonovic, Craig Michie, Xavier Bellekens
Comments: 12 pages, 2 figures, J Intell Inf Syst (2022)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[202] arXiv:2006.15344 [pdf, other]
Title: Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection
Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, Xavier Bellekens
Comments: 18 pages, 4 figures
Journal-ref: Electronics 2020, 9, 1684
Subjects: Cryptography and Security (cs.CR)
[203] arXiv:2006.15433 [pdf, other]
Title: Privacy Risk and Preservation For COVID-19 Contact Tracing Apps
Dong Wang, Fang Liu
Comments: To appear in CHANCE 33(2): special issue on COVID-19
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[204] arXiv:2006.15725 [pdf, other]
Title: Best-Effort Adversarial Approximation of Black-Box Malware Classifiers
Abdullah Ali, Birhanu Eshete
Comments: 24 pages, 19 figures, 5 tables, to appear in the proceedings of the 16th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM'20)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[205] arXiv:2006.15826 [pdf, other]
Title: Towards Learning-automation IoT Attack Detection through Reinforcement Learning
Tianbo Gu, Allaukik Abhishek, Hao Fu, Huanle Zhang, Debraj Basu, Prasant Mohapatra
Comments: 11 pages, 8 figures, 2 tables, to appear in the 21st IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2020)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[206] arXiv:2006.15827 [pdf, other]
Title: IoTGaze: IoT Security Enforcement via Wireless Context Analysis
Tianbo Gu, Zheng Fang, Allaukik Abhishek, Hao Fu, Pengfei Hu, Prasant Mohapatra
Comments: 9 pages, 11 figures, 3 tables, to appear in the IEEE International Conference on Computer Communications (IEEE INFOCOM 2020)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[207] arXiv:2006.15904 [pdf, other]
Title: Multi-armed bandit approach to password guessing
Hazel Murray, David Malone
Subjects: Cryptography and Security (cs.CR)
[208] arXiv:2006.16111 [pdf, other]
Title: 3- and 5-Isogenies of Supersingular Edwards Curves
Anatoly Bessalov, Evgeniy Grubiyan, Volodymyr Sokolov, Pavlo Skladannyi
Journal-ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 8(4), 2020
Subjects: Cryptography and Security (cs.CR)
[209] arXiv:2006.16345 [pdf, other]
Title: SeMPE: Secure Multi Path Execution Architecture for Removing Conditional Branch Side Channels
Andrea Mondelli, Paul Gazzillo, Yan Solihin
Comments: This paper is currently under submission. We arXiv our paper to establish credit for inventing this work
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[210] arXiv:2006.16374 [pdf, other]
Title: Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure
John N. Brewer III, George Dimitoglou
Subjects: Cryptography and Security (cs.CR)
[211] arXiv:2006.16380 [pdf, other]
Title: Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory
Ploy Unchit, Sanchari Das, Andrew Kim, L. Jean Camp
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[212] arXiv:2006.16385 [pdf, other]
Title: On the Privacy-Utility Tradeoff in Peer-Review Data Analysis
Wenxin Ding, Nihar B. Shah, Weina Wang
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (cs.LG)
[213] arXiv:2006.16545 [pdf, other]
Title: Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Deqiang Li, Qianmu Li
Comments: D. Li and Q. Li, "Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection," in IEEE Transactions on Information Forensics and Security (early access)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[214] arXiv:2006.16554 [pdf, other]
Title: Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks
Debraj Basu, Tianbo Gu, Prasant Mohapatra
Comments: 17 pages, 5 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[215] arXiv:2006.16601 [pdf, other]
Title: Symbolic Execution and Debugging Synchronization
Andrea Fioraldi
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[216] arXiv:2006.16640 [pdf, other]
Title: CVE based classification of vulnerable IoT systems
Grzegorz J. Blinowski, Paweł Piotrowski
Comments: A shorter version of this paper was published in Proc. of the DepCoS-RELCOMEX conference
Journal-ref: Theory and Applications of Dependable Computer Systems, Proceedings of the Fifteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 29 - July 3, 2020, Brunow, Poland; ISBN 978-3-030-48256-5
Subjects: Cryptography and Security (cs.CR)
[217] arXiv:2006.16714 [pdf, other]
Title: Bitcoin Covenants: Three Ways to Control the Future
Jacob Swambo, Spencer Hommel, Bob McElrath, Bryan Bishop
Subjects: Cryptography and Security (cs.CR)
[218] arXiv:2006.16921 [pdf, other]
Title: Firmware Insider: Bluetooth Randomness is Mostly Random
Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick
Comments: WOOT'20
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Networking and Internet Architecture (cs.NI)
[219] arXiv:2006.16974 [pdf, other]
Title: Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures
Jiachen Sun, Yulong Cao, Qi Alfred Chen, Z. Morley Mao
Comments: 18 pages, 27 figures, to be published in USENIX Security 2020
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[220] arXiv:2006.00097 (cross-list from cs.NI) [pdf, other]
Title: Programmable In-Network Obfuscation of Traffic
Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[221] arXiv:2006.00310 (cross-list from cs.NI) [pdf, other]
Title: Introducing Network Coding to RPL: The Chained Secure Mode (CSM)
Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy
Comments: 4 pages, 6 figures, 1 table, Accepted at The 19th IEEE International Symposium on Network Computing and Applications (NCA 2020)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[222] arXiv:2006.00618 (cross-list from cs.LG) [pdf, other]
Title: Applying support vector data description for fraud detection
Mohamad Khedmati, Masoud Erfani, Mohammad GhasemiGol
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[223] arXiv:2006.01085 (cross-list from quant-ph) [pdf, other]
Title: Quantum Garbled Circuits
Zvika Brakerski, Henry Yuen
Comments: 66 pages. Updated the erroneous claim from v1 about the complexity of information-theoretic QRE as matching the classical case. Added an application of QRE to zero-knowledge for QMA
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[224] arXiv:2006.01758 (cross-list from cs.DC) [pdf, other]
Title: The Ritva Blockchain: Enabling Confidential Transactions at Scale
Henri Aare, Peter Vitols
Comments: The paper has been updated to address the editorial comments. arXiv admin note: substantial text overlap with arXiv:1905.06460, arXiv:1811.12628 by other authors
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[225] arXiv:2006.01888 (cross-list from cs.IR) [pdf, other]
Title: Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start
Zhuoran Liu, Martha Larson
Comments: Our code is available at this https URL
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[226] arXiv:2006.01906 (cross-list from eess.AS) [pdf, other]
Title: Detecting Audio Attacks on ASR Systems with Dropout Uncertainty
Tejas Jayashankar, Jonathan Le Roux, Pierre Moulin
Comments: Accepted for publication at Interspeech 2020
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Machine Learning (stat.ML)
[227] arXiv:2006.01944 (cross-list from cs.LG) [pdf, other]
Title: Designing Differentially Private Estimators in High Dimensions
Aditya Dhar, Jason Huang
Comments: 9 pages, 3 figures, presented at the ICML 2020 Workshop on Economics of Privacy and Data Labor
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (stat.ML)
[228] arXiv:2006.01980 (cross-list from stat.ML) [pdf, other]
Title: On the Equivalence between Online and Private Learnability beyond Binary Classification
Young Hun Jung, Baekjin Kim, Ambuj Tewari
Comments: An earlier version of this manuscript claimed an upper bound over the sample complexity that is exponential in the Littlestone dimension. The argument contained a technical mistake, and the current version presents a correction that deteriorates the dependence on the Littlestone dimension from exponential to doubly exponential. arXiv admin note: text overlap with arXiv:2003.00563 by other authors
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[229] arXiv:2006.02241 (cross-list from cs.SI) [pdf, other]
Title: Unlinking super-linkers: the topology of epidemic response (Covid-19)
Shishir Nagaraja
Comments: 16 pages, 4 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Physics and Society (physics.soc-ph); Populations and Evolution (q-bio.PE)
[230] arXiv:2006.02397 (cross-list from math.ST) [pdf, html, other]
Title: One Step to Efficient Synthetic Data
Jordan Awan, Zhanrui Cai
Comments: 30 pages before references and appendices
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Computation (stat.CO)
[231] arXiv:2006.02471 (cross-list from cs.CY) [pdf, other]
Title: Can WhatsApp Benefit from Debunked Fact-Checked Stories to Reduce Misinformation?
Julio C. S. Reis, Philipe de Freitas Melo, Kiran Garimella, Fabrício Benevenuto
Comments: This is a preprint version of an accepted manuscript on The Harvard Kennedy School (HKS) Misinformation Review. Please, consider to cite it instead of this one
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[232] arXiv:2006.02735 (cross-list from cs.DC) [pdf, other]
Title: Is Blockchain Suitable for Data Freshness? -- Age-of-Information Perspective
Sungho Lee, Minsu Kim, Jemin Lee, Ruei-Hau Hsu, Tony Q. S. Quek
Comments: 7 pages, 6 figures; This paper is under review in IEEE Network Magazine
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[233] arXiv:2006.02931 (cross-list from cs.NI) [pdf, other]
Title: Federated Learning for 6G Communications: Challenges, Methods, and Future Directions
Yi Liu, Xingliang Yuan, Zehui Xiong, Jiawen Kang, Xiaofei Wang, Dusit Niyato
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234] arXiv:2006.03463 (cross-list from cs.LG) [pdf, other]
Title: Sponge Examples: Energy-Latency Attacks on Neural Networks
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson
Comments: Accepted at 6th IEEE European Symposium on Security and Privacy (EuroS&P)
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[235] arXiv:2006.03504 (cross-list from eess.SP) [pdf, other]
Title: SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun
Comments: This paper has been accepted by the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 2020
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[236] arXiv:2006.03568 (cross-list from eess.SP) [pdf, other]
Title: Graph Layer Security: Encrypting Information via Common Networked Physics
Zhuangkun Wei, Liang Wang, Schyler Chengyao Sun, Bin Li, Weisi Guo
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[237] arXiv:2006.03637 (cross-list from cs.LG) [pdf, other]
Title: LDP-Fed: Federated Learning with Local Differential Privacy
Stacey Truex, Ling Liu, Ka-Ho Chow, Mehmet Emre Gursoy, Wenqi Wei
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[238] arXiv:2006.03686 (cross-list from q-fin.ST) [pdf, other]
Title: Adversarial Robustness of Deep Convolutional Candlestick Learner
Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur
Comments: arXiv admin note: text overlap with arXiv:2005.06731
Subjects: Statistical Finance (q-fin.ST); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[239] arXiv:2006.03833 (cross-list from cs.LG) [pdf, other]
Title: Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
Stefano Melacci, Gabriele Ciravegna, Angelo Sotgiu, Ambra Demontis, Battista Biggio, Marco Gori, Fabio Roli
Comments: Accepted for publications in IEEE TPAMI journal
Journal-ref: IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 12, pp. 9944-9959, 1 Dec. 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[240] arXiv:2006.03845 (cross-list from quant-ph) [pdf, other]
Title: Lowering the T-depth of Quantum Circuits By Reducing the Multiplicative Depth Of Logic Networks
Thomas Häner, Mathias Soeken
Comments: 8 pages, 3 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Emerging Technologies (cs.ET)
[241] arXiv:2006.03870 (cross-list from cs.CV) [pdf, other]
Title: Towards large-scale, automated, accurate detection of CCTV camera objects using computer vision. Applications and implications for privacy, safety, and cybersecurity. (Preprint)
Hannu Turtiainen, Andrei Costin, Tuomo Lahtinen, Lauri Sintonen, Timo Hamalainen
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[242] arXiv:2006.03873 (cross-list from cs.LG) [pdf, other]
Title: Unique properties of adversarially trained linear classifiers on Gaussian data
Jamie Hayes
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[243] arXiv:2006.03918 (cross-list from cs.PL) [pdf, other]
Title: Bitcoin covenants unchained
Massimo Bartoletti, Stefano Lande, Roberto Zunino
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[244] arXiv:2006.03921 (cross-list from cs.MM) [pdf, other]
Title: Robust watermarking with double detector-discriminator approach
Marcin Plata, Piotr Syga
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[245] arXiv:2006.04125 (cross-list from cs.LG) [pdf, other]
Title: BUDS: Balancing Utility and Differential Privacy by Shuffling
Poushali Sengupta, Sudipta Paul, Subhankar Mishra
Comments: 11 pages, 3 images, 3 tables, Accepted to 11th ICCCNT, 2020, IIT KGP
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[246] arXiv:2006.04281 (cross-list from math.NT) [pdf, other]
Title: Commitment Schemes and Diophantine Equations
Jose Felipe Voloch
Comments: Invited talk at ANTS XIV
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[247] arXiv:2006.04522 (cross-list from quant-ph) [pdf, other]
Title: Client-Server Identification Protocols with Quantum PUF
Mina Doosti, Niraj Kumar, Mahshid Delavar, Elham Kashefi
Comments: 40 pages, 11 figures
Journal-ref: ACM Transactions on Quantum Computing; Volume 2 Issue 3 September 2021 Article No. 12 pp 1-40
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[248] arXiv:2006.04593 (cross-list from cs.LG) [pdf, other]
Title: ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing
Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis Bach
Comments: 26 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[249] arXiv:2006.04622 (cross-list from cs.LG) [pdf, other]
Title: Trade-offs between membership privacy & adversarially robust learning
Jamie Hayes
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[250] arXiv:2006.04747 (cross-list from cs.LG) [pdf, other]
Title: Secure Byzantine-Robust Machine Learning
Lie He, Sai Praneeth Karimireddy, Martin Jaggi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[251] arXiv:2006.04754 (cross-list from cs.DC) [pdf, other]
Title: Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials
Zoltán András Lux, Dirk Thatmann, Sebastian Zickau, Felix Beierle
Comments: Accepted for publication at the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS 2020)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[252] arXiv:2006.05148 (cross-list from cs.LG) [pdf, other]
Title: XOR Mixup: Privacy-Preserving Data Augmentation for One-Shot Federated Learning
MyungJae Shin, Chihoon Hwang, Joongheon Kim, Jihong Park, Mehdi Bennis, Seong-Lyun Kim
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[253] arXiv:2006.05263 (cross-list from quant-ph) [pdf, other]
Title: Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption"
Nayana Das, Goutam Paul
Journal-ref: Science Bulletin, Volume 65, Issue 24, 30 December 2020, Pages 2048-2049
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[254] arXiv:2006.05535 (cross-list from cs.LG) [pdf, other]
Title: Locally Private Graph Neural Networks
Sina Sajadmanesh, Daniel Gatica-Perez
Comments: Accepted at ACM CCS 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[255] arXiv:2006.05594 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks on Brain-Inspired Hyperdimensional Computing-Based Classifiers
Fangfang Yang, Shaolei Ren
Comments: 14 pages and 16 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[256] arXiv:2006.05648 (cross-list from cs.SI) [pdf, other]
Title: Evaluating Graph Vulnerability and Robustness using TIGER
Scott Freitas, Diyi Yang, Srijan Kumar, Hanghang Tong, Duen Horng Chau
Comments: Published at CIKM 2021 Resource Track
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[257] arXiv:2006.05650 (cross-list from quant-ph) [pdf, other]
Title: Tight Quantum Time-Space Tradeoffs for Function Inversion
Kai-Min Chung, Siyao Guo, Qipeng Liu, Luowen Qian
Comments: Minor updates from FOCS review comments
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[258] arXiv:2006.05660 (cross-list from cs.DS) [pdf, other]
Title: The nearest-colattice algorithm
Thomas Espitau, Paul Kirchner
Comments: 19 pages, presented at the Algorithmic Number Theory Symposium (ANTS 2020)
Subjects: Data Structures and Algorithms (cs.DS); Computational Geometry (cs.CG); Cryptography and Security (cs.CR)
[259] arXiv:2006.05812 (cross-list from cs.CY) [pdf, other]
Title: COVID-19 Contact-Tracing Mobile Apps: Evaluation and Assessment for Decision Makers
Ramesh Raskar, Greg Nadeau, John Werner, Rachel Barbar, Ashley Mehra, Gabriel Harp, Markus Leopoldseder, Bryan Wilson, Derrick Flakoll, Praneeth Vepakomma, Deepti Pahwa, Robson Beaudry, Emelin Flores, Maciej Popielarz, Akanksha Bhatia, Andrea Nuzzo, Matt Gee, Jay Summet, Rajeev Surati, Bikram Khastgir, Francesco Maria Benedetti, Kristen Vilcans, Sienna Leis, Khahlil Louisy
Comments: 32 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[260] arXiv:2006.06061 (cross-list from cs.LG) [pdf, other]
Title: Deterministic Gaussian Averaged Neural Networks
Ryan Campbell, Chris Finlay, Adam M Oberman
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[261] arXiv:2006.06069 (cross-list from cs.SI) [pdf, other]
Title: Robust Spammer Detection by Nash Reinforcement Learning
Yingtong Dou, Guixiang Ma, Philip S. Yu, Sihong Xie
Comments: Accepted by KDD 2020
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[262] arXiv:2006.06131 (cross-list from cs.NI) [pdf, other]
Title: Sovereign: User-Controlled Smart Homes
Zhiyi Zhang, Tianyuan Yu, Xinyu Ma, Yu Guan, Philipp Moll, Lixia Zhang
Journal-ref: IEEE Internet of Things Journal, 2022
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[263] arXiv:2006.06493 (cross-list from cs.CV) [pdf, other]
Title: Protecting Against Image Translation Deepfakes by Leaking Universal Perturbations from Black-Box Neural Networks
Nataniel Ruiz, Sarah Adel Bargal, Stan Sclaroff
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[264] arXiv:2006.06535 (cross-list from cs.LG) [pdf, other]
Title: Privacy Adversarial Network: Representation Learning for Mobile Data Privacy
Sicong Liu, Junzhao Du, Anshumali Shrivastava, Lin Zhong
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[265] arXiv:2006.06561 (cross-list from cs.LG) [pdf, other]
Title: ScoreGAN: A Fraud Review Detector based on Multi Task Learning of Regulated GAN with Data Augmentation
Saeedreza Shehnepoor, Roberto Togneri, Wei Liu, Mohammed Bennamoun
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[266] arXiv:2006.06618 (cross-list from stat.ML) [pdf, other]
Title: CoinPress: Practical Private Mean and Covariance Estimation
Sourav Biswas, Yihe Dong, Gautam Kamath, Jonathan Ullman
Comments: Code is available at this https URL
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (cs.LG); Statistics Theory (math.ST)
[267] arXiv:2006.06721 (cross-list from cs.LG) [pdf, other]
Title: Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks
Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy
Comments: 9 pages, 7 figures, under submission
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[268] arXiv:2006.06815 (cross-list from cs.CY) [pdf, other]
Title: Discussing Privacy and Surveillance on Twitter: A Case Study of COVID-19
Jayati Dev
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[269] arXiv:2006.06841 (cross-list from cs.LG) [pdf, other]
Title: Backdoors in Neural Models of Source Code
Goutham Ramakrishnan, Aws Albarghouthi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[270] arXiv:2006.06895 (cross-list from eess.SP) [pdf, other]
Title: Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things
Sekhar Rajendran, Zhi Sun, Feng Lin, Kui Ren
Comments: Keywords: Physical layer Security with Reconfigurable Intelligent Surface, Intelligent Reflective Surface, RF-Fingerprint, IoT security, Internet of things, Channel Robust; 13 pages, 11 figures, This paper is submitted to IEEE TIFS
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[271] arXiv:2006.06933 (cross-list from cs.SE) [pdf, other]
Title: Formal Verification of Access Control Model for My Health Record System
Victor Rivera
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[272] arXiv:2006.07026 (cross-list from cs.LG) [pdf, other]
Title: Backdoor Attacks on Federated Meta-Learning
Chien-Lun Chen, Leana Golubchik, Marco Paolieri
Comments: 13 pages, 19 figures, NeurIPS Workshop on Scalability, Privacy, and Security in Federated Learning (NeurIPS-SpicyFL), 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[273] arXiv:2006.07134 (cross-list from stat.ML) [pdf, other]
Title: Tight Differential Privacy for Discrete-Valued Mechanisms and for the Subsampled Gaussian Mechanism Using FFT
Antti Koskela, Joonas Jälkö, Lukas Prediger, Antti Honkela
Comments: 41 pages, 5 figures
Journal-ref: AISTATS (2021) 3358-3366
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[274] arXiv:2006.07267 (cross-list from cs.LG) [pdf, other]
Title: Leakage of Dataset Properties in Multi-Party Machine Learning
Wanrong Zhang, Shruti Tople, Olga Ohrimenko
Comments: Published in USENIX Security Symposium, 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[275] arXiv:2006.07272 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Stochastic Coordinate Descent
Georgios Damaskinos, Celestine Mendler-Dünner, Rachid Guerraoui, Nikolaos Papandreou, Thomas Parnell
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[276] arXiv:2006.07345 (cross-list from cs.CV) [pdf, other]
Title: Robust Baggage Detection and Classification Based on Local Tri-directional Pattern
Shahbano, Muhammad Abdullah, Kashif Inayat
Journal-ref: International Journal of Internet Technology and Secured Transactions (2021)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[277] arXiv:2006.07421 (cross-list from cs.CV) [pdf, other]
Title: Defending against GAN-based Deepfake Attacks via Transformation-aware Adversarial Faces
Chaofei Yang, Lei Ding, Yiran Chen, Hai Li
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[278] arXiv:2006.07489 (cross-list from cs.CV) [pdf, other]
Title: Multispectral Biometrics System Framework: Application to Presentation Attack Detection
Leonidas Spinoulas, Mohamed Hussein, David Geissbühler, Joe Mathai, Oswin G.Almeida, Guillaume Clivaz, Sébastien Marcel, Wael AbdAlmageed
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[279] arXiv:2006.07498 (cross-list from cs.CV) [pdf, other]
Title: Multi-Modal Fingerprint Presentation Attack Detection: Evaluation On A New Dataset
Leonidas Spinoulas, Hengameh Mirzaalian, Mohamed Hussein, Wael AbdAlmageed
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[280] arXiv:2006.07533 (cross-list from cs.CV) [pdf, other]
Title: FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction
Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu
Comments: 9 pages, accepted by ACM MM 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[281] arXiv:2006.07757 (cross-list from cs.LG) [pdf, other]
Title: Defending SVMs against Poisoning Attacks: the Hardness and DBSCAN Approach
Hu Ding, Fan Yang, Jiawei Huang
Subjects: Machine Learning (cs.LG); Computational Geometry (cs.CG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[282] arXiv:2006.07934 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems
Yuanjiang Cao, Xiaocong Chen, Lina Yao, Xianzhi Wang, Wei Emma Zhang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[283] arXiv:2006.07942 (cross-list from cs.GT) [pdf, other]
Title: Duplicity Games for Deception Design with an Application to Insider Threat Mitigation
Linan Huang, Quanyan Zhu
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[284] arXiv:2006.07986 (cross-list from cs.IT) [pdf, other]
Title: Fairness Under Feature Exemptions: Counterfactual and Observational Measures
Sanghamitra Dutta, Praveen Venkatesh, Piotr Mardziel, Anupam Datta, Pulkit Grover
Comments: Accepted at the IEEE Transactions on Information Theory (Shorter version at AAAI 2020 as an oral presentation)
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Machine Learning (stat.ML)
[285] arXiv:2006.08039 (cross-list from cs.LG) [pdf, other]
Title: Adversarial representation learning for synthetic replacement of private attributes
John Martinsson, Edvin Listo Zec, Daniel Gillblad, Olof Mogren
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[286] arXiv:2006.08265 (cross-list from cs.LG) [pdf, other]
Title: GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators
Dingfan Chen, Tribhuvanesh Orekondy, Mario Fritz
Comments: NeurIPS 2020, 18 pages
Journal-ref: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[287] arXiv:2006.08296 (cross-list from cs.CV) [pdf, other]
Title: Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment
Zahra Noury, Mahdi Rezaei
Comments: Version 2.0
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG); Machine Learning (stat.ML)
[288] arXiv:2006.08339 (cross-list from cs.CL) [pdf, other]
Title: Graph-Stega: Semantic Controllable Steganographic Text Generation Guided by Knowledge Graph
Zhongliang Yang, Baitao Gong, Yamin Li, Jinshuai Yang, Zhiwen Hu, Yongfeng Huang
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[289] arXiv:2006.08568 (cross-list from cs.CY) [pdf, other]
Title: PrivyTRAC: Privacy and Security Preserving Contact Tracing System
Ssu-Hsin Yu
Comments: 11 pages, 5 figures; submitted to EmergencyComm 2020
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[290] arXiv:2006.08614 (cross-list from cs.SE) [pdf, other]
Title: Learning to map source code to software vulnerability using code-as-a-graph
Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Programming Languages (cs.PL)
[291] arXiv:2006.08669 (cross-list from stat.ML) [pdf, other]
Title: On Adversarial Bias and the Robustness of Fair Machine Learning
Hongyan Chang, Ta Duy Nguyen, Sasi Kumar Murakonda, Ehsan Kazemi, Reza Shokri
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[292] arXiv:2006.08733 (cross-list from cs.LG) [pdf, other]
Title: CryptoNAS: Private Inference on a ReLU Budget
Zahra Ghodsi, Akshaj Veldanda, Brandon Reagen, Siddharth Garg
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[293] arXiv:2006.08915 (cross-list from cs.GT) [pdf, other]
Title: Edge computing based incentivizing mechanism for mobile blockchain in IOT
Liya Xu, Mingzhu Ge, Weili Wu
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[294] arXiv:2006.09276 (cross-list from cs.CV) [pdf, other]
Title: How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?
Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[295] arXiv:2006.09352 (cross-list from cs.DS) [pdf, other]
Title: A One-Pass Private Sketch for Most Machine Learning Tasks
Benjamin Coleman, Anshumali Shrivastava
Comments: 10 pages, 4 figures
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[296] arXiv:2006.09539 (cross-list from cs.LG) [pdf, other]
Title: AdvMind: Inferring Adversary Intent of Black-Box Attacks
Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang
Comments: Accepted as a full paper at KDD 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[297] arXiv:2006.10013 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Examples Detection and Analysis with Layer-wise Autoencoders
Bartosz Wójcik, Paweł Morawiecki, Marek Śmieja, Tomasz Krzyżek, Przemysław Spurek, Jacek Tabor
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[298] arXiv:2006.10091 (cross-list from cs.DC) [pdf, other]
Title: Faster Secure Data Mining via Distributed Homomorphic Encryption
Junyi Li, Heng Huang
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[299] arXiv:2006.10517 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Technology to Help Millions of People: Federated Prediction Model for Stroke Prevention
Ce Ju, Ruihui Zhao, Jichao Sun, Xiguang Wei, Bo Zhao, Yang Liu, Hongshan Li, Tianjian Chen, Xinwei Zhang, Dashan Gao, Ben Tan, Han Yu, Chuning He, Yuan Jin
Comments: 4 pages, 3 figures, 1 table, Accepted for Workshop on Federated Learning for Data Privacy and Confidentiality in Conjunction with IJCAI 2020 (FL-IJCAI'20)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[300] arXiv:2006.10521 (cross-list from cs.LG) [pdf, other]
Title: LSTM-TrajGAN: A Deep Learning Approach to Trajectory Privacy Protection
Jinmeng Rao, Song Gao, Yuhao Kang, Qunying Huang
Comments: 16 pages, 7 figures, in the Proceedings of the 11th International Conference on Geographic Information Science (GIScience 2021)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[301] arXiv:2006.10559 (cross-list from cs.LG) [pdf, other]
Title: Differentially-private Federated Neural Architecture Search
Ishika Singh, Haoyi Zhou, Kunlin Yang, Meng Ding, Bill Lin, Pengtao Xie
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[302] arXiv:2006.10843 (cross-list from cs.CY) [pdf, other]
Title: SSHealth: Toward Secure, Blockchain-Enabled Healthcare Systems
Alaa Awad Abdellatif, Abeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad, Carla Fabiana Chiasserini, Ahmed Refaey
Journal-ref: IEEE Network, 2020
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[303] arXiv:2006.10919 (cross-list from cs.LG) [pdf, other]
Title: On the effect of normalization layers on Differentially Private training of deep Neural networks
Ali Davody, David Ifeoluwa Adelani, Thomas Kleinbauer, Dietrich Klakow
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[304] arXiv:2006.11204 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Variational Autoencoders with Term-wise Gradient Aggregation
Tsubasa Takahashi, Shun Takagi, Hajime Ono, Tatsuya Komatsu
Comments: 10 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[305] arXiv:2006.11211 (cross-list from cs.SI) [pdf, other]
Title: Rumor source detection with multiple observations under adaptive diffusions
Miklos Z. Racz, Jacob Richey
Comments: 30 pages, 3 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Probability (math.PR); Statistics Theory (math.ST)
[306] arXiv:2006.11356 (cross-list from cs.CY) [pdf, other]
Title: Trust and Transparency in Contact Tracing Applications
Stacy Hobson, Michael Hind, Aleksandra Mojsilovic, Kush R. Varshney
Comments: 9 pages
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[307] arXiv:2006.11496 (cross-list from quant-ph) [pdf, other]
Title: Measure-resend authenticated semi-quantum key distribution with single photons
Chun-Hao Chang, Yu-Chin Lu, Tzonelih Hwang
Comments: 10 pages, 1 figure, 1 table
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[308] arXiv:2006.11601 (cross-list from cs.LG) [pdf, other]
Title: Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks
Lixin Fan, Kam Woh Ng, Ce Ju, Tianyu Zhang, Chang Liu, Chee Seng Chan, Qiang Yang
Comments: under review, 36 pages (updated Eq. 3 and Fig. 8)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (stat.ML)
[309] arXiv:2006.11604 (cross-list from cs.CV) [pdf, other]
Title: How do SGD hyperparameters in natural training affect adversarial robustness?
Sandesh Kamath, Amit Deshpande, K V Subrahmanyam
Comments: Preliminary version presented in ICML 2019 Workshop on "Understanding and Improving Generalization in Deep Learning" as "On Adversarial Robustness of Small vs Large Batch Training"
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[310] arXiv:2006.11776 (cross-list from cs.LG) [pdf, other]
Title: Network Moments: Extensions and Sparse-Smooth Attacks
Modar Alfadly, Adel Bibi, Emilio Botero, Salman Alsubaihi, Bernard Ghanem
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[311] arXiv:2006.11890 (cross-list from cs.LG) [pdf, other]
Title: Graph Backdoor
Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang
Comments: USENIX Security Symposium 2021, implementation: this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[312] arXiv:2006.12101 (cross-list from cs.LG) [pdf, other]
Title: P3GM: Private High-Dimensional Data Release via Privacy Preserving Phased Generative Model
Shun Takagi, Tsubasa Takahashi, Yang Cao, Masatoshi Yoshikawa
Comments: The version accepted at ICDE 2021 includes wrong proof in the Wishart mechanism. The current version fixes the problem
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Databases (cs.DB); Machine Learning (stat.ML)
[313] arXiv:2006.12135 (cross-list from cs.LG) [pdf, other]
Title: Learning to Generate Noise for Multi-Attack Robustness
Divyam Madaan, Jinwoo Shin, Sung Ju Hwang
Comments: Accepted to ICML 2021. Code available at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[314] arXiv:2006.12143 (cross-list from cs.NI) [pdf, other]
Title: Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks
Elias Rohrer, Florian Tschorsch
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[315] arXiv:2006.12239 (cross-list from math.NT) [pdf, other]
Title: The resolution of Niho's last conjecture concerning sequences, codes, and Boolean functions
Tor Helleseth, Daniel J. Katz, Chunlei Li
Comments: 27 pages; Sage code with verification of decomposition in Lemma 5.2 included as an ancillary file
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR); Information Theory (cs.IT); Combinatorics (math.CO)
[316] arXiv:2006.12247 (cross-list from cs.CV) [pdf, other]
Title: OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training
Eran Segalis, Eran Galili
Comments: 10 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[317] arXiv:2006.12388 (cross-list from econ.GN) [pdf, other]
Title: Stablecoins 2.0: Economic Foundations and Risk-based Models
Ariah Klages-Mundt, Dominik Harz, Lewis Gudgeon, Jun-You Liu, Andreea Minca
Subjects: General Economics (econ.GN); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[318] arXiv:2006.12555 (cross-list from cs.NI) [pdf, other]
Title: IXmon: Detecting and Analyzing DRDoS Attacks at Internet Exchange Points
Karthika Subramani, Roberto Perdisci, Maria Konte
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[319] arXiv:2006.12557 (cross-list from cs.LG) [pdf, other]
Title: Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks
Avi Schwarzschild, Micah Goldblum, Arjun Gupta, John P Dickerson, Tom Goldstein
Comments: 19 pages, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (stat.ML)
[320] arXiv:2006.12834 (cross-list from cs.LG) [pdf, other]
Title: Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks
Francesco Croce, Maksym Andriushchenko, Naman D. Singh, Nicolas Flammarion, Matthias Hein
Comments: Accepted at AAAI 2022. This version contains considerably extended results in the L0 threat model
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[321] arXiv:2006.13016 (cross-list from cs.LG) [pdf, other]
Title: Rotation-Equivariant Neural Networks for Privacy Protection
Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang
Comments: arXiv admin note: text overlap with arXiv:2003.08365
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[322] arXiv:2006.13039 (cross-list from stat.ML) [pdf, other]
Title: D2P-Fed: Differentially Private Federated Learning With Efficient Communication
Lun Wang, Ruoxi Jia, Dawn Song
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Methodology (stat.ME)
[323] arXiv:2006.13041 (cross-list from stat.ML) [pdf, other]
Title: Byzantine-Resilient High-Dimensional Federated Learning
Deepesh Data, Suhas Diggavi
Comments: 33 pages; title change; improved bound on the approximation error by the factor of H
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[324] arXiv:2006.13086 (cross-list from cs.NI) [pdf, other]
Title: Classifying Network Vendors at Internet Scale
Jordan Holland, Ross Teixeira, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan Mayer
Comments: 11 Pages, 2 figures, 7 tables
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[325] arXiv:2006.13087 (cross-list from cs.DC) [pdf, other]
Title: On the Interoperability of Decentralized Exposure Notification Systems
Marko Vukolic
Comments: 15 pages, 5 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[326] arXiv:2006.13488 (cross-list from cs.LG) [pdf, other]
Title: Distributionally-Robust Machine Learning Using Locally Differentially-Private Data
Farhad Farokhi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Statistics Theory (math.ST); Machine Learning (stat.ML)
[327] arXiv:2006.13501 (cross-list from cs.LG) [pdf, other]
Title: Private Stochastic Non-Convex Optimization: Adaptive Algorithms and Tighter Generalization Bounds
Yingxue Zhou, Xiangyi Chen, Mingyi Hong, Zhiwei Steven Wu, Arindam Banerjee
Comments: In the current version, we drop the experimental results on CIFAR-10 dataset due to an implementation error
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[328] arXiv:2006.13726 (cross-list from cs.CV) [pdf, other]
Title: Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness
Xingjun Ma, Linxi Jiang, Hanxun Huang, Zejia Weng, James Bailey, Yu-Gang Jiang
Comments: To appear in Machine Learning
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[329] arXiv:2006.13742 (cross-list from cs.CV) [pdf, other]
Title: PhishGAN: Data Augmentation and Identification of Homoglpyh Attacks
Joon Sern Lee, Gui Peng David Yam, Jin Hao Chan
Comments: 8 pages, 8 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[330] arXiv:2006.13977 (cross-list from cs.LG) [pdf, other]
Title: Bit Error Robustness for Energy-Efficient DNN Accelerators
David Stutz, Nandhini Chandramoorthy, Matthias Hein, Bernt Schiele
Subjects: Machine Learning (cs.LG); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[331] arXiv:2006.14026 (cross-list from cs.LG) [pdf, other]
Title: Subpopulation Data Poisoning Attacks
Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea
Comments: May12 update: add sever + backdoor defenses, comparison to witches' brew attack, better comparison to related work, transferability of representations for cmatch
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[332] arXiv:2006.14170 (cross-list from cs.LG) [pdf, other]
Title: Towards Differentially Private Text Representations
Lingjuan Lyu, Yitong Li, Xuanli He, Tong Xiao
Comments: Accepted to SIGIR'20
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[333] arXiv:2006.14360 (cross-list from cs.LG) [pdf, other]
Title: Stability Enhanced Privacy and Applications in Private Stochastic Gradient Descent
Lauren Watson, Benedek Rozemberczki, Rik Sarkar
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[334] arXiv:2006.14425 (cross-list from math.NT) [pdf, other]
Title: Strengthening the Baillie-PSW primality test
Robert Baillie, Andrew Fiori (University of Lethbridge), Samuel S. Wagstaff Jr. (Purdue University)
Comments: 25 pages
Journal-ref: Mathematics of Computation, Volume 90, Number 330, July 2021, p. 1931
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[335] arXiv:2006.14580 (cross-list from cs.CV) [pdf, other]
Title: Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
Comments: Accepted to the 2021 Conference on Computer Vision and Pattern Recognition (CVPR 2021); 14 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[336] arXiv:2006.14969 (cross-list from cs.PL) [pdf, other]
Title: Fully Abstract and Robust Compilation and How to Reconcile the Two, Abstractly
Carmine Abate, Matteo Busi, Stelios Tsampas
Comments: Extended version of the APLAS'21 paper
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[337] arXiv:2006.15117 (cross-list from cs.LG) [pdf, other]
Title: MMF: A loss extension for feature learning in open set recognition
Jingyun Jia, Philip K. Chan
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[338] arXiv:2006.15429 (cross-list from cs.LG) [pdf, other]
Title: Understanding Gradient Clipping in Private SGD: A Geometric Perspective
Xiangyi Chen, Zhiwei Steven Wu, Mingyi Hong
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[339] arXiv:2006.15449 (cross-list from cs.HC) [pdf, other]
Title: Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance
Magdalene Ng, Kovila P.L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliot, Aad van Moorsel
Comments: In Publication for 5th IEEE European Symposium on Security & Privacy Workshops (EuroSPW)
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[340] arXiv:2006.15632 (cross-list from cs.LG) [pdf, other]
Title: FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications
Yunfei Song, Tian Liu, Tongquan Wei, Xiangfeng Wang, Zhe Tao, Mingsong Chen
Journal-ref: IEEE Transactions on Industrial Informatics, 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[341] arXiv:2006.15673 (cross-list from cs.DB) [pdf, other]
Title: Differential Privacy of Hierarchical Census Data: An Optimization Approach
Ferdinando Fioretto, Pascal Van Hentenryck, Keyu Zhu
Comments: Corrected a claim in the Introduction and a typo in Model 1
Journal-ref: Artificial Intelligence 296 (2021): 103475
Subjects: Databases (cs.DB); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[342] arXiv:2006.15744 (cross-list from cs.DS) [pdf, other]
Title: Fast and Private Submodular and $k$-Submodular Functions Maximization with Matroid Constraints
Akbar Rafiey, Yuichi Yoshida
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Machine Learning (cs.LG)
[343] arXiv:2006.15824 (cross-list from cs.DC) [pdf, other]
Title: Smart Contract-based Computing ResourcesTrading in Edge Computing
Jinyue Song, Tianbo Gu, Yunjie Ge, Prasant Mohapatra
Comments: 8 pages, 9 figures, to appear in the 2020 Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2020)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[344] arXiv:2006.15877 (cross-list from cs.LG) [pdf, other]
Title: Reducing Risk of Model Inversion Using Privacy-Guided Training
Abigail Goldsteen, Gilad Ezov, Ariel Farkash
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[345] arXiv:2006.15998 (cross-list from cs.IT) [pdf, other]
Title: Distortion based Light-weight Security for Cyber-Physical Systems
Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada
Comments: arXiv admin note: substantial text overlap with arXiv:1809.04580
Journal-ref: Transactions in Automatic Control 2020
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[346] arXiv:2006.16057 (cross-list from cs.CV) [pdf, other]
Title: Forgery Detection in a Questioned Hyperspectral Document Image using K-means Clustering
Maria Yaseen, Rammal Aftab Ahmed, Rimsha Mahrukh
Comments: 5 pages,6 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[347] arXiv:2006.16176 (cross-list from cs.CL) [pdf, other]
Title: Natural Backdoor Attack on Text Data
Lichao Sun
Comments: under submission
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[348] arXiv:2006.16179 (cross-list from cs.CY) [pdf, other]
Title: Legal Risks of Adversarial Machine Learning Research
Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Comments: Accepted at ICML 2020 Workshop on Law & Machine Learning
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[349] arXiv:2006.16469 (cross-list from cs.LG) [pdf, other]
Title: Model-Targeted Poisoning Attacks with Provable Convergence
Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian
Comments: 32 pages, code available at: this https URL
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[350] arXiv:2006.16535 (cross-list from cs.AR) [pdf, other]
Title: RCP: A Low-overhead Reversible Coherence Protocol
You Wu, Xuehai Qian
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[351] arXiv:2006.16611 (cross-list from cs.SI) [pdf, other]
Title: Social Distancing 2.0 with Privacy-Preserving Contact Tracing to Avoid a Second Wave of COVID-19
Yu-Chen Ho, Yi-Hsuan Chen, Shen-Hua Hung, Chien-Hao Huang, Poga Po, Chung-Hsi Chan, Di-Kai Yang, Yi-Chin Tu, Tyng-Luh Liu, Chi-Tai Fang
Comments: 13 pages, 5 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR)
[352] arXiv:2006.16625 (cross-list from eess.IV) [pdf, other]
Title: BitMix: Data Augmentation for Image Steganalysis
In-Jae Yu, Wonhyuk Ahn, Seung-Hun Nam, Heung-Kyu Lee
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Multimedia (cs.MM)
[353] arXiv:2006.16849 (cross-list from cs.CY) [pdf, other]
Title: I call BS: Fraud Detection in Crowdfunding Campaigns
Beatrice Perez, Sara R. Machado, Jerone T. A. Andrews, Nicolas Kourtellis
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
Total of 353 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack