Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2020

Total of 347 entries : 1-25 ... 151-175 176-200 201-225 226-250 251-275 276-300 301-325 ... 326-347
Showing up to 25 entries per page: fewer | more | all
[226] arXiv:2010.16388 [pdf, other]
Title: A survey and analysis of TLS interception mechanisms and motivations
Xavier de Carné de Carnavalet, Paul C. van Oorschot
Comments: This paper will appear in ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR)
[227] arXiv:2010.00268 (cross-list from eess.SY) [pdf, other]
Title: Encrypted control for networked systems -- An illustrative introduction and current challenges
M. Schulze Darup, A. B. Alexandru, D. E. Quevedo, G. J. Pappas
Comments: The paper is a preprint of an accepted paper in the IEEE Control Systems Magazine
Journal-ref: in IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58-78, 2021
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[228] arXiv:2010.00302 (cross-list from cs.MM) [pdf, other]
Title: An authorship protection technology for electronic documents based on image watermarking
Anna Melman, Oleg Evsutin, Alexander Shelupanov
Comments: 21 pages, 7 figures
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[229] arXiv:2010.00544 (cross-list from cs.HC) [pdf, other]
Title: Designing Indicators to Combat Fake Media
Imani N. Sherman, Elissa M. Redmiles, Jack W. Stokes
Comments: 26 pages, 12 figures
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[230] arXiv:2010.00624 (cross-list from cs.CY) [pdf, other]
Title: Biocybersecurity -- A Converging Threat as an Auxiliary to War
Lucas Potter, Orlando Ayala, Xavier-Lewis Palmer
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[231] arXiv:2010.00677 (cross-list from cs.CL) [pdf, other]
Title: Near-imperceptible Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding
Jiaming Shen, Heng Ji, Jiawei Han
Comments: EMNLP 2020
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[232] arXiv:2010.00801 (cross-list from cs.CV) [pdf, other]
Title: Block-wise Image Transformation with Secret Key for Adversarially Robust Defense
MaungMaung AprilPyone, Hitoshi Kiya
Comments: Under review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[233] arXiv:2010.01039 (cross-list from cs.LG) [pdf, other]
Title: Query complexity of adversarial attacks
Grzegorz Głuch, Rüdiger Urbanke
Comments: 32 pages, 2 figures Generalized the results. Adversarial examples no longer need to be in the support of the data distribution
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
[234] arXiv:2010.01175 (cross-list from cs.DC) [pdf, other]
Title: Towards Bidirectional Protection in Federated Learning
Lun Wang, Qi Pang, Shuai Wang, Dawn Song
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[235] arXiv:2010.01250 (cross-list from cs.LG) [pdf, other]
Title: CorrAttack: Black-box Adversarial Attack with Structured Search
Zhichao Huang, Yaowei Huang, Tong Zhang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[236] arXiv:2010.01285 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Representation for NLP: Formal Guarantee and An Empirical Study on Privacy and Fairness
Lingjuan Lyu, Xuanli He, Yitong Li
Comments: accepted to Findings of EMNLP 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[237] arXiv:2010.01329 (cross-list from cs.IR) [pdf, other]
Title: Multi-Step Adversarial Perturbations on Recommender Systems Embeddings
Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra
Comments: 10 pages, 3 figures, 1 table
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR)
[238] arXiv:2010.01373 (cross-list from cs.NI) [pdf, other]
Title: Ethna: Analyzing the Underlying Peer-to-Peer Network of the Ethereum Blockchain
Taotao Wang, Chonghe Zhao, Qing Yang, Shengli Zhang, Soung Chang Liew
Comments: 15 pages, 14 figures
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[239] arXiv:2010.01592 (cross-list from cs.CV) [pdf, other]
Title: Unknown Presentation Attack Detection against Rational Attackers
Ali Khodabakhsh, Zahid Akhtar
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[240] arXiv:2010.01950 (cross-list from cs.LG) [pdf, other]
Title: Torchattacks: A PyTorch Repository for Adversarial Attacks
Hoki Kim
Comments: 6 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[241] arXiv:2010.02117 (cross-list from cs.HC) [pdf, other]
Title: Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version)
Thomas Groß
Comments: Open Science Framework: this https URL. 31 pages. This is the author's copy. This work was supported by the ERC Starting Grant Confidentiality-Preserving Security Assurance (CASCAde), GA no 716980
Journal-ref: Proceedings of the 10th International Workshop on Socio-Technical Aspects in Security (STAST 2020), LNCS 11739, Springer, 2020
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[242] arXiv:2010.02124 (cross-list from cs.DC) [pdf, other]
Title: Specification of the Giskard Consensus Protocol
Elaine Li, Karl Palmskog, Mircea Sebe, Grigore Roşu
Comments: 15 pages plus 2 pages as appendix, 2 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[243] arXiv:2010.02387 (cross-list from cs.LG) [pdf, other]
Title: Metadata-Based Detection of Child Sexual Abuse Material
Mayana Pereira, Rahul Dodhia, Hyrum Anderson, Richard Brown
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[244] arXiv:2010.02432 (cross-list from cs.LG) [pdf, other]
Title: A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference
Sanghyun Hong, Yiğitcan Kaya, Ionuţ-Vlad Modoranu, Tudor Dumitraş
Comments: Accepted to ICLR 2021 [Spotlight]; First two authors contributed equally
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[245] arXiv:2010.02508 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Boot Camp: label free certified robustness in one epoch
Ryan Campbell, Chris Finlay, Adam M Oberman
Comments: 13 pages, 5 figures, 5 tables. Under review as a conference paper at ICLR 2021. arXiv admin note: substantial text overlap with arXiv:2006.06061
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[246] arXiv:2010.03072 (cross-list from cs.CV) [pdf, other]
Title: Adversarial Patch Attacks on Monocular Depth Estimation Networks
Koichiro Yamanaka, Ryutaroh Matsumoto, Keita Takahashi, Toshiaki Fujii
Comments: Publisher's Open Access PDF with the CC-BY copyright. Associated video, data and programs are available at this https URL
Journal-ref: IEEE Access, vol.8, pp.179094-179104, October 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[247] arXiv:2010.03094 (cross-list from cs.LG) [pdf, other]
Title: Correlated Differential Privacy: Feature Selection in Machine Learning
Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou
Comments: This paper has been published in IEEE Transactions on Industrial Informatics
Journal-ref: IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 2115-2124, March 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[248] arXiv:2010.03180 (cross-list from cs.LG) [pdf, other]
Title: Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples
Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[249] arXiv:2010.03241 (cross-list from quant-ph) [pdf, other]
Title: Two attacks and counterattacks on the mutual semi-quantum key agreement protocol using Bell states
Jun Gu, Tzonelih Hwang
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[250] arXiv:2010.03288 (cross-list from cs.LG) [pdf, other]
Title: Double Targeted Universal Adversarial Perturbations
Philipp Benz, Chaoning Zhang, Tooba Imtiaz, In So Kweon
Comments: Accepted at ACCV 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
Total of 347 entries : 1-25 ... 151-175 176-200 201-225 226-250 251-275 276-300 301-325 ... 326-347
Showing up to 25 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack