Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for December 2021

Total of 337 entries
Showing up to 2000 entries per page: fewer | more | all
[201] arXiv:2112.13072 [pdf, other]
Title: A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks
Hisham A. Kholidy
Subjects: Cryptography and Security (cs.CR)
[202] arXiv:2112.13105 [pdf, other]
Title: Overview of Quantum Key Distribution Technique within IPsec Architecture
Emir Dervisevic, Miralem Mehic
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[203] arXiv:2112.13144 [pdf, other]
Title: SoK: A Study of the Security on Voice Processing Systems
Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[204] arXiv:2112.13162 [pdf, other]
Title: Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
Behnam Ghavami, Seyd Movi, Zhenman Fang, Lesley Shannon
Comments: Accepted for the 23rd International Symposium on Quality Electronic Design (ISQED'22)
Subjects: Cryptography and Security (cs.CR)
[205] arXiv:2112.13166 [pdf, other]
Title: Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks
Osman Boyaci, Mohammad Rasoul Narimani, Katherine Davis, Erchin Serpedin
Comments: 5 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Signal Processing (eess.SP); Systems and Control (eess.SY)
[206] arXiv:2112.13236 [pdf, other]
Title: An Ensemble of Pre-trained Transformer Models For Imbalanced Multiclass Malware Classification
Ferhat Demirkıran, Aykut Çayır, Uğur Ünal, Hasan Dağ
Comments: 38 pages, 8 Figures, 13 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[207] arXiv:2112.13301 [pdf, other]
Title: Defending Against Membership Inference Attacks on Beacon Services
Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik
Subjects: Cryptography and Security (cs.CR); Genomics (q-bio.GN)
[208] arXiv:2112.13338 [pdf, other]
Title: MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning
Ajith Suresh
Comments: PhD thesis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[209] arXiv:2112.13340 [pdf, html, other]
Title: Towards a conjecture on a special class of matrices over commutative rings of characteristic 2
Baofeng Wu
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Combinatorics (math.CO)
[210] arXiv:2112.13416 [pdf, other]
Title: Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings
Tiantian Feng, Hanieh Hashemi, Rajat Hebbar, Murali Annavaram, Shrikanth S. Narayanan
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[211] arXiv:2112.13430 [pdf, other]
Title: IoT Analytics and Blockchain
Abbas Saleminezhadl, Manuel Remmele, Ravikumar Chaudhari, Rasha Kashef
Subjects: Cryptography and Security (cs.CR)
[212] arXiv:2112.13672 [pdf, other]
Title: An Obfuscating C Compiler for Encrypted Computing
Peter Breuer
Comments: Begun Mar 16 2018, submitted May 28 2018, SECRYPT 2018, accepted, final copy Jun 19 2018, withdrawn for conflict of dates. The paper extends to arrays of arrays one at SECRYPT 2017 that compiled arrays (difficulty is pointers). Rewritten for DSN 2018 (1902.06146) and rejected! (it added ideal criteria for security that a source language translator cannot satisfy). Here for historical reference. arXiv admin note: text overlap with arXiv:1902.06146
Subjects: Cryptography and Security (cs.CR)
[213] arXiv:2112.13719 [pdf, other]
Title: Casr-Cluster: Crash Clustering for Linux Applications
Georgy Savidov, Andrey Fedotov
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[214] arXiv:2112.13798 [pdf, other]
Title: PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection
Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan
Comments: An earlier version is accepted to be published in IEEE Conference on Communications and Network Security (CNS) 2021
Subjects: Cryptography and Security (cs.CR)
[215] arXiv:2112.13923 [pdf, other]
Title: Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature
Na Young Ahn, Dong Hoon Lee
Comments: resubmitted(Nov. 25, 2021) and accepted(Dec. 15, 2021)in IEEE ACCESS(Access-2021-39427)
Subjects: Cryptography and Security (cs.CR)
[216] arXiv:2112.13956 [pdf, other]
Title: A Blockchain-based Data Governance Framework with Privacy Protection and Provenance for e-Prescription
Rodrigo Dutra Garcia (1), Gowri Sankar Ramachandran (2), Raja Jurdak (2), Jo Ueyama (1) ((1) Institute of Mathematics and Computer Science, University of Sao Paulo, Brazil, (2) School of Computer Science, Queensland University of Technology, Australia)
Subjects: Cryptography and Security (cs.CR)
[217] arXiv:2112.13994 [pdf, other]
Title: Mining and Classifying Privacy and Data Protection Requirements in Issue Reports
Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Aditya Ghose
Comments: arXiv admin note: substantial text overlap with arXiv:2101.01298
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[218] arXiv:2112.14078 [pdf, other]
Title: Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles
Pranav Kumar Singh, Sukumar Nandi, Sunit K. Nandi, Uttam Ghosh, Danda B. Rawat
Comments: 9 pages, 6 figures
Journal-ref: The work is published in IEEE COMSOC MMTC Communications - Frontiers Vol. 16, No. 6, November 2021, Page 12-24
Subjects: Cryptography and Security (cs.CR)
[219] arXiv:2112.14108 [pdf, other]
Title: Fostering the Robustness of White-Box Deep Neural Network Watermarks by Neuron Alignment
Fang-Qi Li, Shi-Lin Wang, Yun Zhu
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[220] arXiv:2112.14137 [pdf, other]
Title: State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems
Hisham A. Kholidy
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[221] arXiv:2112.14205 [pdf, other]
Title: Analysis of Longitudinal Changes in Privacy Behavior of Android Applications
Alexander Yu, Yuvraj Agarwal, Jason I. Hong
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[222] arXiv:2112.14437 [pdf, other]
Title: A Color Image Steganography Based on Frequency Sub-band Selection
Hai Su, Shan Yang, Shuqing Zhang, Songsen Yu
Comments: 19 pages,17 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[223] arXiv:2112.14468 [pdf, other]
Title: Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang
Comments: The paper has been accepted by the 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-22)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[224] arXiv:2112.14469 [pdf, other]
Title: Physical Layer Security Techniques for Future Wireless Networks
Weiping Shi, Xinyi Jiang, Jinsong Hu, Yin Teng, Yang Wang, Hangjia He, Rongen Dong, Feng Shu, Jiangzhou Wang
Comments: 11pages,9 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[225] arXiv:2112.14618 [pdf, other]
Title: IoT Security Challenges and Mitigations: An Introduction
Stuart Millar
Comments: 5 pages, 1 figure, this version dated October 21st 2016
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[226] arXiv:2112.14737 [pdf, other]
Title: Distance-Aware Private Set Intersection
Anrin Chakraborti, Giulia Fanti, Michael K. Reiter
Subjects: Cryptography and Security (cs.CR)
[227] arXiv:2112.14771 [pdf, other]
Title: Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities
Behkish Nassirzadeh, Huaiying Sun, Sebastian Banescu, Vijay Ganesh
Comments: 13 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[228] arXiv:2112.14773 [pdf, other]
Title: Working mechanism of Eternalblue and its application in ransomworm
Zian Liu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[229] arXiv:2112.14821 [pdf, other]
Title: Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space
Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça
Subjects: Cryptography and Security (cs.CR)
[230] arXiv:2112.14889 [pdf, other]
Title: Few-shot Backdoor Defense Using Shapley Estimation
Jiyang Guan, Zhuozhuo Tu, Ran He, Dacheng Tao
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE)
[231] arXiv:2112.15001 [pdf, other]
Title: Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing
Josep Domingo-Ferrer, Jesús Manjón
Comments: IEEE Transactions on Dependable and Secure Computing, to appear
Subjects: Cryptography and Security (cs.CR)
[232] arXiv:2112.15322 [pdf, other]
Title: An Efficient and Robust Committee Structure for Sharding Blockchain
Mengqian Zhang, Jichen Li, Zhaohua Chen, Hongyin Chen, Xiaotie Deng
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[233] arXiv:2112.15479 [pdf, other]
Title: BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption
Sangpyo Kim, Jongmin Kim, Michael Jaemin Kim, Wonkyung Jung, Minsoo Rhu, John Kim, Jung Ho Ahn
Comments: 15 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[234] arXiv:2112.15491 [pdf, other]
Title: Semantics-Recovering Decompilation through Neural Machine Translation
Ruigang Liang, Ying Cao, Peiwei Hu, Jinwen He, Kai Chen
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[235] arXiv:2112.15561 [pdf, other]
Title: SOK: On the Analysis of Web Browser Security
Jungwon Lim (1), Yonghwi Jin (2), Mansour Alharthi (1), Xiaokuan Zhang (1), Jinho Jung (1), Rajat Gupta (1), Kuilin Li (1), Daehee Jang (3), Taesoo Kim (1) ((1) Georgia Institute of Technology, (2) Theori Inc., (3) Sungshin Women's University)
Subjects: Cryptography and Security (cs.CR)
[236] arXiv:2112.15566 [pdf, other]
Title: In Lieu of Privacy: Anonymous Contact Tracing
Rohit Bhat, Shranav Palakurthi, Naman Tiwari
Comments: 9 pages, 2 figures, student project
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[237] arXiv:2112.00107 (cross-list from cs.HC) [pdf, other]
Title: LGBTQ Privacy Concerns on Social Media
Christine Geeng, Alexis Hiniker
Comments: Workshop at 2018 CHI conference on human factors in computing systems: Exploring Individual Differences in Privacy
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[238] arXiv:2112.00193 (cross-list from cs.LG) [pdf, other]
Title: Public Data-Assisted Mirror Descent for Private Model Training
Ehsan Amid, Arun Ganesh, Rajiv Mathews, Swaroop Ramaswamy, Shuang Song, Thomas Steinke, Vinith M. Suriyakumar, Om Thakkar, Abhradeep Thakurta
Comments: 20 pages, 8 figures, 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[239] arXiv:2112.00394 (cross-list from cs.IT) [pdf, other]
Title: Wiretap Secret Key Agreement Via Secure Omniscience
Praneeth Kumar Vippathalla, Chung Chan, Navin Kashyap, Qiaoqiao Zhou
Comments: 46 pages, 8 figures, submitted to the IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:2102.01771
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[240] arXiv:2112.00659 (cross-list from cs.LG) [pdf, other]
Title: Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Jiachen Sun, Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Dan Hendrycks, Jihun Hamm, Z. Morley Mao
Comments: 21 pages, 15 figures, and 9 tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[241] arXiv:2112.00828 (cross-list from cs.DS) [pdf, other]
Title: The Price of Differential Privacy under Continual Observation
Palak Jain, Sofya Raskhodnikova, Satchit Sivakumar, Adam Smith
Comments: 28 pages
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[242] arXiv:2112.00845 (cross-list from cs.LG) [pdf, other]
Title: Improving Differentially Private SGD via Randomly Sparsified Gradients
Junyi Zhu, Matthew B. Blaschko
Journal-ref: Transactions on Machine Learning Research (06/2023)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[243] arXiv:2112.01237 (cross-list from cs.CY) [pdf, other]
Title: Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity
Vincent Schlatt, Johannes Sedlmeir, Simon Feulner, Nils Urbach
Journal-ref: Information & Management, Special Issue "Blockchain Innovations: Business Opportunities and Management Challenges", 2021
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); General Economics (econ.GN)
[244] arXiv:2112.01238 (cross-list from cs.CY) [pdf, other]
Title: Ethereum Emissions: A Bottom-up Estimate
Kyle McDonald
Comments: Code at this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[245] arXiv:2112.01386 (cross-list from quant-ph) [pdf, other]
Title: Relativistic zero-knowledge protocol for NP over the internet unconditionally secure against quantum adversaries
André Chailloux, Yann Barsamian
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[246] arXiv:2112.01405 (cross-list from cs.LG) [pdf, other]
Title: FedRAD: Federated Robust Adaptive Distillation
Stefán Páll Sturluson, Samuel Trew, Luis Muñoz-González, Matei Grama, Jonathan Passerat-Palmbach, Daniel Rueckert, Amir Alansary
Comments: Accepted for 1st NeurIPS Workshop on New Frontiers in Federated Learning (NFFL 2021), Virtual Meeting
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[247] arXiv:2112.01601 (cross-list from cs.CV) [pdf, html, other]
Title: Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?
Peter Lorenz, Dominik Strassel, Margret Keuper, Janis Keuper
Comments: AAAI-22 AdvML Workshop
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[248] arXiv:2112.01956 (cross-list from cs.LG) [pdf, other]
Title: Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
Yuanyuan Yuan, Qi Pang, Shuai Wang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[249] arXiv:2112.02053 (cross-list from cs.CY) [pdf, other]
Title: Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises
Valdemar Švábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Čeleda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay
Comments: ACM SIGCSE 2022 conference, 7 pages, 3 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[250] arXiv:2112.02080 (cross-list from cs.LG) [pdf, other]
Title: Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration
Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro
Comments: Submitted to the IEEE Transactions on Emerging Topics in Computing journal
Journal-ref: IEEE Transactions on Emerging Topics in Computing, Early Access, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[251] arXiv:2112.02198 (cross-list from cs.IT) [pdf, other]
Title: Analysis of Communication Channels Related to Physical Unclonable Functions
Georg Maringer, Marvin Xhemrishi, Sven Puchinger, Kathrin Garb, Hedongliang Liu, Thomas Jerkovits, Ludwig Kürzinger, Matthias Hiller, Antonia Wachter-Zeh
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[252] arXiv:2112.02240 (cross-list from cs.SE) [pdf, other]
Title: Tracking Patches for Open Source Software Vulnerabilities
Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu
Comments: Accepted to the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[253] arXiv:2112.02366 (cross-list from cs.SI) [pdf, other]
Title: Characterizing Retweet Bots: The Case of Black Market Accounts
Tuğrulcan Elmas, Rebekah Overdorf, Karl Aberer
Comments: Accepted to ICWSM 2022
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[254] arXiv:2112.02705 (cross-list from cs.LG) [pdf, other]
Title: Beyond Robustness: Resilience Verification of Tree-Based Classifiers
Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[255] arXiv:2112.02773 (cross-list from cs.CY) [pdf, other]
Title: Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense Vulnerability
Jan Kallberg
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[256] arXiv:2112.02797 (cross-list from cs.LG) [pdf, other]
Title: ML Attack Models: Adversarial Attacks and Data Poisoning Attacks
Jing Lin, Long Dang, Mohamed Rahouti, Kaiqi Xiong
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[257] arXiv:2112.02918 (cross-list from cs.LG) [pdf, other]
Title: When the Curious Abandon Honesty: Federated Learning Is Not Private
Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[258] arXiv:2112.03172 (cross-list from q-fin.GN) [pdf, other]
Title: Market Microstructure of Non Fungible Tokens
Mayukh Mukhopadhyay, Kaushik Ghosh
Comments: 10 pages,3 figures
Journal-ref: Five Shades of Emerging Business Cases, Chapter 3, Eliva Press, Moldova, EU, pp. 26-38, 2021, ISBN 9781636483955
Subjects: General Finance (q-fin.GN); Cryptography and Security (cs.CR); General Economics (econ.GN); Trading and Market Microstructure (q-fin.TR)
[259] arXiv:2112.03452 (cross-list from cs.LG) [pdf, html, other]
Title: Location Leakage in Federated Signal Maps
Evita Bakopoulou, Mengwei Yang, Jiang Zhang, Konstantinos Psounis, Athina Markopoulou
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[260] arXiv:2112.03492 (cross-list from cs.CV) [pdf, other]
Title: Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal
Yucheng Shi, Yahong Han, Yu-an Tan, Xiaohui Kuang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[261] arXiv:2112.03511 (cross-list from cs.RO) [pdf, other]
Title: Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search
Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino
Comments: Accepted to ICSE2022 Technical Track
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[262] arXiv:2112.03548 (cross-list from stat.ML) [pdf, other]
Title: Private Robust Estimation by Stabilizing Convex Relaxations
Pravesh K. Kothari, Pasin Manurangsi, Ameya Velingker
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Information Theory (cs.IT); Machine Learning (cs.LG)
[263] arXiv:2112.03839 (cross-list from cs.CY) [pdf, other]
Title: Stupid, Evil, or Both? Understanding the Smittestopp conflict
Hans Heum
Comments: Accepted for publication at the 14th Norwegian Information Security Conference (NISK 2021). 9 pages, 3 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[264] arXiv:2112.04234 (cross-list from quant-ph) [pdf, other]
Title: A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?
Arindam Dutta, Anirban Pathak
Comments: 3 New protocols of quantum identity authentication are proposed and the existing protocols are reviewed and classified
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[265] arXiv:2112.04374 (cross-list from cs.SE) [pdf, other]
Title: Dependability Engineering in Isabelle
Florian Kammüller
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[266] arXiv:2112.04395 (cross-list from cs.DM) [pdf, other]
Title: On anti-stochastic properties of unlabeled graphs
Sergei Kiselev, Andrey Kupavskii, Oleg Verbitsky, Maksim Zhukovskii
Subjects: Discrete Mathematics (cs.DM); Cryptography and Security (cs.CR); Combinatorics (math.CO); Probability (math.PR)
[267] arXiv:2112.04532 (cross-list from cs.CV) [pdf, other]
Title: Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection
Jiang Liu, Alexander Levine, Chun Pong Lau, Rama Chellappa, Soheil Feizi
Comments: CVPR 2022 camera ready
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Image and Video Processing (eess.IV)
[268] arXiv:2112.04640 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Ensemble Classifiers for Data Streams
Lovedeep Gondara, Ke Wang, Ricardo Silva Carvalho
Comments: Accepted at WSDM 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[269] arXiv:2112.04778 (cross-list from cs.SE) [pdf, other]
Title: Justifying the Dependability and Security of Business-Critical Blockchain-based Applications
Pierre-Yves Piriou, Olivier Boudeville, Gilles Deleuze, Sara Tucci-Piergiovanni, Önder Gürcan
Comments: 8 pages, 6 figures, The Third IEEE International Conference on Blockchain Computing and Applications (BCCA 2021)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Multiagent Systems (cs.MA)
[270] arXiv:2112.05005 (cross-list from cs.LG) [pdf, other]
Title: Mutual Adversarial Training: Learning together is better than going alone
Jiang Liu, Chun Pong Lau, Hossein Souri, Soheil Feizi, Rama Chellappa
Comments: Under submission
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[271] arXiv:2112.05023 (cross-list from cs.SC) [pdf, html, other]
Title: Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings
Hiroki Furue, Momonari Kudo
Comments: 35 pages, 1 figure
Journal-ref: Proceedings of PQCrypto 2024
Subjects: Symbolic Computation (cs.SC); Cryptography and Security (cs.CR); Commutative Algebra (math.AC)
[272] arXiv:2112.05237 (cross-list from cs.CV) [pdf, other]
Title: Transfer learning using deep neural networks for Ear Presentation Attack Detection: New Database for PAD
Jalil Nourmohammadi Khiarak
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[273] arXiv:2112.05282 (cross-list from cs.LG) [pdf, other]
Title: RamBoAttack: A Robust Query Efficient Deep Neural Network Decision Exploit
Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe
Comments: Published in Network and Distributed System Security (NDSS) Symposium 2022. Code is available at this https URL
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[274] arXiv:2112.05367 (cross-list from cs.LG) [pdf, other]
Title: Efficient Action Poisoning Attacks on Linear Contextual Bandits
Guanlin Liu, Lifeng Lai
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Optimization and Control (math.OC); Machine Learning (stat.ML)
[275] arXiv:2112.05379 (cross-list from cs.CV) [pdf, other]
Title: Cross-Modal Transferable Adversarial Attacks from Images to Videos
Zhipeng Wei, Jingjing Chen, Zuxuan Wu, Yu-Gang Jiang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[276] arXiv:2112.05634 (cross-list from cs.LG) [pdf, other]
Title: Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks
Seungyong Moon, Gaon An, Hyun Oh Song
Comments: Accepted and to appear at AAAI 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[277] arXiv:2112.06063 (cross-list from cs.LG) [pdf, other]
Title: MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare
Muchao Ye, Junyu Luo, Guanjie Zheng, Cao Xiao, Ting Wang, Fenglong Ma
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[278] arXiv:2112.06078 (cross-list from quant-ph) [pdf, other]
Title: A Note on the Post-Quantum Security of (Ring) Signatures
Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[279] arXiv:2112.06157 (cross-list from quant-ph) [pdf, other]
Title: An Optimized Quantum Implementation of ISD on Scalable Quantum Resources
Andre Esser, Sergi Ramos-Calderer, Emanuele Bellini, José I. Latorre, Marc Manzano
Comments: 30+2 pages, 12 figure, code available on Github
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[280] arXiv:2112.06274 (cross-list from cs.LG) [pdf, other]
Title: SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification
Ashwinee Panda, Saeed Mahloujifar, Arjun N. Bhagoji, Supriyo Chakraborty, Prateek Mittal
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[281] arXiv:2112.06276 (cross-list from cs.LG) [pdf, other]
Title: Quantifying and Understanding Adversarial Examples in Discrete Input Spaces
Volodymyr Kuleshov, Evgenii Nikishin, Shantanu Thakoor, Tingfung Lau, Stefano Ermon
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[282] arXiv:2112.06323 (cross-list from cs.CV) [pdf, other]
Title: Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses
Chun Pong Lau, Jiang Liu, Hossein Souri, Wei-An Lin, Soheil Feizi, Rama Chellappa
Comments: Under submission
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[283] arXiv:2112.06369 (cross-list from quant-ph) [pdf, other]
Title: Quantum commitments and signatures without one-way functions
Tomoyuki Morimae, Takashi Yamakawa
Comments: 26 pages
Journal-ref: CRYPTO 2022
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[284] arXiv:2112.06661 (cross-list from quant-ph) [pdf, other]
Title: Learning Classical Readout Quantum PUFs based on single-qubit gates
Niklas Pirnay, Anna Pappa, Jean-Pierre Seifert
Comments: 12 pages, 9 figures
Journal-ref: Quantum Machine Intelligence, volume 4, number: 14 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[285] arXiv:2112.06814 (cross-list from cs.NI) [pdf, other]
Title: Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation
Engin Zeydan, Yekta Turk, Berkin Aksoy, Yaman Yagiz Tasbag
Comments: accepted to IEEE Communications Standards Magazine
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[286] arXiv:2112.06841 (cross-list from quant-ph) [pdf, other]
Title: Probably approximately correct quantum source coding
Armando Angrisani, Brian Coyle, Elham Kashefi
Comments: 13 pages, 1 figure
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[287] arXiv:2112.07322 (cross-list from cs.IT) [pdf, other]
Title: Right-hand side decoding of Gabidulin code and applications
Maxime Bombar, Alain Couvreur
Comments: 10 pages, Accepted at the conference WCC 2022
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[288] arXiv:2112.07879 (cross-list from cs.CV) [pdf, other]
Title: Does a Face Mask Protect my Privacy?: Deep Learning to Predict Protected Attributes from Masked Face Images
Sachith Seneviratne, Nuran Kasthuriarachchi, Sanka Rasnayaka, Danula Hettiachchi, Ridwan Shariffdeen
Comments: Accepted to AJCAI 2021 - 34th Australasian Joint Conference on Artificial Intelligence, Feb 2022, Sydney, Australia. this http URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[289] arXiv:2112.08018 (cross-list from cs.CV) [pdf, other]
Title: MissMarple : A Novel Socio-inspired Feature-transfer Learning Deep Network for Image Splicing Detection
Angelina L. Gokhale, Dhanya Pramod, Sudeep D. Thepade, Ravi Kulkarni
Comments: 27 pages, 6 figures and 15 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[290] arXiv:2112.08442 (cross-list from cs.LG) [pdf, other]
Title: Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)
Khushnaseeb Roshan, Aasim Zafar
Comments: 20 pages, 12 figures, 4 tables, journal article
Journal-ref: International Journal of Computer Networks & Communications (IJCNC) Vol.13, No.6, November 2021
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[291] arXiv:2112.08806 (cross-list from cs.LG) [pdf, html, other]
Title: Correlation inference attacks against machine learning models
Ana-Maria Creţu, Florent Guépin, Yves-Alexandre de Montjoye
Comments: Published in Science Advances. This version contains both the main paper and supplementary material. There are minor editorial differences between this version and the published version. The first two authors contributed equally
Journal-ref: Science Advances, Volume 10, Issue 28, 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[292] arXiv:2112.08862 (cross-list from cs.DC) [pdf, other]
Title: Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives
Arawinkumaar Selvakkumar, Shantanu Pal, Zahra Jadidi
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[293] arXiv:2112.08909 (cross-list from cs.LG) [pdf, other]
Title: CodedPaddedFL and CodedSecAgg: Straggler Mitigation and Secure Aggregation in Federated Learning
Reent Schlegel, Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat
Comments: 14 pages, 7 figures, this work has been submitted to the IEEE for possible publication
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[294] arXiv:2112.09035 (cross-list from cs.HC) [pdf, other]
Title: It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices
Sarah Turner, Jason R.C. Nurse, Shujun Li
Comments: 2022 ACM CHI Conference on Human Factors in Computing Systems
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[295] arXiv:2112.09376 (cross-list from cs.IT) [pdf, other]
Title: Generalized LRS Estimator for Min-entropy Estimation
Jiheon Woo, Chanhee Yoo, Young-Sik Kim, Yuval Cassuto, Yongjune Kim
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[296] arXiv:2112.09395 (cross-list from quant-ph) [pdf, other]
Title: Digital signatures with Quantum Candies
Tal Mor, Roman Shapira, Guy Shemesh
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Physics Education (physics.ed-ph)
[297] arXiv:2112.09438 (cross-list from cs.AI) [pdf, other]
Title: ML Supported Predictions for SAT Solvers Performance
A.-M. Leventi-Peetz, Jörg-Volker Peetz, Martina Rohde
Comments: Presented at the Future Technologies Conference (FTC) 2019
Journal-ref: Arai K., Bhatia R., Kapoor S. (eds) Proceedings of the Future Technologies Conference (FTC) 2019. FTC 2019. Advances in Intelligent Systems and Computing, vol 1069. Springer, Cham
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[298] arXiv:2112.09767 (cross-list from cs.CY) [pdf, other]
Title: Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion
Karen Elliott, Kovila Coopamootoo, Edward Curran, Paul Ezhilchelvan, Samantha Finnigan, Dave Horsfall, Zhichao Ma, Magdalene Ng, Tasos Spiliotopoulos, Han Wu, Aad van Moorsel
Comments: Published in the Journal Data & Policy
Journal-ref: Data & Policy (2022), 4: e34
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[299] arXiv:2112.09914 (cross-list from math.OC) [pdf, other]
Title: Distributed design of deterministic discrete-time privacy preserving average consensus for multi-agent systems through network augmentation
Guilherme Ramos, A. Pedro Aguiar, Soummya Kar, Sérgio Pequito
Subjects: Optimization and Control (math.OC); Cryptography and Security (cs.CR); Multiagent Systems (cs.MA)
[300] arXiv:2112.09921 (cross-list from cs.CY) [pdf, other]
Title: A First Approach to Risk-Limiting Audits for Single Transferable Vote Elections
Michelle Blom, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic
Comments: 16 pages
Journal-ref: FC 2022 Workshops, Lecture Notes in Computer Science 13412 (2023) 366-380
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[301] arXiv:2112.10020 (cross-list from quant-ph) [pdf, other]
Title: Cryptography from Pseudorandom Quantum States
Prabhanjan Ananth, Luowen Qian, Henry Yuen
Comments: 50 pages, 1 figure. Differences from v1: Expanded introduction; Corrected the ideal experiment in Definition 6.1; Expanded the implications to secure computations and other applications; General improvements
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[302] arXiv:2112.10128 (cross-list from quant-ph) [pdf, other]
Title: Performance analysis of continuous-variable quantum key distribution using non-Gaussian states
L.S. Aguiar, L.F.M. Borelli, J.A. Roversi, A. Vidiella-Barranco
Comments: 12 pages, 5 figures
Journal-ref: Quantum Inf. Process. 21, 304 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Optics (physics.optics)
[303] arXiv:2112.10356 (cross-list from cs.SE) [pdf, other]
Title: An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources
Roland Croft, M. Ali Babar, Li Li
Comments: Accepted for publication in SANER 22
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[304] arXiv:2112.10525 (cross-list from cs.LG) [pdf, other]
Title: Certified Federated Adversarial Training
Giulio Zizzo, Ambrish Rawat, Mathieu Sinn, Sergio Maffeis, Chris Hankin
Comments: First presented at the 1st NeurIPS Workshop on New Frontiers in Federated Learning (NFFL 2021)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[305] arXiv:2112.10599 (cross-list from cs.LG) [pdf, other]
Title: Differentially Private Regret Minimization in Episodic Markov Decision Processes
Sayak Ray Chowdhury, Xingyu Zhou
Comments: Accepted by AAAI 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Probability (math.PR)
[306] arXiv:2112.10699 (cross-list from cs.HC) [pdf, other]
Title: Mind-proofing Your Phone: Navigating the Digital Minefield with GreaseTerminator
Siddhartha Datta, Konrad Kollnig, Nigel Shadbolt
Comments: Accepted in ACM IUI 2022
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[307] arXiv:2112.10936 (cross-list from cs.CV) [pdf, other]
Title: Watch Those Words: Video Falsification Detection Using Word-Conditioned Facial Motion
Shruti Agarwal, Liwen Hu, Evonne Ng, Trevor Darrell, Hao Li, Anna Rohrbach
Comments: Accepted in WACV 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR); Multimedia (cs.MM)
[308] arXiv:2112.11018 (cross-list from cs.LG) [pdf, html, other]
Title: A Theoretical View of Linear Backpropagation and Its Convergence
Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang
Comments: This paper is accepted by IEEE Transactions on Pattern Analysis and Machine Intelligence
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE)
[309] arXiv:2112.11040 (cross-list from cs.LG) [pdf, other]
Title: Distributed Machine Learning and the Semblance of Trust
Dmitrii Usynin, Alexander Ziller, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis
Comments: Accepted at The Third AAAI Workshop on Privacy-Preserving Artificial Intelligence
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[310] arXiv:2112.11090 (cross-list from cs.IT) [pdf, other]
Title: Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach
Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic
Comments: This article has been accepted for publication in the IEEE Wireless Communications and Networking Conference
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[311] arXiv:2112.11134 (cross-list from cs.LG) [pdf, other]
Title: FedPOIRec: Privacy Preserving Federated POI Recommendation with Social Influence
Vasileios Perifanis, George Drosatos, Giorgos Stamatelatos, Pavlos S. Efraimidis
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[312] arXiv:2112.11165 (cross-list from quant-ph) [pdf, other]
Title: Scalable High-Rate Twin-Field Quantum Key Distribution Networks without Constraint of Probability and Intensity
Yuan-Mei Xie, Chen-Xun Weng, Yu-Shuo Lu, Yao Fu, Yang Wang, Hua-Lei Yin, Zeng-Bing Chen
Comments: 17 pages, 6 figures, 3 tables, Accepted for Publication in Phys. Rev. A
Journal-ref: Phys. Rev. A 107, 042603 (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Optics (physics.optics)
[313] arXiv:2112.11350 (cross-list from eess.SP) [pdf, other]
Title: Waveform-Defined Security: A Low-Cost Framework for Secure Communications
Tongyang Xu
Comments: in IEEE Internet of Things Journal
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[314] arXiv:2112.11409 (cross-list from eess.SP) [pdf, other]
Title: Waveform-Defined Privacy: A Signal Solution to Protect Wireless Sensing
Tongyang Xu
Journal-ref: 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), 2021, pp. 1-5
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[315] arXiv:2112.11635 (cross-list from quant-ph) [pdf, other]
Title: Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference
Yuan-Mei Xie, Yu-Shuo Lu, Chen-Xun Weng, Xiao-Yu Cao, Zhao-Ying Jia, Yu Bao, Yang Wang, Yao Fu, Hua-Lei Yin, Zeng-Bing Chen
Comments: 15 pages, 10 figures. arXiv admin note: text overlap with arXiv:2112.11165
Journal-ref: PRX Quantum 3, 020315 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Optics (physics.optics)
[316] arXiv:2112.11660 (cross-list from cs.LG) [pdf, html, other]
Title: AED: An black-box NLP classifier model attacker
Yueyang Liu, Yan Huang, Zhipeng Cai
Journal-ref: Neurocomputing, 550, 126489
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[317] arXiv:2112.11729 (cross-list from cs.CV) [pdf, other]
Title: Generalized Local Optimality for Video Steganalysis in Motion Vector Domain
Liming Zhai, Lina Wang, Yanzhen Ren, Yang Liu
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[318] arXiv:2112.11961 (cross-list from quant-ph) [pdf, other]
Title: BBM92 quantum key distribution over a free space dusty channel of 200 meters
Sarika Mishra, Ayan Biswas, Satyajeet Patil, Pooja Chandravanshi, Vardaan Mongia, Tanya Sharma, Anju Rani, Shashi Prabhakar, S. Ramachandran, Ravindra P. Singh
Comments: 7 pages, 6 figures, 2 tables
Journal-ref: Journal of Optics 24, 074002 (2022)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[319] arXiv:2112.12872 (cross-list from cs.LG) [pdf, other]
Title: Sparsified Secure Aggregation for Privacy-Preserving Federated Learning
Irem Ergun, Hasin Us Sami, Basak Guler
Comments: 28 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT)
[320] arXiv:2112.13060 (cross-list from cs.CV) [pdf, html, other]
Title: Fight Perturbations with Perturbations: Defending Adversarial Attacks via Neuron Influence
Ruoxi Chen, Haibo Jin, Haibin Zheng, Jinyin Chen, Zhenguang Liu
Comments: Final version. Accepted to IEEE Transactions on Dependable and Secure Computing
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[321] arXiv:2112.13178 (cross-list from cs.LG) [pdf, other]
Title: Gradient Leakage Attack Resilient Deep Learning
Wenqi Wei, Ling Liu
Comments: Shorter version of this paper accepted by IEEE TIFS
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[322] arXiv:2112.13267 (cross-list from cs.LG) [pdf, other]
Title: Task and Model Agnostic Adversarial Attack on Graph Neural Networks
Kartik Sharma, Samidha Verma, Sourav Medya, Arnab Bhattacharya, Sayan Ranu
Comments: To appear as a full paper in AAAI 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[323] arXiv:2112.13594 (cross-list from cs.IT) [pdf, other]
Title: Universal Randomized Guessing Subjected to Distortion
Asaf Cohen, Neri Merhav
Comments: Submitted to IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[324] arXiv:2112.13751 (cross-list from cs.LG) [pdf, other]
Title: Differentially-Private Sublinear-Time Clustering
Jeremiah Blocki, Elena Grigorescu, Tamalika Mukherjee
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[325] arXiv:2112.14232 (cross-list from cs.LG) [pdf, other]
Title: Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks
Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[326] arXiv:2112.14242 (cross-list from quant-ph) [pdf, other]
Title: Efficient Quantum Voting with Information-Theoretic Security
Emil T. Khabiboulline, Juspreet Singh Sandhu, Marco Ugo Gambetta, Mikhail D. Lukin, Johannes Borregaard
Comments: 11 + 15 pages, 4 + 1 figures
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[327] arXiv:2112.14317 (cross-list from quant-ph) [pdf, other]
Title: Quantum Merkle Trees
Lijie Chen, Ramis Movassagh
Journal-ref: Quantum 8, 1380 (2024)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[328] arXiv:2112.14430 (cross-list from cs.LG) [pdf, other]
Title: DP-FP: Differentially Private Forward Propagation for Large Models
Jian Du, Haitao Mi
Comments: 12 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[329] arXiv:2112.14445 (cross-list from cs.LG) [pdf, other]
Title: Differentially-Private Clustering of Easy Instances
Edith Cohen, Haim Kaplan, Yishay Mansour, Uri Stemmer, Eliad Tsfadia
Comments: A preliminary version appeared in ICML 2021
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[330] arXiv:2112.14652 (cross-list from cs.DS) [pdf, other]
Title: Private Rank Aggregation in Central and Local Models
Daniel Alabi, Badih Ghazi, Ravi Kumar, Pasin Manurangsi
Comments: To appear in the Proceedings of the 2022 AAAI Conference on Artificial Intelligence
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[331] arXiv:2112.14894 (cross-list from cs.CV) [pdf, other]
Title: Feature Generation and Hypothesis Verification for Reliable Face Anti-Spoofing
Shice Liu, Shitao Lu, Hongyi Xu, Jing Yang, Shouhong Ding, Lizhuang Ma
Comments: Accepted by AAAI 2022
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[332] arXiv:2112.14927 (cross-list from cs.SE) [pdf, other]
Title: An Empirical Study of Security Practices for Microservices Systems
Ali Rezaei Nasab, Mojtaba Shahin, Seyed Ali Hoseyni Raviz, Peng Liang, Amir Mashmool, Valentina Lenarduzzi
Comments: Preprint accepted for publication in Journal of Systems and Software, 2022
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[333] arXiv:2112.14988 (cross-list from quant-ph) [pdf, html, other]
Title: Deniable Encryption in a Quantum World
Andrea Coladangelo, Shafi Goldwasser, Umesh Vazirani
Comments: A previous version of this paper also included an alternative notion of quantum deniability called "$\ell$-deniability'', and proposed a construction that was mistakenly claimed to be "1-deniable'' assuming LWE. This construction was later found to be insecure, and thus all discussion of "$\ell$-deniability'' has been removed. All other contributions are unaffected
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[334] arXiv:2112.15109 (cross-list from q-bio.GN) [pdf, other]
Title: GenShare: Sharing Accurate Differentially-Private Statistics for Genomic Datasets with Dependent Tuples
Nour Almadhoun Alserr, Ozgur Ulusoy, Erman Ayday, Onur Mutlu
Comments: 8 pages, 7 figures
Subjects: Genomics (q-bio.GN); Cryptography and Security (cs.CR)
[335] arXiv:2112.15454 (cross-list from eess.SY) [pdf, other]
Title: Advanced Drone Swarm Security by Using Blockchain Governance Game
Song-Kyoo Kim
Comments: Song-Kyoo Kim, Advanced Drone Swarm Security by Using Blockchain Governance Game, Mathematics 10:18 (2022), 3338
Journal-ref: Advanced Drone Swarm Security by Using Blockchain Governance Game, Mathematics 10:18 (2022), 3338
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[336] arXiv:2112.15466 (cross-list from cs.IT) [pdf, other]
Title: Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes
Wenshuo Guo, Fang-Wei Fu
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[337] arXiv:2112.15498 (cross-list from cs.SE) [pdf, other]
Title: State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing
Dongge Liu, Van-Thuan Pham, Gidon Ernst, Toby Murray, Benjamin I.P. Rubinstein
Comments: 10 pages, 8 figures, coloured, conference
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Total of 337 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack