Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for July 2022

Total of 337 entries : 1-100 101-200 201-300 301-337
Showing up to 100 entries per page: fewer | more | all
[1] arXiv:2207.00038 [pdf, other]
Title: Waku: A Family of Modular P2P Protocols For Secure & Censorship-Resistant Communication
Oskar Thorén, Sanaz Taheri-Boshrooyeh, Hanno Cornelius
Comments: IEEE ICDCSW 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[2] arXiv:2207.00048 [pdf, other]
Title: Privacy-preserving Graph Analytics: Secure Generation and Federated Learning
Dongqi Fu, Jingrui He, Hanghang Tong, Ross Maciejewski
Comments: Workshop on Privacy Enhancing Technologies for the Homeland Security Enterprise. June 21, 2022. Washington, DC
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3] arXiv:2207.00083 [pdf, other]
Title: DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware
Hanieh Hashemi, Yongqin Wang, Murali Annavaram
Comments: MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture. arXiv admin note: text overlap with arXiv:2105.00334
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Machine Learning (cs.LG)
[4] arXiv:2207.00091 [pdf, other]
Title: Threat Assessment in Machine Learning based Systems
Lionel Nganyewou Tidjon, Foutse Khomh
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[5] arXiv:2207.00116 [pdf, other]
Title: Privacy-Preserving Spam-Protected Gossip-Based Routing
Sanaz Taheri-Boshrooyeh, Oskar Thorén, Barry Whitehat, Wei Jie Koh, Onur Kilic, Kobi Gurkan
Comments: IEEE ICDCS 2022
Subjects: Cryptography and Security (cs.CR)
[6] arXiv:2207.00117 [pdf, other]
Title: WAKU-RLN-RELAY: Privacy-Preserving Peer-to-Peer Economic Spam Protection
Sanaz Taheri-Boshrooyeh, Oskar Thorén, Barry Whitehat, Wei Jie Koh, Onur Kilic, Kobi Gurkan
Comments: IEEE ICDCSW 2022
Subjects: Cryptography and Security (cs.CR)
[7] arXiv:2207.00165 [pdf, other]
Title: Secure Forward Aggregation for Vertical Federated Neural Networks
Shuowei Cai, Di Chai, Liu Yang, Junxue Zhang, Yilun Jin, Leye Wang, Kun Guo, Kai Chen
Comments: Accepted by FL-IJCAI (this https URL)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[8] arXiv:2207.00232 [pdf, other]
Title: Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence
Peipei Liu, Hong Li, Zuoguang Wang, Jie Liu, Yimo Ren, Hongsong Zhu
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Information Retrieval (cs.IR)
[9] arXiv:2207.00263 [pdf, other]
Title: Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks
Ignjat Pejic, Rui Wang, Kaitai Liang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[10] arXiv:2207.00370 [pdf, other]
Title: AUDITEM: Toward an Automated and Efficient Data Integrity Verification Model Using Blockchain
Zeshun Shi, Jeroen Bergers, Ken Korsmit, Zhiming Zhao
Comments: Submitted to IEEE Internet of Things Journal
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2207.00420 [pdf, other]
Title: Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime
Wael Alghamdi, Shahab Asoodeh, Flavio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei
Comments: 41 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
[12] arXiv:2207.00421 [pdf, other]
Title: Generative Adversarial Networks and Image-Based Malware Classification
Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[13] arXiv:2207.00424 [pdf, other]
Title: LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks
Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O.P. Vyas, Rahamatullah Khondoker
Journal-ref: IEEE World AI IoT Congress 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[14] arXiv:2207.00425 [pdf, other]
Title: Transferable Graph Backdoor Attack
Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere
Comments: Accepted by the 25th International Symposium on Research in Attacks, Intrusions, and Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[15] arXiv:2207.00428 [pdf, other]
Title: FLVoogd: Robust And Privacy Preserving Federated Learning
Yuhang Tian, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[16] arXiv:2207.00620 [pdf, other]
Title: Multifamily Malware Models
Samanvitha Basole, Fabio Di Troia, Mark Stamp
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17] arXiv:2207.00633 [pdf, other]
Title: Hide me Behind the Noise: Local Differential Privacy for Indoor Location Privacy
Hojjat Navidan, Vahideh Moghtadaiee, Niki Nazaran, Mina Alishahi
Comments: 10 pages, 7 figures, Proceedings of EuroS&PW 2022
Subjects: Cryptography and Security (cs.CR)
[18] arXiv:2207.00637 [pdf, other]
Title: Ontology-Based Anomaly Detection for Air Traffic Control Systems
Christopher Neal, Jean-Yves De Miceli, David Barrera, José Fernandez
Subjects: Cryptography and Security (cs.CR)
[19] arXiv:2207.00740 [pdf, other]
Title: PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection
Zhi Lu, Vrizlynn L. L. Thing
Journal-ref: 7th International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-564-7; ISSN 2184-4976, pp 37-46, 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[20] arXiv:2207.00820 [pdf, other]
Title: Cyber Security Threat Awareness Framework for High School Students in Qatar
Mohammed Al-Tajer, Richard Adeyemi Ikuesan
Comments: 9 pages, 5 figures and 3 tables
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2207.00827 [pdf, other]
Title: Firenze: Model Evaluation Using Weak Signals
Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[22] arXiv:2207.00894 [pdf, other]
Title: Ransomware Classification and Detection With Machine Learning Algorithms
Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan
Journal-ref: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)
Subjects: Cryptography and Security (cs.CR)
[23] arXiv:2207.01193 [pdf, other]
Title: A Customized Text Sanitization Mechanism with Differential Privacy
Huimin Chen, Fengran Mo, Yanhao Wang, Cen Chen, Jian-Yun Nie, Chengyu Wang, Jamie Cui
Comments: This work has been accepted to the Findings of ACL 2023
Journal-ref: https://aclanthology.org/2023.findings-acl.355/
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[24] arXiv:2207.01227 [pdf, other]
Title: Cybersecurity: Past, Present and Future
Shahid Alam
Comments: Author's copy of the book published under ISBN: 978-620-4-74421-6
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2207.01298 [pdf, other]
Title: Sealer: In-SRAM AES for High-Performance and Low-Overhead Memory Encryption
Jingyao Zhang, Hoda Naghibijouybari, Elaheh Sadredini
Comments: 6 pages, ISLPED 2022
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[26] arXiv:2207.01362 [pdf, other]
Title: Non(c)esuch Ballot-Level Risk-Limiting Audits for Precinct-Count Voting Systems
Philip B. Stark
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[27] arXiv:2207.01410 [pdf, other]
Title: RQC revisited and more cryptanalysis for Rank-based Cryptography
Loïc Bidoux, Pierre Briaud, Maxime Bros, Philippe Gaborit
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:2207.01531 [pdf, other]
Title: Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[29] arXiv:2207.01590 [pdf, other]
Title: The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective
Behrouz Zolfaghari (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Abbas Yazdinejad (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Ali Dehghantanha (Cyber Science Lab, School of Computer Science, University of Guelph, Ontario, Canada), Jacob Krzciok (Department of Computer Science and Software Engineering, Miami University, Oxford, Ohio, 45056, USA), Khodakhast Bibak ( Department of Computer Science and Software Engineering, Miami University, Oxford, Ohio, 45056, USA)
Comments: The authors metadata field and some parts of paper during replacement has been updated in the new version
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2207.01599 [pdf, other]
Title: Combining ID's, Attributes, and Policies in Hyperledger Fabric
Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[31] arXiv:2207.01605 [pdf, other]
Title: ID-based self-encryption via Hyperledger Fabric based smart contract
Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:2207.01700 [pdf, other]
Title: Emergency Management and Recovery of Luna Classic
Edward Kim, Tobias Andersen, Marventus, A.E., Pedro Borges, David Schmidt, Matthew Western
Comments: 22 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[33] arXiv:2207.01738 [pdf, other]
Title: Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate
Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu
Comments: 16 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[34] arXiv:2207.01739 [pdf, other]
Title: Machine Learning in Access Control: A Taxonomy and Survey
Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu
Comments: Submitted to ACM Computing Survey
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[35] arXiv:2207.01790 [pdf, other]
Title: Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum
Dabao Wang, Hang Feng, Siwei Wu, Yajin Zhou, Lei Wu, Xingliang Yuan
Comments: 16 pages 12 figures Conferences: The 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), October 26--28, 2022, Limassol, Cyprus
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:2207.01808 [pdf, other]
Title: Complexity Analysis of the SAT Attack on Logic Locking
Yadi Zhong, Ujjwal Guin
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:2207.01837 [pdf, other]
Title: iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps
Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren
Comments: 11 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[38] arXiv:2207.01841 [pdf, other]
Title: Challenges in Adapting ECH in TLS for Privacy Enhancement over the Internet
Vinod S. Khandkar, Manjesh K. Hanawal, Sameer G Kulkarni
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[39] arXiv:2207.01950 [pdf, other]
Title: Electric Vehicle Charging: a Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)
Z. Garofalaki, D. Kosmanos, S. Moschoyiannis, D. Kallergis, C. Douligeris
Subjects: Cryptography and Security (cs.CR)
[40] arXiv:2207.01982 [pdf, other]
Title: Defending against the Label-flipping Attack in Federated Learning
Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41] arXiv:2207.02051 [pdf, other]
Title: Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions
Hanaa Abbas, Roberto Di Pietro
Subjects: Cryptography and Security (cs.CR)
[42] arXiv:2207.02108 [pdf, other]
Title: AI-based Malware and Ransomware Detection Models
Benjamin Marais, Tony Quertier, Stéphane Morucci
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[43] arXiv:2207.02117 [pdf, other]
Title: An Intrusion Detection System based on Deep Belief Networks
Othmane Belarbi, Aftab Khan, Pietro Carnelli, Theodoros Spyridopoulos
Comments: 15 pages, 4 figures, 4 tables. To be presented at the 4th International Conference on Science of Cyber Security (SciSec) in August 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[44] arXiv:2207.02207 [pdf, other]
Title: None Shall Pass: A blockchain-based federated identity management system
Shlok Gilda, Tanvi Jain, Aashish Dhalla
Comments: Accepted for publication in "Springer - Lecture Notes in Networks and Systems"
Subjects: Cryptography and Security (cs.CR)
[45] arXiv:2207.02303 [pdf, other]
Title: A Dataset on Malicious Paper Bidding in Peer Review
Steven Jecmen, Minji Yoon, Vincent Conitzer, Nihar B. Shah, Fei Fang
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT)
[46] arXiv:2207.02489 [pdf, other]
Title: RIDS : Real-time Intrusion Detection System for WPA3 enabled Enterprise Networks
Rahul Saini, Debajyoti Halder, Anand M. Baswade
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[47] arXiv:2207.02506 [pdf, other]
Title: You have been warned: Abusing 5G's Warning and Emergency Systems
Evangelos Bitsikas, Christina Pöpper
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[48] arXiv:2207.02517 [pdf, other]
Title: Transaction Monitoring of Smart Contracts
Margarita Capretto, Martin Ceresa, Cesar Sanchez
Subjects: Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[49] arXiv:2207.02614 [pdf, other]
Title: Securing Optimized Code Against Power Side Channels
Rodothea Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[50] arXiv:2207.02706 [pdf, other]
Title: LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm
Chintan Patel, Nishant Doshi
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:2207.02711 [pdf, other]
Title: SocChain: Blockchain with Swift Proportional Governance for Bribery Mitigation
Deepal Tennakoon, Vincent Gramoli
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[52] arXiv:2207.03247 [pdf, other]
Title: Local Inversion of maps: Black box Cryptanalysis
Virendra Sule
Comments: 13 pages. Summery and comprehension of a previous paper arxiv.org/abs/2202.06584v2
Subjects: Cryptography and Security (cs.CR)
[53] arXiv:2207.03269 [pdf, other]
Title: A Methodology to Support Automatic Cyber Risk Assessment Review
Marco Angelini, Silvia Bonomi, Alessandro Palma
Comments: 16 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[54] arXiv:2207.03339 [pdf, other]
Title: Comparing the Utility and Disclosure Risk of Synthetic Data with Samples of Microdata
Claire Little, Mark Elliot, Richard Allmendinger
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[55] arXiv:2207.03346 [pdf, other]
Title: Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol
Tyson Brooks
Journal-ref: International Journal of Ubiquitous Computing (IJU), Vol.13, No.1/2, April 2022
Subjects: Cryptography and Security (cs.CR)
[56] arXiv:2207.03384 [pdf, html, other]
Title: Efficient Pruning for Machine Learning Under Homomorphic Encryption
Ehud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculin
Journal-ref: In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds) Computer Security - ESORICS 2023. ESORICS 2023. Lecture Notes in Computer Science, vol 14347. Springer, Cham
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[57] arXiv:2207.03534 [pdf, other]
Title: A Review of Quantum Cybersecurity: Threats, Risks and Opportunities
Md Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib
Journal-ref: 1st International Conference on AI in Cybersecurity (ICAIC), 2022
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[58] arXiv:2207.03574 [pdf, other]
Title: Demystifying the Adversarial Robustness of Random Transformation Defenses
Chawin Sitawarin, Zachary Golan-Strieb, David Wagner
Comments: ICML 2022 (short presentation), AAAI 2022 AdvML Workshop (best paper, oral presentation)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[59] arXiv:2207.03576 [pdf, other]
Title: Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection Systems
D'Jeff Kanda Nkashama, Arian Soltani, Jean-Charles Verdier, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza
Comments: Machine Learning for Cybersecurity Workshop at the International Conference on Machine Learning(ICLR-ML4CY)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[60] arXiv:2207.03940 [pdf, other]
Title: Bistochastic privacy
Nicolas Ruiz, Josep Domingo-Ferrer
Comments: To be published in Lecture Notes in Artificial Intelligence vol 13408, Modeling Decisions for Artificial Intelligence 19th International Conference MDAI 2022, Sant Cugat, Catalonia, August 30 - 2 September 2022
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:2207.03987 [pdf, html, other]
Title: Post-quantum hash functions using $\mathrm{SL}_n(\mathbb{F}_p)$
Corentin Le Coz, Christopher Battarbee, Ramón Flores, Thomas Koberda, Delaram Kahrobaei
Comments: 18 pages, an appendix with a python/sage implementation of the hash functions
Subjects: Cryptography and Security (cs.CR); Group Theory (math.GR)
[62] arXiv:2207.04145 [pdf, other]
Title: Strong Anonymity for Mesh Messaging
Neil Perry, Bruce Spang, Saba Eskandarian, Dan Boneh
Comments: 21 pages, 11 figures; added reference to introduction
Subjects: Cryptography and Security (cs.CR)
[63] arXiv:2207.04424 [pdf, other]
Title: An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities
Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2207.04434 [pdf, other]
Title: Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication
Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang
Comments: This work has been submitted to the IEEE for possible publication
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[65] arXiv:2207.04459 [pdf, other]
Title: A Decentralised Real Estate Transfer Verification Based on Self-Sovereign Identity and Smart Contracts
Abubakar-Sadiq Shehu, Antonio Pinto, Manuel E. Correia
Comments: Shehu, A-S.; Pinto, A. and Correia, M. (2022). A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts. This article has been accepted for publication In Proceedings of the 19th International Conference on Security and Cryptography
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2207.04503 [pdf, other]
Title: BotNet Intrusion Detection System in Internet of Things with Developed Deep Learning
Amirabas Kabiri Zamani, Amirahmad Chapnevis
Comments: 19 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[67] arXiv:2207.04548 [pdf, other]
Title: Differential Imaging Forensics: A Feasibility Study
Aurélien Bourquard, Jeff Yan
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:2207.04604 [pdf, other]
Title: Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption
Guowen Xu, Guanlin Li, Shangwei Guo, Tianwei Zhang, Hongwei Li
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[69] arXiv:2207.04620 [pdf, other]
Title: Hercules: Boosting the Performance of Privacy-preserving Federated Learning
Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng
Subjects: Cryptography and Security (cs.CR)
[70] arXiv:2207.04637 [pdf, other]
Title: SIMC 2.0: Improved Secure ML Inference Against Malicious Clients
Guowen Xu, Xingshuo Han, Tianwei Zhang, Shengmin Xu, Jianting Ning, Xinyi Huang, Hongwei Li, Robert H.Deng
Subjects: Cryptography and Security (cs.CR)
[71] arXiv:2207.04668 [pdf, other]
Title: A Secure Fingerprinting Framework for Distributed Image Classification
Guowen Xu, Xingshuo Han, Anguo Zhang, Tianwei Zhang
Comments: need new formal analysis
Subjects: Cryptography and Security (cs.CR)
[72] arXiv:2207.04692 [pdf, other]
Title: PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning
Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin
Comments: 13 pages main text, 7 pages supplementary material (total 20 pages), 8 figures, submitted to IEEE Transactions on Information Forensics and Security
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[73] arXiv:2207.04706 [pdf, other]
Title: What Your Wearable Devices Revealed About You and Possibilities of Non-Cooperative 802.11 Presence Detection During Your Last IPIN Visit
Tomas Bravenec, Joaquín Torres-Sospedra, Michael Gould, Tomas Fryza
Comments: 7 pages, 7 figures, submitted to IPIN2022 conference
Subjects: Cryptography and Security (cs.CR)
[74] arXiv:2207.04716 [pdf, other]
Title: PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner, Martin Henze, Martin Serror
Comments: Cyber Security Experimentation and Test Workshop (CSET 2022)
Subjects: Cryptography and Security (cs.CR)
[75] arXiv:2207.04785 [pdf, other]
Title: SALSA: Attacking Lattice Cryptography with Transformers
Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter
Comments: Extended version of work published at NeurIPS 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[76] arXiv:2207.04843 [pdf, other]
Title: Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems
Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[77] arXiv:2207.05047 [pdf, other]
Title: MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably
Bar Alon, Moni Naor, Eran Omri, Uri Stemmer
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:2207.05240 [pdf, other]
Title: From Bitcoin to Solana -- Innovating Blockchain towards Enterprise Applications
Xiangyu Li, Xinyu Wang, Tingli Kong, Junhao Zheng, Min Luo
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:2207.05269 [pdf, other]
Title: Security Methods in Internet of vehicles
Mahmood A. Al-Shareeda, Selvakumar Manickam
Subjects: Cryptography and Security (cs.CR)
[80] arXiv:2207.05297 [pdf, other]
Title: Efficient and Privacy Preserving Group Signature for Federated Learning
Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[81] arXiv:2207.05383 [pdf, other]
Title: Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
Yuanyu Zhang, Zhumeng Zheng, Ji He, Shuangrui Zhao, Qianyue Qu, Yulong Shen, Xiaohong Jiang
Subjects: Cryptography and Security (cs.CR)
[82] arXiv:2207.05413 [pdf, other]
Title: A Security-aware and LUT-based CAD Flow for the Physical Synthesis of eASICs
Zain UlAbideen, Tiago Diadami Perez, Mayler Martins, Samuel Pagliarini
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Logic in Computer Science (cs.LO)
[83] arXiv:2207.05436 [pdf, other]
Title: Markov Decision Process For Automatic Cyber Defense
Xiaofan Zhou, Simon Yusuf Enoch, Dong Seong Kim
Comments: 12 pages conference paper (Accepted)
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:2207.05475 [pdf, other]
Title: A novel conservative chaos driven dynamic DNA coding for image encryption
Vinod Patidar, Gurpreet Kaur
Comments: 29 pages, 5 figures, 15 tables
Journal-ref: Frontiers in Applied Mathematics and Statistics 8:1100839 (2023)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[85] arXiv:2207.05548 [pdf, other]
Title: Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware
Luca Demetrio, Battista Biggio, Fabio Roli
Journal-ref: IEEE Security & Privacy, 2022
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[86] arXiv:2207.05623 [pdf, other]
Title: Attacking (and defending) the Maritime Radar System
G. Longo, E. Russo, A. Armando, A. Merlo
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2207.05675 [pdf, other]
Title: Time synchronization protocol for the KLJN secure key exchange scheme
Laszlo B. Kish
Comments: In press at Fluctuation and Noise Letters. Coming out in the October 2022 issue
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[88] arXiv:2207.05676 [pdf, other]
Title: HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version)
Mohammad Sina Karvandi, MohammadHossein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadizanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Operating Systems (cs.OS)
[89] arXiv:2207.05869 [pdf, other]
Title: Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage
Parikshit Hegde, Robert Streit, Yanni Georghiades, Chaya Ganesh, Sriram Vishwanath
Subjects: Cryptography and Security (cs.CR)
[90] arXiv:2207.05890 [pdf, other]
Title: E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System
Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[91] arXiv:2207.05978 [pdf, other]
Title: Enhanced Security and Privacy via Fragmented Federated Learning
Najeeb Moharram Jebreel, Josep Domingo-Ferrer, Alberto Blanco-Justicia, David Sanchez
Comments: IEEE Transactions on Neural Networks and Learning Systems (To Appear)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[92] arXiv:2207.06102 [pdf, other]
Title: A blockchain-based secure storage scheme for medical information
Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang, Zhongdai Wu
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:2207.06109 [pdf, other]
Title: A Personalised User Authentication System based on EEG Signals
Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[94] arXiv:2207.06144 [pdf, other]
Title: A Beyond-5G Authentication and Key Agreement Protocol
Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian, Valtteri Niemi
Journal-ref: Network and System Security. NSS 2022. Lecture Notes in Computer Science, vol 13787. Springer, Cham, 2022, pp. 249-264
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:2207.06182 [pdf, other]
Title: Connected Vehicles: A Privacy Analysis
Mark Quinlan, Jun Zhao, Andrew Simpson
Journal-ref: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, Cham, 2019
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[96] arXiv:2207.06236 [pdf, other]
Title: Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities
Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[97] arXiv:2207.06358 [pdf, html, other]
Title: Smooth Anonymity for Sparse Graphs
Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina
Comments: WWW 2024 Short Paper
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[98] arXiv:2207.06589 [pdf, other]
Title: On the Feasibility of Unclonable Encryption, and More
Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark Zhandry
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[99] arXiv:2207.06683 [pdf, other]
Title: Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
Misbah Shafi, Rakesh Kumar Jha
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:2207.06686 [pdf, other]
Title: Behavioral Model For Live Detection of Apps Based Attack
Misbah Shafi, Rakesh Kumar Jha, Sanjeev Jain
Subjects: Cryptography and Security (cs.CR)
Total of 337 entries : 1-100 101-200 201-300 301-337
Showing up to 100 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack