Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for December 2021

Total of 337 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-337
Showing up to 50 entries per page: fewer | more | all
[201] arXiv:2112.13072 [pdf, other]
Title: A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks
Hisham A. Kholidy
Subjects: Cryptography and Security (cs.CR)
[202] arXiv:2112.13105 [pdf, other]
Title: Overview of Quantum Key Distribution Technique within IPsec Architecture
Emir Dervisevic, Miralem Mehic
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[203] arXiv:2112.13144 [pdf, other]
Title: SoK: A Study of the Security on Voice Processing Systems
Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[204] arXiv:2112.13162 [pdf, other]
Title: Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
Behnam Ghavami, Seyd Movi, Zhenman Fang, Lesley Shannon
Comments: Accepted for the 23rd International Symposium on Quality Electronic Design (ISQED'22)
Subjects: Cryptography and Security (cs.CR)
[205] arXiv:2112.13166 [pdf, other]
Title: Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks
Osman Boyaci, Mohammad Rasoul Narimani, Katherine Davis, Erchin Serpedin
Comments: 5 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Signal Processing (eess.SP); Systems and Control (eess.SY)
[206] arXiv:2112.13236 [pdf, other]
Title: An Ensemble of Pre-trained Transformer Models For Imbalanced Multiclass Malware Classification
Ferhat Demirkıran, Aykut Çayır, Uğur Ünal, Hasan Dağ
Comments: 38 pages, 8 Figures, 13 Tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Machine Learning (stat.ML)
[207] arXiv:2112.13301 [pdf, other]
Title: Defending Against Membership Inference Attacks on Beacon Services
Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik
Subjects: Cryptography and Security (cs.CR); Genomics (q-bio.GN)
[208] arXiv:2112.13338 [pdf, other]
Title: MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning
Ajith Suresh
Comments: PhD thesis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[209] arXiv:2112.13340 [pdf, html, other]
Title: Towards a conjecture on a special class of matrices over commutative rings of characteristic 2
Baofeng Wu
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Combinatorics (math.CO)
[210] arXiv:2112.13416 [pdf, other]
Title: Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Settings
Tiantian Feng, Hanieh Hashemi, Rajat Hebbar, Murali Annavaram, Shrikanth S. Narayanan
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[211] arXiv:2112.13430 [pdf, other]
Title: IoT Analytics and Blockchain
Abbas Saleminezhadl, Manuel Remmele, Ravikumar Chaudhari, Rasha Kashef
Subjects: Cryptography and Security (cs.CR)
[212] arXiv:2112.13672 [pdf, other]
Title: An Obfuscating C Compiler for Encrypted Computing
Peter Breuer
Comments: Begun Mar 16 2018, submitted May 28 2018, SECRYPT 2018, accepted, final copy Jun 19 2018, withdrawn for conflict of dates. The paper extends to arrays of arrays one at SECRYPT 2017 that compiled arrays (difficulty is pointers). Rewritten for DSN 2018 (1902.06146) and rejected! (it added ideal criteria for security that a source language translator cannot satisfy). Here for historical reference. arXiv admin note: text overlap with arXiv:1902.06146
Subjects: Cryptography and Security (cs.CR)
[213] arXiv:2112.13719 [pdf, other]
Title: Casr-Cluster: Crash Clustering for Linux Applications
Georgy Savidov, Andrey Fedotov
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[214] arXiv:2112.13798 [pdf, other]
Title: PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection
Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan
Comments: An earlier version is accepted to be published in IEEE Conference on Communications and Network Security (CNS) 2021
Subjects: Cryptography and Security (cs.CR)
[215] arXiv:2112.13923 [pdf, other]
Title: Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature
Na Young Ahn, Dong Hoon Lee
Comments: resubmitted(Nov. 25, 2021) and accepted(Dec. 15, 2021)in IEEE ACCESS(Access-2021-39427)
Subjects: Cryptography and Security (cs.CR)
[216] arXiv:2112.13956 [pdf, other]
Title: A Blockchain-based Data Governance Framework with Privacy Protection and Provenance for e-Prescription
Rodrigo Dutra Garcia (1), Gowri Sankar Ramachandran (2), Raja Jurdak (2), Jo Ueyama (1) ((1) Institute of Mathematics and Computer Science, University of Sao Paulo, Brazil, (2) School of Computer Science, Queensland University of Technology, Australia)
Subjects: Cryptography and Security (cs.CR)
[217] arXiv:2112.13994 [pdf, other]
Title: Mining and Classifying Privacy and Data Protection Requirements in Issue Reports
Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Aditya Ghose
Comments: arXiv admin note: substantial text overlap with arXiv:2101.01298
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[218] arXiv:2112.14078 [pdf, other]
Title: Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles
Pranav Kumar Singh, Sukumar Nandi, Sunit K. Nandi, Uttam Ghosh, Danda B. Rawat
Comments: 9 pages, 6 figures
Journal-ref: The work is published in IEEE COMSOC MMTC Communications - Frontiers Vol. 16, No. 6, November 2021, Page 12-24
Subjects: Cryptography and Security (cs.CR)
[219] arXiv:2112.14108 [pdf, other]
Title: Fostering the Robustness of White-Box Deep Neural Network Watermarks by Neuron Alignment
Fang-Qi Li, Shi-Lin Wang, Yun Zhu
Comments: 5 pages
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[220] arXiv:2112.14137 [pdf, other]
Title: State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems
Hisham A. Kholidy
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[221] arXiv:2112.14205 [pdf, other]
Title: Analysis of Longitudinal Changes in Privacy Behavior of Android Applications
Alexander Yu, Yuvraj Agarwal, Jason I. Hong
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[222] arXiv:2112.14437 [pdf, other]
Title: A Color Image Steganography Based on Frequency Sub-band Selection
Hai Su, Shan Yang, Shuqing Zhang, Songsen Yu
Comments: 19 pages,17 figures
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[223] arXiv:2112.14468 [pdf, other]
Title: Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang
Comments: The paper has been accepted by the 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-22)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Distributed, Parallel, and Cluster Computing (cs.DC)
[224] arXiv:2112.14469 [pdf, other]
Title: Physical Layer Security Techniques for Future Wireless Networks
Weiping Shi, Xinyi Jiang, Jinsong Hu, Yin Teng, Yang Wang, Hangjia He, Rongen Dong, Feng Shu, Jiangzhou Wang
Comments: 11pages,9 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[225] arXiv:2112.14618 [pdf, other]
Title: IoT Security Challenges and Mitigations: An Introduction
Stuart Millar
Comments: 5 pages, 1 figure, this version dated October 21st 2016
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[226] arXiv:2112.14737 [pdf, other]
Title: Distance-Aware Private Set Intersection
Anrin Chakraborti, Giulia Fanti, Michael K. Reiter
Subjects: Cryptography and Security (cs.CR)
[227] arXiv:2112.14771 [pdf, other]
Title: Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities
Behkish Nassirzadeh, Huaiying Sun, Sebastian Banescu, Vijay Ganesh
Comments: 13 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[228] arXiv:2112.14773 [pdf, other]
Title: Working mechanism of Eternalblue and its application in ransomworm
Zian Liu
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[229] arXiv:2112.14821 [pdf, other]
Title: Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space
Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça
Subjects: Cryptography and Security (cs.CR)
[230] arXiv:2112.14889 [pdf, other]
Title: Few-shot Backdoor Defense Using Shapley Estimation
Jiyang Guan, Zhuozhuo Tu, Ran He, Dacheng Tao
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE)
[231] arXiv:2112.15001 [pdf, other]
Title: Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing
Josep Domingo-Ferrer, Jesús Manjón
Comments: IEEE Transactions on Dependable and Secure Computing, to appear
Subjects: Cryptography and Security (cs.CR)
[232] arXiv:2112.15322 [pdf, other]
Title: An Efficient and Robust Committee Structure for Sharding Blockchain
Mengqian Zhang, Jichen Li, Zhaohua Chen, Hongyin Chen, Xiaotie Deng
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[233] arXiv:2112.15479 [pdf, other]
Title: BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption
Sangpyo Kim, Jongmin Kim, Michael Jaemin Kim, Wonkyung Jung, Minsoo Rhu, John Kim, Jung Ho Ahn
Comments: 15 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[234] arXiv:2112.15491 [pdf, other]
Title: Semantics-Recovering Decompilation through Neural Machine Translation
Ruigang Liang, Ying Cao, Peiwei Hu, Jinwen He, Kai Chen
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL); Software Engineering (cs.SE)
[235] arXiv:2112.15561 [pdf, other]
Title: SOK: On the Analysis of Web Browser Security
Jungwon Lim (1), Yonghwi Jin (2), Mansour Alharthi (1), Xiaokuan Zhang (1), Jinho Jung (1), Rajat Gupta (1), Kuilin Li (1), Daehee Jang (3), Taesoo Kim (1) ((1) Georgia Institute of Technology, (2) Theori Inc., (3) Sungshin Women's University)
Subjects: Cryptography and Security (cs.CR)
[236] arXiv:2112.15566 [pdf, other]
Title: In Lieu of Privacy: Anonymous Contact Tracing
Rohit Bhat, Shranav Palakurthi, Naman Tiwari
Comments: 9 pages, 2 figures, student project
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[237] arXiv:2112.00107 (cross-list from cs.HC) [pdf, other]
Title: LGBTQ Privacy Concerns on Social Media
Christine Geeng, Alexis Hiniker
Comments: Workshop at 2018 CHI conference on human factors in computing systems: Exploring Individual Differences in Privacy
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[238] arXiv:2112.00193 (cross-list from cs.LG) [pdf, other]
Title: Public Data-Assisted Mirror Descent for Private Model Training
Ehsan Amid, Arun Ganesh, Rajiv Mathews, Swaroop Ramaswamy, Shuang Song, Thomas Steinke, Vinith M. Suriyakumar, Om Thakkar, Abhradeep Thakurta
Comments: 20 pages, 8 figures, 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[239] arXiv:2112.00394 (cross-list from cs.IT) [pdf, other]
Title: Wiretap Secret Key Agreement Via Secure Omniscience
Praneeth Kumar Vippathalla, Chung Chan, Navin Kashyap, Qiaoqiao Zhou
Comments: 46 pages, 8 figures, submitted to the IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:2102.01771
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[240] arXiv:2112.00659 (cross-list from cs.LG) [pdf, other]
Title: Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Jiachen Sun, Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Dan Hendrycks, Jihun Hamm, Z. Morley Mao
Comments: 21 pages, 15 figures, and 9 tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[241] arXiv:2112.00828 (cross-list from cs.DS) [pdf, other]
Title: The Price of Differential Privacy under Continual Observation
Palak Jain, Sofya Raskhodnikova, Satchit Sivakumar, Adam Smith
Comments: 28 pages
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[242] arXiv:2112.00845 (cross-list from cs.LG) [pdf, other]
Title: Improving Differentially Private SGD via Randomly Sparsified Gradients
Junyi Zhu, Matthew B. Blaschko
Journal-ref: Transactions on Machine Learning Research (06/2023)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[243] arXiv:2112.01237 (cross-list from cs.CY) [pdf, other]
Title: Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity
Vincent Schlatt, Johannes Sedlmeir, Simon Feulner, Nils Urbach
Journal-ref: Information & Management, Special Issue "Blockchain Innovations: Business Opportunities and Management Challenges", 2021
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); General Economics (econ.GN)
[244] arXiv:2112.01238 (cross-list from cs.CY) [pdf, other]
Title: Ethereum Emissions: A Bottom-up Estimate
Kyle McDonald
Comments: Code at this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[245] arXiv:2112.01386 (cross-list from quant-ph) [pdf, other]
Title: Relativistic zero-knowledge protocol for NP over the internet unconditionally secure against quantum adversaries
André Chailloux, Yann Barsamian
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[246] arXiv:2112.01405 (cross-list from cs.LG) [pdf, other]
Title: FedRAD: Federated Robust Adaptive Distillation
Stefán Páll Sturluson, Samuel Trew, Luis Muñoz-González, Matei Grama, Jonathan Passerat-Palmbach, Daniel Rueckert, Amir Alansary
Comments: Accepted for 1st NeurIPS Workshop on New Frontiers in Federated Learning (NFFL 2021), Virtual Meeting
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[247] arXiv:2112.01601 (cross-list from cs.CV) [pdf, html, other]
Title: Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?
Peter Lorenz, Dominik Strassel, Margret Keuper, Janis Keuper
Comments: AAAI-22 AdvML Workshop
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[248] arXiv:2112.01956 (cross-list from cs.LG) [pdf, other]
Title: Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
Yuanyuan Yuan, Qi Pang, Shuai Wang
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[249] arXiv:2112.02053 (cross-list from cs.CY) [pdf, other]
Title: Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises
Valdemar Švábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Čeleda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay
Comments: ACM SIGCSE 2022 conference, 7 pages, 3 figures
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)
[250] arXiv:2112.02080 (cross-list from cs.LG) [pdf, other]
Title: Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration
Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro
Comments: Submitted to the IEEE Transactions on Emerging Topics in Computing journal
Journal-ref: IEEE Transactions on Emerging Topics in Computing, Early Access, 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
Total of 337 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-337
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack