Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2020

Total of 347 entries : 1-25 76-100 101-125 126-150 151-175 176-200 201-225 226-250 ... 326-347
Showing up to 25 entries per page: fewer | more | all
[151] arXiv:2010.11079 [pdf, other]
Title: Security Issues and Challenges in Service Meshes -- An Extended Study
Dalton A. Hahn, Drew Davidson, Alexandru G. Bardas
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2010.11096 [pdf, other]
Title: RBAC for Healthcare-Infrastructure and data storage
Ramesh Narasimman, Izzat Alsmadi
Subjects: Cryptography and Security (cs.CR)
[153] arXiv:2010.11097 [pdf, other]
Title: Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption
Amr Alanwar, Victor Gassmann, Xingkang He, Hazem Said, Henrik Sandberg, Karl Henrik Johansson, Matthias Althoff
Comments: This paper is accepted at the European Journal of Control
Subjects: Cryptography and Security (cs.CR); Robotics (cs.RO)
[154] arXiv:2010.11127 [pdf, other]
Title: Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles
Gokcen Y. Dayanikli, Rees R. Hatch, Ryan M. Gerdes, Hongjie Wang, Regan Zane
Comments: Accepted by IEEE S&P Workshop on the Internet of Safe Things 2020
Subjects: Cryptography and Security (cs.CR)
[155] arXiv:2010.11143 [pdf, other]
Title: Progressive Defense Against Adversarial Attacks for Deep Learning as a Service in Internet of Things
Ling Wang, Cheng Zhang, Zejian Luo, Chenguang Liu, Jie Liu, Xi Zheng, Athanasios Vasilakos
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[156] arXiv:2010.11242 [pdf, other]
Title: Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Johannes Lauinger (1), Lars Baumgärtner (1), Anna-Katharina Wickert (1), Mira Mezini (1) ((1) Technische Universität Darmstadt)
Comments: This is a copy of the accepted version at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[157] arXiv:2010.11441 [pdf, other]
Title: Fusing Keys for Secret Communications: Towards Information-Theoretic Security
Longjiang Li, Bingchuan Ma, Jianjun Yang, Yonggang Li, Yuming Mao
Comments: 7 pages, 5 figures, submitted
Subjects: Cryptography and Security (cs.CR)
[158] arXiv:2010.11453 [pdf, other]
Title: Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic
Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[159] arXiv:2010.11461 [pdf, other]
Title: Selection of the optimal embedding positions of digital audio watermarking in wavelet domain
Yangxia Hu, Maode Ma, Wenhuan Lu, Neal N. Xiong, Jianguo Wei
Subjects: Cryptography and Security (cs.CR)
[160] arXiv:2010.11607 [pdf, other]
Title: Backdoor Attack against Speaker Verification
Tongqing Zhai, Yiming Li, Ziqi Zhang, Baoyuan Wu, Yong Jiang, Shu-Tao Xia
Comments: Accepted by the ICASSP 2021. The first two authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[161] arXiv:2010.11627 [pdf, other]
Title: Malware Traffic Classification: Evaluation of Algorithms and an Automated Ground-truth Generation Pipeline
Syed Muhammad Kumail Raza, Juan Caballero
Comments: Submission to arxiv was not authorized by one of the authors. They request removal of the document. Suspected plagiarised work without proper acknowledgement
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[162] arXiv:2010.11742 [pdf, other]
Title: Learning Black-Box Attackers with Transferable Priors and Query Feedback
Jiancheng Yang, Yangzhou Jiang, Xiaoyang Huang, Bingbing Ni, Chenglong Zhao
Comments: NeurIPS 2020. Code is available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[163] arXiv:2010.11796 [pdf, other]
Title: CryptoGRU: Low Latency Privacy-Preserving Text Analysis With GRU
Bo Feng, Qian Lou, Lei Jiang, Geoffrey C. Fox
Journal-ref: The 2021 Conference on Empirical Methods in Natural Language Processing
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[164] arXiv:2010.12078 [pdf, other]
Title: Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks
Mohd Sabra, Anindya Maiti, Murtuza Jadliwala
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Human-Computer Interaction (cs.HC)
[165] arXiv:2010.12112 [pdf, other]
Title: Investigating Membership Inference Attacks under Data Dependencies
Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum
Comments: IEEE 36th Computer Security Foundations Symposium (CSF)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[166] arXiv:2010.12134 [pdf, other]
Title: Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs
Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere
Comments: This is a copy of the accepted version at The 19th IEEE International Symposium on Network Computing and Applications (NCA 2020) [Core Rank: A]. The final version appearing in the conference proceedings will have additions and changes
Subjects: Cryptography and Security (cs.CR)
[167] arXiv:2010.12149 [pdf, other]
Title: DeFuzz: Deep Learning Guided Directed Fuzzing
Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Camtepe Seyit, Yang Xiang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[168] arXiv:2010.12168 [pdf, other]
Title: Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain
Sabah Suhail, Rasheed Hussain, Raja Jurdak, Choong Seon Hong
Journal-ref: IEEE Internet Computing, 26, 2022, 58-67
Subjects: Cryptography and Security (cs.CR)
[169] arXiv:2010.12171 [pdf, other]
Title: DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Shiyi Yang, Peilun Wu, Hui Guo
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[170] arXiv:2010.12252 [pdf, other]
Title: Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren
Comments: 6 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[171] arXiv:2010.12269 [pdf, other]
Title: Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi
Comments: To appear in the proceedings of the 30th USENIX Security Symposium 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[172] arXiv:2010.12346 [pdf, other]
Title: Data-driven Regularized Inference Privacy
Chong Xiao Wang, Wee Peng Tay
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[173] arXiv:2010.12400 [pdf, other]
Title: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX
Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[174] arXiv:2010.12502 [pdf, other]
Title: Detection of Replay Attacks to GNSS based on Partial Correlations and Authentication Data Unpredictability
Gonzalo Seco-Granados, David Gomez-Casco, Jose A. Lopez-Salcedo, Ignacio Fernandez-Hernandez
Journal-ref: GPS Solutions, 2021
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[175] arXiv:2010.12577 [pdf, other]
Title: On the profitability of selfish blockchain mining under consideration of ruin
Hansjoerg Albrecher, Pierre-Olivier Goffard
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC); Probability (math.PR); Risk Management (q-fin.RM)
Total of 347 entries : 1-25 76-100 101-125 126-150 151-175 176-200 201-225 226-250 ... 326-347
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack