Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for October 2020

Total of 347 entries : 1-50 101-150 151-200 201-250 251-300 301-347
Showing up to 50 entries per page: fewer | more | all
[251] arXiv:2010.03300 (cross-list from cs.CV) [pdf, other]
Title: CD-UAP: Class Discriminative Universal Adversarial Perturbation
Chaoning Zhang, Philipp Benz, Tooba Imtiaz, In So Kweon
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[252] arXiv:2010.03671 (cross-list from cs.LG) [pdf, other]
Title: Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac
Comments: 6 pages, 5 figures, Accepted in IEEE Globecom 2020
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[253] arXiv:2010.03849 (cross-list from cs.NI) [pdf, other]
Title: 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept
Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski
Comments: Accepted for presentation at IEEE NFV-SDN 2020
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[254] arXiv:2010.04327 (cross-list from cs.LG) [pdf, other]
Title: Bias and Variance of Post-processing in Differential Privacy
Keyu Zhu, Pascal Van Hentenryck, Ferdinando Fioretto
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[255] arXiv:2010.04391 (cross-list from cs.LG) [pdf, other]
Title: Latent Dirichlet Allocation Model Training with Differential Privacy
Fangyuan Zhao, Xuebin Ren, Shusen Yang, Qing Han, Peng Zhao, Xinyu Yang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[256] arXiv:2010.04840 (cross-list from cs.LG) [pdf, other]
Title: CryptoCredit: Securely Training Fair Models
Leo de Castro, Jiahao Chen, Antigoni Polychroniadou
Comments: 8 pages
Journal-ref: Proceedings of the 1st ACM International Conference on AI in Finance (ICAIF '20), October 15-16, 2020, New York, NY, USA
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[257] arXiv:2010.04851 (cross-list from cs.LG) [pdf, other]
Title: Voting-based Approaches For Differentially Private Federated Learning
Yuqing Zhu, Xiang Yu, Yi-Hsuan Tsai, Francesco Pittaluga, Masoud Faraki, Manmohan chandraker, Yu-Xiang Wang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[258] arXiv:2010.04902 (cross-list from cs.LG) [pdf, other]
Title: ByzShield: An Efficient and Robust System for Distributed Training
Konstantinos Konstantinidis, Aditya Ramamoorthy
Comments: 17 pages, 12 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[259] arXiv:2010.05370 (cross-list from cs.GT) [pdf, other]
Title: Game-theoric approach to decision-making problem for blockchain mining
Kosuke Toda, Naomi Kuze, Toshimitsu Ushio
Comments: 7 pages, 6 figures an extended version of a manuscript accepted to IEEE L-CSS
Subjects: Computer Science and Game Theory (cs.GT); Cryptography and Security (cs.CR)
[260] arXiv:2010.05589 (cross-list from cs.DS) [pdf, other]
Title: Growth of Random Trees by Leaf Attachment
Nomvelo Sibisi
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Probability (math.PR); Applications (stat.AP)
[261] arXiv:2010.06053 (cross-list from cs.CL) [pdf, other]
Title: TextHide: Tackling Data Privacy in Language Understanding Tasks
Yangsibo Huang, Zhao Song, Danqi Chen, Kai Li, Sanjeev Arora
Comments: Findings of EMNLP 2020
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG); Machine Learning (stat.ML)
[262] arXiv:2010.06131 (cross-list from cs.CV) [pdf, other]
Title: Learning to Attack with Fewer Pixels: A Probabilistic Post-hoc Framework for Refining Arbitrary Dense Adversarial Attacks
He Zhao, Thanh Nguyen, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[263] arXiv:2010.06135 (cross-list from cs.PL) [pdf, other]
Title: Session-layer Attack Traffic Classification by Program Synthesis
Lei Shi, Yahui Li, Rajeev Alur, Boon Thau Loo
Comments: 13 pages
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR)
[264] arXiv:2010.06139 (cross-list from cs.DC) [pdf, other]
Title: Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications
Abu Naser, Mehran Sadeghi Lahijani, Cong Wu, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan
Comments: Under review - IEEE Transactions on Dependable and Secure Computing (TDSC). 12 figures, 11 tables, and 16 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[265] arXiv:2010.06154 (cross-list from cs.LG) [pdf, other]
Title: An Analysis of Robustness of Non-Lipschitz Networks
Maria-Florina Balcan, Avrim Blum, Dravyansh Sharma, Hongyang Zhang
Comments: To appear in Journal of Machine Learning Research (JMLR)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[266] arXiv:2010.06212 (cross-list from cs.LG) [pdf, other]
Title: S3ML: A Secure Serving System for Machine Learning Inference
Junming Ma, Chaofan Yu, Aihui Zhou, Bingzhe Wu, Xibin Wu, Xingyu Chen, Xiangqun Chen, Lei Wang, Donggang Cao
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[267] arXiv:2010.06471 (cross-list from cs.DC) [pdf, other]
Title: CryptMPI: A Fast Encrypted MPI Library
Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan
Comments: Updated system description, format changed
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[268] arXiv:2010.06667 (cross-list from cs.LG) [pdf, other]
Title: Chasing Your Long Tails: Differentially Private Prediction in Health Care Settings
Vinith M. Suriyakumar, Nicolas Papernot, Anna Goldenberg, Marzyeh Ghassemi
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (stat.ML)
[269] arXiv:2010.06709 (cross-list from cs.LG) [pdf, other]
Title: Local Differential Privacy for Bayesian Optimization
Xingyu Zhou, Jian Tan
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[270] arXiv:2010.06812 (cross-list from cs.LG) [pdf, other]
Title: Explain2Attack: Text Adversarial Attacks via Cross-Domain Interpretability
Mahmoud Hossam, Trung Le, He Zhao, Dinh Phung
Comments: Preprint for accepted paper at 25th International Conference on Pattern Recognition (ICPR 2020)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[271] arXiv:2010.06855 (cross-list from cs.LG) [pdf, other]
Title: GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial Attack
Hui Liu, Bo Zhao, Minzhi Ji, Peng Liu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[272] arXiv:2010.06911 (cross-list from quant-ph) [pdf, other]
Title: Lightweight Mediated Semi-Quantum Secret Sharing Protocol
Chia-Wei Tsai, Zong-Liang Zhang, Bo-Cheng Jian, Yao-Chung Chang
Comments: We proposes a improved protocol in this concept, so that we hope to replace this paper by the new manuscript
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[273] arXiv:2010.07013 (cross-list from cs.CY) [pdf, other]
Title: A Case for a Currencyless Economy Based on Bartering with Smart Contracts
Carlos Molina-Jimenez, Hazem Danny Al Nakib, Linmao Song, Ioannis Sfyrakis, Jon Crowcroft
Comments: The document consists of 22 pages in total, including references and two figures. The author list has five authors
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[274] arXiv:2010.07016 (cross-list from cs.CY) [pdf, other]
Title: Design and Implementation of User-Friendly and Low-Cost Multiple-Application System for Smart City Using Microcontrollers
Zain Mumtaz, Zeeshan Ilyas, Ahmed Sohaib, Saleem Ullah, Hamza Ahmad Madni
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[275] arXiv:2010.07041 (cross-list from cs.CY) [pdf, other]
Title: From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?
Maria Papathanasaki, Georgios Dimitriou, Leandros Maglaras, Ismini Vasileiou, Helge Janicke
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[276] arXiv:2010.07188 (cross-list from cs.CY) [pdf, other]
Title: Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
Ian Kennedy, Arosha Bandara, Blaine Price
Comments: Article in press. Accepted by Journal of Digital Forensics, Security and Law (JDFSL)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[277] arXiv:2010.07190 (cross-list from cs.SD) [pdf, other]
Title: Towards Resistant Audio Adversarial Examples
Tom Dörr, Karla Markert, Nicolas M. Müller, Konstantin Böttinger
Journal-ref: SPAI 20: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial IntelligenceOctober 2020 Pages 3-10
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[278] arXiv:2010.07230 (cross-list from cs.LG) [pdf, other]
Title: An Evasion Attack against Stacked Capsule Autoencoder
Jiazhu Dai, Siwei Xiong
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[279] arXiv:2010.07259 (cross-list from cs.LG) [pdf, other]
Title: Privacy-Preserving Object Detection & Localization Using Distributed Machine Learning: A Case Study of Infant Eyeblink Conditioning
Stefan Zwaard, Henk-Jan Boele, Hani Alers, Christos Strydis, Casey Lew-Williams, Zaid Al-Ars
Comments: This is a preprint version of "Privacy-Preserving Object Detection & Localization Using Distributed Machine Learning: A Case Study of Infant Eyeblink Conditioning". This work consists of 12 pages including refs and, 4 tables and 7 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[280] arXiv:2010.07363 (cross-list from cs.IT) [pdf, other]
Title: Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems
Debarnab Mitra, Lev Tauz, Lara Dolecek
Comments: 6 pages, 5 figures, To appear in Information Theory Workshop (ITW) 2020
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[281] arXiv:2010.07788 (cross-list from cs.CV) [pdf, other]
Title: Generalizing Universal Adversarial Attacks Beyond Additive Perturbations
Yanghao Zhang, Wenjie Ruan, Fu Wang, Xiaowei Huang
Comments: A short version of this work will appear in the ICDM 2020 conference proceedings
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[282] arXiv:2010.08311 (cross-list from cs.RO) [pdf, html, other]
Title: Formal Verification of Robustness and Resilience of Learning-Enabled State Estimation Systems
Wei Huang, Yifan Zhou, Gaojie Jin, Youcheng Sun, Jie Meng, Fan Zhang, Xiaowei Huang
Comments: Accepted for publication in Neurocomputing
Journal-ref: Neurocomputing (2024)
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR)
[283] arXiv:2010.08466 (cross-list from cs.NI) [pdf, other]
Title: Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms
Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis
Comments: 7 pages, 2 figures, Accepted in ACM/IEEE AIChallengeIoT 2020
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[284] arXiv:2010.08542 (cross-list from cs.CL) [pdf, other]
Title: Mischief: A Simple Black-Box Attack Against Transformer Architectures
Adrian de Wynter
Comments: Technical report
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[285] arXiv:2010.08852 (cross-list from cs.LG) [pdf, other]
Title: Weight-Covariance Alignment for Adversarially Robust Neural Networks
Panagiotis Eustratiadis, Henry Gouk, Da Li, Timothy Hospedales
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[286] arXiv:2010.09063 (cross-list from cs.LG) [pdf, other]
Title: Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization
Pranav Subramani, Nicholas Vadivelu, Gautam Kamath
Comments: To appear in NeurIPS 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Performance (cs.PF)
[287] arXiv:2010.09080 (cross-list from cs.LG) [pdf, other]
Title: Poisoned classifiers are not only backdoored, they are fundamentally broken
Mingjie Sun, Siddhant Agarwal, J. Zico Kolter
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[288] arXiv:2010.09099 (cross-list from cs.DC) [pdf, other]
Title: Decentralized and Secure Generation Maintenance with Differential Privacy
Paritosh Ramanan, Murat Yildirim, Nagi Gebraeel, Edmond Chow
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[289] arXiv:2010.09246 (cross-list from q-fin.TR) [pdf, other]
Title: Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders
Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici
Comments: Accepted to ECML PKDD 2021 this https URL
Subjects: Trading and Market Microstructure (q-fin.TR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[290] arXiv:2010.09293 (cross-list from cs.LG) [pdf, other]
Title: Privacy-preserving Data Sharing on Vertically Partitioned Data
Razane Tajeddine, Joonas Jälkö, Samuel Kaski, Antti Honkela
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[291] arXiv:2010.09527 (cross-list from cs.FL) [pdf, other]
Title: Parametric non-interference in timed automata
Étienne André, Aleksander Kryukov
Comments: This is the author version of the manuscript of the same name published in the proceedings of the 25th International Conference on Engineering of Complex Computer Systems (ICECCS 2020)
Subjects: Formal Languages and Automata Theory (cs.FL); Cryptography and Security (cs.CR)
[292] arXiv:2010.09670 (cross-list from cs.LG) [pdf, other]
Title: RobustBench: a standardized adversarial robustness benchmark
Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Edoardo Debenedetti, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein
Comments: The camera-ready version accepted at the NeurIPS'21 Datasets and Benchmarks Track: 120+ evaluations, 80+ models, 7 leaderboards (Linf, L2, common corruptions; CIFAR-10, CIFAR-100, ImageNet), significantly expanded analysis part (calibration, fairness, privacy leakage, smoothness, transferability)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[293] arXiv:2010.09929 (cross-list from stat.ML) [pdf, other]
Title: On the Sample Complexity of Privately Learning Unbounded High-Dimensional Gaussians
Ishaq Aden-Ali, Hassan Ashtiani, Gautam Kamath
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (cs.LG)
[294] arXiv:2010.09968 (cross-list from cs.IT) [pdf, other]
Title: Non-Stochastic Private Function Evaluation
Farhad Farokhi, Girish Nair
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[295] arXiv:2010.10002 (cross-list from quant-ph) [pdf, other]
Title: Collusion attack and counterattack on the quantum key agreement via non-maximally entangled cluster states
Jun Gu, Tzonelih Hwang
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[296] arXiv:2010.10236 (cross-list from quant-ph) [pdf, other]
Title: On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack
Jun Gu, Tzonelih Hwang
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[297] arXiv:2010.10370 (cross-list from eess.SY) [pdf, other]
Title: Monitoring Large Crowds With WiFi: A Privacy-Preserving Approach
Jean-François Determe, Sophia Azzagnuni, Utkarsh Singh, François Horlin, Philippe De Doncker
Subjects: Systems and Control (eess.SY); Hardware Architecture (cs.AR); Cryptography and Security (cs.CR)
[298] arXiv:2010.10682 (cross-list from cs.SD) [pdf, other]
Title: VenoMave: Targeted Poisoning Against Speech Recognition
Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Audio and Speech Processing (eess.AS)
[299] arXiv:2010.10712 (cross-list from cs.LG) [pdf, other]
Title: Boosting Gradient for White-Box Adversarial Attacks
Hongying Liu, Zhenyu Zhou, Fanhua Shang, Xiaoyu Qi, Yuanyuan Liu, Licheng Jiao
Comments: 9 pages,6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[300] arXiv:2010.10747 (cross-list from cs.LG) [pdf, other]
Title: ASCII: ASsisted Classification with Ignorance Interchange
Jiaying Zhou, Xun Xian, Na Li, Jie Ding
Comments: 12 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
Total of 347 entries : 1-50 101-150 151-200 201-250 251-300 301-347
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack