Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs.CR

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Cryptography and Security

Authors and titles for April 2023

Total of 385 entries
Showing up to 2000 entries per page: fewer | more | all
[1] arXiv:2304.00060 [pdf, other]
Title: Evidential Transactions with Cyberlogic
Harald Ruess, Natarajan Shankar
Comments: 41 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO)
[2] arXiv:2304.00083 [pdf, html, other]
Title: A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference
Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra
Comments: 15 pages, 12 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3] arXiv:2304.00127 [pdf, other]
Title: Combining Blockchain and IOT for Decentralized Healthcare Data Management
Sajad Meisami, Sadaf Meisami, Melina Yousefi, Mohammad Reza Aref
Comments: 17 pages, 1 figures, 3 table. arXiv admin note: substantial text overlap with arXiv:2109.14812
Journal-ref: International Journal on Cryptography and Information Security (IJCIS), Vol. 13, No.1, March 2023, Page 35-50
Subjects: Cryptography and Security (cs.CR)
[4] arXiv:2304.00129 [pdf, other]
Title: Scalable and Privacy-Preserving Federated Principal Component Analysis
David Froelicher, Hyunghoon Cho, Manaswitha Edupalli, Joao Sa Sousa, Jean-Philippe Bossuat, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Bonnie Berger, Jean-Pierre Hubaux
Comments: Published elsewhere. IEEE Symposium on Security and Privacy 2023
Subjects: Cryptography and Security (cs.CR)
[5] arXiv:2304.00160 [pdf, other]
Title: Secure Federated Learning against Model Poisoning Attacks via Client Filtering
Duygu Nur Yaldiz, Tuo Zhang, Salman Avestimehr
Journal-ref: ICLR 2023 Workshop on Backdoor Attacks and Defenses in Machine Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[6] arXiv:2304.00258 [pdf, other]
Title: Data Privacy Preservation on the Internet of Things
Jaydip Sen, Subhasis Dasgupta
Comments: This is an introductory chapter to be pubslished in the book: Information Security and Privacy in the Digital World - Some Selected Topics, Edited by Jaydip Sen and Joceli Mayer, InTech, Londoan, . ISBN: 978-1-83768-196-9. The book is expected to be published in June 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[7] arXiv:2304.00265 [pdf, other]
Title: Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature
Masayuki Tezuka, Keisuke Tanaka
Journal-ref: ICISC 2022
Subjects: Cryptography and Security (cs.CR)
[8] arXiv:2304.00382 [pdf, other]
Title: Scalable Attestation of Virtualized Execution Environments in Hybrid- and Multi-Cloud
Wojciech Ozga, Patricia Sagmeister, Tamás Visegrády, Silvio Dragone
Subjects: Cryptography and Security (cs.CR)
[9] arXiv:2304.00409 [pdf, other]
Title: DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection
Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner
Comments: Published at RAID 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Software Engineering (cs.SE)
[10] arXiv:2304.00473 [pdf, other]
Title: Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey
Mohammad Nadim, Wonjun Lee, David Akopian
Subjects: Cryptography and Security (cs.CR)
[11] arXiv:2304.00485 [pdf, other]
Title: Graph Mining for Cybersecurity: A Survey
Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du
Journal-ref: ACM Transactions on Knowledge Discovery from Data (TKDD). 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Social and Information Networks (cs.SI)
[12] arXiv:2304.00623 [pdf, other]
Title: MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks
Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[13] arXiv:2304.00713 [pdf, other]
Title: Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions
Jonathan Cook, Sabih ur Rehman, M. Arif Khan
Comments: 28 pages, 5 figures
Subjects: Cryptography and Security (cs.CR)
[14] arXiv:2304.00944 [pdf, other]
Title: Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)
Nikita Samarin, Shayna Kothari, Zaina Siyed, Oscar Bjorkman, Reena Yuan, Primal Wijesekera, Noura Alomar, Jordan Fischer, Chris Hoofnagle, Serge Egelman
Comments: Appears in Issue 3 of 23rd Privacy Enhancing Technologies Symposium (PETS 23)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[15] arXiv:2304.00955 [pdf, other]
Title: A short note on the paper `Are Randomized Caches Really Random?'
Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[16] arXiv:2304.00991 [pdf, other]
Title: Federated Kalman Filter for Secure IoT-based Device Monitoring Services
Marc Jayson Baucas, Petros Spachos
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[17] arXiv:2304.01073 [pdf, other]
Title: QUICstep: Circumventing QUIC-based Censorship
Watson Jia, Mona Wang, Liang Wang, Prateek Mittal
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[18] arXiv:2304.01107 [pdf, html, other]
Title: Process Channels: A New Layer for Process Enactment Based on Blockchain State Channels
Fabian Stiehle, Ingo Weber
Comments: Accepted at BPM 2023
Journal-ref: In: Di Francescomarino, C., Burattin, A., Janiesch, C., Sadiq, S. (eds) Business Process Management. BPM 2023
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[19] arXiv:2304.01142 [pdf, other]
Title: Learning About Simulated Adversaries from Human Defenders using Interactive Cyber-Defense Games
Baptiste Prebot, Yinuo Du, Cleotilde Gonzalez
Comments: Submitted to Journal of Cybersecurity
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[20] arXiv:2304.01166 [pdf, other]
Title: Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis
Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade
Comments: Presented in International conference SACAIM 2021, 5 pages
Subjects: Cryptography and Security (cs.CR)
[21] arXiv:2304.01440 [pdf, other]
Title: A Deep Multi-Modal Cyber-Attack Detection in Industrial Control Systems
Sepideh Bahadoripour, Ethan MacDonald, Hadis Karimipour
Comments: This paper is accepted by the 24th IEEE International Conference on Industrial Technology (ICIT2023)
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22] arXiv:2304.01580 [pdf, html, other]
Title: Untargeted Near-collision Attacks on Biometrics: Real-world Bounds and Theoretical Limits
Axel Durbet, Paul-Marie Grollemund, Kevin Thiry-Atighehchi
Comments: Correction of typos
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[23] arXiv:2304.01635 [pdf, html, other]
Title: A False Sense of Privacy: Towards a Reliable Evaluation Methodology for the Anonymization of Biometric Data
Simon Hanisch, Julian Todt, Jose Patino, Nicholas Evans, Thorsten Strufe
Subjects: Cryptography and Security (cs.CR)
[24] arXiv:2304.01689 [pdf, other]
Title: Privacy-Preserving Federated Discovery of DNA Motifs with Differential Privacy
Yao Chen, Wensheng Gan, Gengsen Huang, Yongdong Wu, Philip S. Yu
Comments: Preprint. 7 figures, 1 table
Subjects: Cryptography and Security (cs.CR)
[25] arXiv:2304.01990 [pdf, other]
Title: Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification
Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Signal Processing (eess.SP)
[26] arXiv:2304.02102 [pdf, other]
Title: Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
Ferhat Erata, Ruzica Piskac, Victor Mateu, Jakub Szefer
Subjects: Cryptography and Security (cs.CR)
[27] arXiv:2304.02103 [pdf, other]
Title: Token-Level Fuzzing
Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna
Journal-ref: USENIX Security Symposium, 2021, pages 2795-2809
Subjects: Cryptography and Security (cs.CR)
[28] arXiv:2304.02107 [pdf, other]
Title: 30 Years of Synthetic Data
Joerg Drechsler, Anna-Carolina Haensch
Comments: 42 pages
Subjects: Cryptography and Security (cs.CR)
[29] arXiv:2304.02260 [pdf, other]
Title: Feature Engineering Using File Layout for Malware Detection
Jeongwoo Kim, Eun-Sun Cho, Joon-Young Paik
Comments: 2pages, no figures, This manuscript was presented in the poster session of The Annual Computer Security Applications Conference (ACSAC) 2020
Subjects: Cryptography and Security (cs.CR)
[30] arXiv:2304.02312 [pdf, other]
Title: How to choose your best allies for a transferable attack?
Thibault Maho, Seyed-Mohsen Moosavi-Dezfooli, Teddy Furon
Comments: ICCV 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[31] arXiv:2304.02401 [pdf, other]
Title: PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information
Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun
Comments: The extended version of the USENIX Security '23 paper
Subjects: Cryptography and Security (cs.CR)
[32] arXiv:2304.02485 [pdf, other]
Title: HyPFuzz: Formal-Assisted Processor Fuzzing
Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran
Comments: To be published in the proceedings of the 32st USENIX Security Symposium, 2023
Subjects: Cryptography and Security (cs.CR)
[33] arXiv:2304.02510 [pdf, other]
Title: FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation
Mahya Morid Ahmadi, Lilas Alrahis, Ozgur Sinanoglu, Muhammad Shafique
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)
[34] arXiv:2304.02614 [pdf, other]
Title: The Realizations of Steganography in Encrypted Domain
Yan Ke, Minqing Zhang, Jia Liu, Xiaoyuan Yang
Subjects: Cryptography and Security (cs.CR)
[35] arXiv:2304.02655 [pdf, other]
Title: Deciphering the Blockchain: A Comprehensive Analysis of Bitcoin's Evolution, Adoption, and Future Implications
Neelesh Mungoli
Subjects: Cryptography and Security (cs.CR)
[36] arXiv:2304.02730 [pdf, html, other]
Title: Fair Ordering in Replicated Systems via Streaming Social Choice
Geoffrey Ramseyer, Ashish Goel
Subjects: Cryptography and Security (cs.CR)
[37] arXiv:2304.02782 [pdf, other]
Title: FACE-AUDITOR: Data Auditing in Facial Recognition Systems
Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang
Comments: To appear in the 32nd USENIX Security Symposium, August 2023, Anaheim, CA, USA
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[38] arXiv:2304.02810 [pdf, other]
Title: Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher
Subjects: Cryptography and Security (cs.CR)
[39] arXiv:2304.02838 [pdf, html, other]
Title: TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph
Nan Wang, Xuezhi Wen, Dalin Zhang, Xibin Zhao, Jiahui Ma, Mengxia Luo, Fan Xu, Sen Nie, Shi Wu, Jiqiang Liu
Comments: 10 pages, 7 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[40] arXiv:2304.02870 [pdf, other]
Title: Protecting User Privacy in Online Settings via Supervised Learning
Alexandru Rusescu, Brooke Lampe, Weizhi Meng
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[41] arXiv:2304.02932 [pdf, other]
Title: Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding
Yuke Hu, Wei Liang, Ruofan Wu, Kai Xiao, Weiqiang Wang, Xiaochen Li, Jinfei Liu, Zhan Qin
Comments: Accepted in the ACM Web Conference (WWW 2023)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[42] arXiv:2304.02959 [pdf, other]
Title: When approximate design for fast homomorphic computation provides differential privacy guarantees
Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler
Comments: 28 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[43] arXiv:2304.02977 [pdf, other]
Title: On the Limits of Cross-Authentication Checks for GNSS Signals
Francesco Ardizzon, Laura Crosara, Stefano Tomasin, Nicola Laurenti
Comments: Submitted to TIFS
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[44] arXiv:2304.02981 [pdf, html, other]
Title: Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?
Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Ben Livshits
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[45] arXiv:2304.03045 [pdf, other]
Title: Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards
Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David Choffnes
Subjects: Cryptography and Security (cs.CR)
[46] arXiv:2304.03315 [pdf, other]
Title: Exploration of Quantum Computer Power Side-Channels
Chuanqi Xu, Ferhat Erata, Jakub Szefer
Comments: 17 pages, 11 figures. Main changes are the updated "Defenses" Section and text edits on other sections
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[47] arXiv:2304.03387 [pdf, other]
Title: From Social Engineering to Quantum Threats: Safeguarding User Wallets with FailSafe
Gennady Medvinsky, Ben Livshits
Subjects: Cryptography and Security (cs.CR)
[48] arXiv:2304.03405 [pdf, other]
Title: A Comprehensive Survey of Upgradeable Smart Contract Patterns
Sajad Meisami, William Edward Bodell III
Comments: 7 pages, 9 figures
Journal-ref: Illinois Institute of Technology, Department of Computer Science Poster session, 2023
Subjects: Cryptography and Security (cs.CR)
[49] arXiv:2304.03472 [pdf, other]
Title: Does Prompt-Tuning Language Model Ensure Privacy?
Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[50] arXiv:2304.03541 [pdf, other]
Title: Code-based Cryptography: Lecture Notes
Thomas Debris-Alazard
Comments: Lecture notes for a course given at École normale supérieure de Lyon and summer school 2022 in post-quantum cryptography that took place in the university of Budapest
Subjects: Cryptography and Security (cs.CR)
[51] arXiv:2304.03579 [pdf, other]
Title: A lightweight Encryption Method For Privacy-Preserving in Process Mining
Mohsen Kazemian, Markus Helfert
Journal-ref: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC),14-17 Nov. 2023, Abu Dhabi, United Arab Emirates, pp. 0228-0233
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[52] arXiv:2304.03616 [pdf, other]
Title: Qubo model for the Closest Vector Problem
Eduardo Canale, Claudio Qureshi, Alfredo Viola
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[53] arXiv:2304.03640 [pdf, other]
Title: FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination
Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[54] arXiv:2304.03657 [pdf, other]
Title: SCART: Simulation of Cyber Attacks for Real-Time
Kfir Girstein, Eliron Rahimi, Avi Mendelson
Subjects: Cryptography and Security (cs.CR)
[55] arXiv:2304.03691 [pdf, other]
Title: Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms
Zihao Wang, Vrizlynn L. L. Thing
Comments: Computers & Security, Volume 128, No. 103143, 2023
Journal-ref: Computers & Security, Volume 128, No. 103143, 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[56] arXiv:2304.03698 [pdf, other]
Title: Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers
Vrizlynn L. L. Thing
Comments: IEEE Cyber Security and Resilience Conference 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[57] arXiv:2304.03807 [pdf, other]
Title: Privacy-Preserving CNN Training with Transfer Learning: Multiclass Logistic Regression
John Chiang
Comments: In this work, we initiated to implement privacy-persevering CNN training based on mere HE techniques by presenting a faster HE-friendly algorithm
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[58] arXiv:2304.03841 [pdf, other]
Title: Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning
Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang
Comments: Accepted in ACSAC 2024
Subjects: Cryptography and Security (cs.CR)
[59] arXiv:2304.03957 [pdf, other]
Title: A Continued Fraction-Hyperbola based Attack on RSA cryptosystem
Gilda Rech Bansimba, Regis Freguin Babindamana, Basile Guy R. Bossoto
Subjects: Cryptography and Security (cs.CR); Number Theory (math.NT)
[60] arXiv:2304.04233 [pdf, other]
Title: ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing
Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei
Comments: To appear in the Main Track of IEEE S&P 2023
Subjects: Cryptography and Security (cs.CR)
[61] arXiv:2304.04254 [pdf, other]
Title: Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet
Nitesh Ghodichor, Raj Thaneeghavl. V, Dinesh Sahu, Gautam Borkar, Ankush Sawarkar
Comments: this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[62] arXiv:2304.04381 [pdf, other]
Title: A Deep Analysis of Hybrid-Multikey-PUF
Md Ishtyaq Mahmud, Ahmed Abdelgawad, Venkata P. Yanambaka
Comments: 6,8th IEEE World Forum on Internet of Things (IEEE WFIoT2022)
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[63] arXiv:2304.04398 [pdf, other]
Title: Ransomware Detection and Classification Strategies
Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli
Comments: 9 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[64] arXiv:2304.04410 [pdf, other]
Title: Differentially Private Numerical Vector Analyses in the Local and Shuffle Model
Shaowei Wang, Jin Li, Yuntong Li, Jin Li, Wei Yang, Hongyang Yan
Comments: Full version of "Hiding Numerical Vectors in Local Private and Shuffled Messages" (IJCAI 2021)
Subjects: Cryptography and Security (cs.CR)
[65] arXiv:2304.04411 [pdf, other]
Title: Quantum Cyber-Attack on Blockchain-based VANET
Kazi Hassan Shakib, Mizanur Rahman, Mhafuzul Islam, Mashrur Chowdhury
Comments: This paper consists of 16 pages with 10 figures. It has been accepted to IEEE Transactions of Intelligent Transportation Systems
Subjects: Cryptography and Security (cs.CR)
[66] arXiv:2304.04480 [pdf, other]
Title: On the existence of highly organized communities in networks of locally interacting agents
V. Liagkou, P.E. Nastou, P. Spirakis, Y.C. Stamatiou
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[67] arXiv:2304.04619 [pdf, other]
Title: Fast polynomial arithmetic in homomorphic encryption with cyclo-multiquadratic fields
Iván Blanco-Chacón, Alberto Pedrouzo-Ulloa, Rahinatou Yuh Njah Nchiwo, Beatriz Barbero-Lucas
Subjects: Cryptography and Security (cs.CR)
[68] arXiv:2304.04835 [pdf, other]
Title: Measuring and Evading Turkmenistan's Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country
Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
Comments: To appear in Proceedings of The 2023 ACM Web Conference (WWW 2023)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Networking and Internet Architecture (cs.NI)
[69] arXiv:2304.04846 [pdf, other]
Title: Helix++: A platform for efficiently securing software
Jack W. Davidson, Jason D. Hiser, Anh Nguyen-Tuong
Comments: 4 pages, 1 figure, white paper
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[70] arXiv:2304.04987 [pdf, other]
Title: Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity
Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, Gustavo Batista, Vijay Sivaraman
Comments: 18 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[71] arXiv:2304.04998 [pdf, other]
Title: EESMR: Energy Efficient BFT-SMR for the masses
Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter
Comments: Appearing in Middleware 2023
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[72] arXiv:2304.05007 [pdf, html, other]
Title: Privacy Amplification via Shuffling: Unified, Simplified, and Tightened
Shaowei Wang, Yun Peng, Jin Li, Zikai Wen, Zhipeng Li, Shiyu Yu, Di Wang, Wei Yang
Comments: To appear in VLDB 2024. Code available at this https URL
Subjects: Cryptography and Security (cs.CR)
[73] arXiv:2304.05123 [pdf, other]
Title: Algorithms for Reconstructing DDoS Attack Graphs using Probabilistic Packet Marking
Dina Barak-Pelleg, Daniel Berend, Thomas J. Robinson, Itamar Zimmerman
Comments: 30 pages, 4 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Probability (math.PR)
[74] arXiv:2304.05127 [pdf, other]
Title: Balancing Privacy and Performance for Private Federated Learning Algorithms
Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[75] arXiv:2304.05200 [pdf, other]
Title: Journey to the Center of Software Supply Chain Attacks
Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais
Comments: arXiv admin note: substantial text overlap with arXiv:2204.04008
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[76] arXiv:2304.05237 [pdf, other]
Title: TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation
David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram
Comments: 6 pages, 5 figures and 2 tables
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Distributed, Parallel, and Cluster Computing (cs.DC); Performance (cs.PF)
[77] arXiv:2304.05306 [pdf, other]
Title: Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique
Miloš Grujić, Ingrid Verbauwhede
Comments: Final version after the review process. Accepted for publication in IEEE Transactions on Information Forensics and Security. Corrected typos
Journal-ref: M. Gruji\'c and I. Verbauwhede, "Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 586-600, 2024
Subjects: Cryptography and Security (cs.CR)
[78] arXiv:2304.05445 [pdf, other]
Title: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs
Kaki Ryan, Cynthia Sturton
Subjects: Cryptography and Security (cs.CR)
[79] arXiv:2304.05513 [pdf, other]
Title: End-to-End O-RAN Security Architecture, Threat Surface, Coverage, and the Case of the Open Fronthaul
Aly Sabri Abdalla, Vuk Marojevic
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[80] arXiv:2304.05516 [pdf, other]
Title: Echo of Neighbors: Privacy Amplification for Personalized Private Federated Learning with Shuffle Model
Yixuan Liu, Suyun Zhao, Li Xiong, Yuhan Liu, Hong Chen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[81] arXiv:2304.05520 [pdf, other]
Title: Analyzing the Impact of Elusive Faults on Blockchain Reliability
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[82] arXiv:2304.05590 [pdf, other]
Title: Zero-Knowledge Proof-based Practical Federated Learning on Blockchain
Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar
Subjects: Cryptography and Security (cs.CR)
[83] arXiv:2304.05644 [pdf, other]
Title: Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things
Mohamed Amine Ferrag, Djallel Hamouda, Merouane Debbah, Leandros Maglaras, Abderrahmane Lakas
Comments: The paper is accepted and will be published in the IEEE DCOSS-IoT 2023 Conference Proceedings
Subjects: Cryptography and Security (cs.CR)
[84] arXiv:2304.05682 [pdf, other]
Title: Automated Information Flow Analysis for Integrated Computing-in-Memory Modules
Lennart M. Reimann, Felix Staudigl, Rainer Leupers
Comments: 5 pages, accepted at 21st IEEE Interregional NEWCAS Conference, Edinburgh, Scotland
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Emerging Technologies (cs.ET)
[85] arXiv:2304.05776 [pdf, other]
Title: A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments
Igor Ivkić, Dominik Thiede, Nicholas Race, Matthew Broadbent, Antonios Gouglidis
Comments: In Proceedings of the 13th International Conference on Cloud Computing and Services Science (CLOSER 2023). Prague, Czech Republic
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[86] arXiv:2304.05778 [pdf, other]
Title: Automated and Secure Onboarding for System of Systems
Silia Maksuti, Ani Bicaku, Mario Zsilak, Igor Ivkić, Bálint Péceli, Gábor Singler, Kristóf Kovács, Markus Tauber, Jerger Delsing
Comments: IEEE Access
Journal-ref: IEEE Access, 9, 111095-111113. 2021
Subjects: Cryptography and Security (cs.CR)
[87] arXiv:2304.05812 [pdf, other]
Title: Cost-damage analysis of attack trees
Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga
Subjects: Cryptography and Security (cs.CR); Optimization and Control (math.OC)
[88] arXiv:2304.06017 [pdf, other]
Title: Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators
Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak
Comments: Accepted in GLSVLSI 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Hardware Architecture (cs.AR)
[89] arXiv:2304.06167 [pdf, other]
Title: CoVE: Towards Confidential Computing on RISC-V Platforms
Ravi Sahita, Atish Patra, Vedvyas Shanbhogue, Samuel Ortiz, Andrew Bresticker, Dylan Reid, Atul Khare, Rajnesh Kanwal
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[90] arXiv:2304.06179 [pdf, other]
Title: SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market
Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley
Subjects: Cryptography and Security (cs.CR)
[91] arXiv:2304.06222 [pdf, other]
Title: A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard
Jasmin Kaur, Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); Computers and Society (cs.CY)
[92] arXiv:2304.06313 [pdf, html, other]
Title: Majority is not Needed: A Counterstrategy to Selfish Mining
Jonathan Gal, Maytal B Szabo, Ori Rottenstreich
Subjects: Cryptography and Security (cs.CR)
[93] arXiv:2304.06341 [pdf, other]
Title: EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation
Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi
Comments: To be published at Euro S&P 2023
Subjects: Cryptography and Security (cs.CR)
[94] arXiv:2304.06369 [pdf, other]
Title: An attack resilient policy on the tip pool for DAG-based distributed ledgers
Lianna Zhao, Andrew Cullen, Sebastian Müller, Olivia Saa, Robert Shorten
Subjects: Cryptography and Security (cs.CR)
[95] arXiv:2304.06582 [pdf, other]
Title: Cryptanalysis of Random Affine Transformations for Encrypted Control
Nils Schlüter, Philipp Binfet, Moritz Schulze Darup
Comments: 8 pages, 2 figures, to be published in the proceedings of the 22nd World Congress of the International Federation of Automatic Control (2023)
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[96] arXiv:2304.06607 [pdf, html, other]
Title: False Claims against Model Ownership Resolution
Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan
Comments: 13pages,3 figures. To appear in the 33rd USENIX Security Symposium (USENIX Security '24)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[97] arXiv:2304.06723 [pdf, other]
Title: Introduction to Presentation Attack Detection in Fingerprint Biometrics
Javier Galbally, Julian Fierrez, Raffaele Cappelli, Gian Luca Marcialis
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[98] arXiv:2304.06724 [pdf, other]
Title: GradMDM: Adversarial Attack on Dynamic Networks
Jianhong Pan, Lin Geng Foo, Qichen Zheng, Zhipeng Fan, Hossein Rahmani, Qiuhong Ke, Jun Liu
Comments: Accepted to IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI)
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[99] arXiv:2304.06725 [pdf, other]
Title: Advanced Security Threat Modelling for Blockchain-Based FinTech Applications
Serhan W. Bahar
Subjects: Cryptography and Security (cs.CR)
[100] arXiv:2304.06727 [pdf, html, other]
Title: Contingency Analyses with Warm Starter using Probabilistic Graphical Model
Shimiao Li, Amritanshu Pandey, Larry Pileggi
Comments: arXiv admin note: substantial text overlap with arXiv:2205.03673
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[101] arXiv:2304.06728 [pdf, other]
Title: Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection
Junyao Wang, Hanning Chen, Mariam Issa, Sitao Huang, Mohsen Imani
Journal-ref: The 60th Annual Design Automation Conference (DAC), 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[102] arXiv:2304.06929 [pdf, other]
Title: Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment
Rachel Cummings, Damien Desfontaines, David Evans, Roxana Geambasu, Yangsibo Huang, Matthew Jagielski, Peter Kairouz, Gautam Kamath, Sewoong Oh, Olga Ohrimenko, Nicolas Papernot, Ryan Rogers, Milan Shen, Shuang Song, Weijie Su, Andreas Terzis, Abhradeep Thakurta, Sergei Vassilvitskii, Yu-Xiang Wang, Li Xiong, Sergey Yekhanin, Da Yu, Huanyu Zhang, Wanrong Zhang
Subjects: Cryptography and Security (cs.CR)
[103] arXiv:2304.06963 [pdf, other]
Title: Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network
Haoran Zhu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić
Comments: arXiv admin note: text overlap with arXiv:2302.00210
Subjects: Cryptography and Security (cs.CR); Numerical Analysis (math.NA)
[104] arXiv:2304.07037 [pdf, html, other]
Title: No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment
Anh V. Vu, Alice Hutchings, Ross Anderson
Journal-ref: Proceedings of the IEEE Symposium on Security and Privacy (S&P) 2024
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[105] arXiv:2304.07062 [pdf, other]
Title: Publicly Verifiable Deletion from Minimal Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
Comments: 15 pages
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[106] arXiv:2304.07092 [pdf, other]
Title: Obfuscation of Discrete Data
Saswata Naha, Sayantan Roy, Arkaprava Sanki, Diptanil Santra
Comments: 16 pages, 32 figures
Subjects: Cryptography and Security (cs.CR); Methodology (stat.ME)
[107] arXiv:2304.07134 [pdf, other]
Title: Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice
Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye
Comments: Published at USENIX Security 2022. This is the full version, please cite the USENIX version (see journal reference field)
Journal-ref: USENIX Security 22 (2022)
Subjects: Cryptography and Security (cs.CR)
[108] arXiv:2304.07165 [pdf, other]
Title: Hybrid DLT as a data layer for real-time, data-intensive applications
Andrea Canciani, Claudio Felicioli, Andrea Lisi, Fabio Severino
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[109] arXiv:2304.07166 [pdf, other]
Title: Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study
Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo
Comments: Accepted by 17th IEEE Workshop on Offensive Technologies
Subjects: Cryptography and Security (cs.CR)
[110] arXiv:2304.07210 [pdf, other]
Title: Measuring Re-identification Risk
CJ Carey, Travis Dick, Alessandro Epasto, Adel Javanmard, Josh Karlin, Shankar Kumar, Andres Munoz Medina, Vahab Mirrokni, Gabriel Henrique Nunes, Sergei Vassilvitskii, Peilin Zhong
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[111] arXiv:2304.07226 [pdf, other]
Title: BS-GAT Behavior Similarity Based Graph Attention Network for Network Intrusion Detection
Yalu Wang, Zhijie Han, Jie Li, Xin He
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[112] arXiv:2304.07232 [pdf, other]
Title: Evaluation of ChatGPT Model for Vulnerability Detection
Anton Cheshkov, Pavel Zadorozhny, Rodion Levichev
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[113] arXiv:2304.07234 [pdf, other]
Title: Can sparsity improve the privacy of neural networks?
Antoine Gonon, Léon Zheng, Clément Lalanne, Quoc-Tung Le, Guillaume Lauga, Can Pouliquen
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[114] arXiv:2304.07239 [pdf, other]
Title: Separating Key Agreement and Computational Differential Privacy
Vipul Arora, Eldon Chung, Zeyong Li, Thomas Tan
Comments: A key step in relating the probability that can be computed by the PSPACE algorithm to the statistical distinguishing probability is missing and not yet shown. Our arguments in this work so far have not yet been able to show this step. Thus the final conclusion that key agreement is black-box insufficient for CDP is not yet proven
Subjects: Cryptography and Security (cs.CR)
[115] arXiv:2304.07360 [pdf, other]
Title: Combining Generators of Adversarial Malware Examples to Increase Evasion Rate
Matouš Kozák, Martin Jureček
Comments: 9 pages, 5 figures, 2 tables. Under review
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116] arXiv:2304.07411 [pdf, other]
Title: SoK: The MITRE ATT&CK Framework in Research and Practice
Shanto Roy, Emmanouil Panaousis, Cameron Noakes, Aron Laszka, Sakshyam Panda, George Loukas
Subjects: Cryptography and Security (cs.CR)
[117] arXiv:2304.07470 [pdf, other]
Title: Few-shot Weakly-supervised Cybersecurity Anomaly Detection
Rahul Kale, Vrizlynn L. L. Thing
Comments: Computer and Security (Elsevier)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[118] arXiv:2304.07594 [pdf, other]
Title: Preventing Malicious Use of Keyloggers Using Anti-Keyloggers
Jami Gayatri Manjeera, Alisha Malla, Masani Venkata Lakshmi Pravallika
Comments: 5 Pages,4 Figures, Literature Survey, Methodology
Subjects: Cryptography and Security (cs.CR)
[119] arXiv:2304.07598 [pdf, other]
Title: Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators
Trishie Sharma (1), Rachit Agarwal (2), Sandeep Kumar Shukla (1) ((1) Indian Institute of Technology Kanpur, India, (2) Merkle Science, India)
Subjects: Cryptography and Security (cs.CR)
[120] arXiv:2304.07648 [pdf, other]
Title: Certifying Zero-Knowledge Circuits with Refinement Types
Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Işıl Dillig, Yu Feng
Comments: This paper was incorrectly submitted, and should be submitted to Cryptology ePrint Archive instead
Subjects: Cryptography and Security (cs.CR)
[121] arXiv:2304.07668 [pdf, other]
Title: FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare through Federated Learning and Blockchain
Nazar Waheed, Ateeq Ur Rehman, Anushka Nehra, Mahnoor Farooq, Nargis Tariq, Mian Ahmad Jan, Fazlullah Khan, Abeer Z. Alalmaie, Priyadarsi Nanda
Comments: Submitted to: Globecom 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[122] arXiv:2304.07676 [pdf, other]
Title: Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data
Nazar Waheed, Fazlullah Khan, Spyridon Mastorakis, Mian Ahmad Jan, Abeer Z. Alalmaie, Priyadarsi Nanda
Comments: Submitted to IEEE COINS
Subjects: Cryptography and Security (cs.CR)
[123] arXiv:2304.07704 [pdf, other]
Title: A Survey of Access Control Misconfiguration Detection Techniques
Bingyu Shen
Comments: 12 pages
Subjects: Cryptography and Security (cs.CR)
[124] arXiv:2304.07735 [pdf, html, other]
Title: Permutation Equivariance of Transformers and Its Applications
Hengyuan Xu, Liyao Xiang, Hangyu Ye, Dixi Yao, Pengzhi Chu, Baochun Li
Comments: Accepted by CVPR 2024
Subjects: Cryptography and Security (cs.CR)
[125] arXiv:2304.07909 [pdf, other]
Title: SECAdvisor: a Tool for Cybersecurity Planning using Economic Models
Muriel Figueredo Franco, Christian Omlin, Oliver Kamer, Eder John Scheid, Burkhard Stiller
Comments: 12 pages, 7 figures, 2 tables, 9 equations
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[126] arXiv:2304.07927 [pdf, other]
Title: A Randomized Approach for Tight Privacy Accounting
Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal
Comments: NeurIPS 2023
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS); Machine Learning (cs.LG)
[127] arXiv:2304.07937 [pdf, other]
Title: Decentralized Threshold Signatures with Dynamically Private Accountability
Meng Li, Mingwei Zhang, Qing Wang, Hanni Ding, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin
Subjects: Cryptography and Security (cs.CR)
[128] arXiv:2304.07940 [pdf, other]
Title: AVX Timing Side-Channel Attacks against Address Space Layout Randomization
Hyunwoo Choi, Suryeon Kim, Seungwon Shin
Comments: Accepted to Design Automation Conference (DAC) 2023
Journal-ref: The 60th Annual Design Automation Conference (DAC), 2023
Subjects: Cryptography and Security (cs.CR)
[129] arXiv:2304.07943 [pdf, other]
Title: Detecting Domain-Generation Algorithm (DGA) Based Fully-Qualified Domain Names (FQDNs) with Shannon Entropy
Adam Dorian Wong
Subjects: Cryptography and Security (cs.CR)
[130] arXiv:2304.07989 [pdf, other]
Title: IMCDCF: An Incremental Malware Detection Approach Using Hidden Markov Models
Ran Liu, Charles Nicholas
Comments: Malware Technical Exchange Meeting 2021 (MTEM'21)
Subjects: Cryptography and Security (cs.CR)
[131] arXiv:2304.08224 [pdf, other]
Title: Uncharted Territory: Energy Attacks in the Battery-less Internet of Things
Luca Mottola, Arslan Hameed, Thiemo Voigt
Subjects: Cryptography and Security (cs.CR)
[132] arXiv:2304.08263 [pdf, other]
Title: Information Flow Coverage Metrics for Hardware Security Verification
Andres Meza, Ryan Kastner
Comments: 6 pages, 3 Figures
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[133] arXiv:2304.08283 [pdf, other]
Title: Exploring Blockchain Technology through a Modular Lens: A Survey
Minghui Xu, Yihao Guo, Chunchi Liu, Qin Hu, Dongxiao Yu, Zehui Xiong, Dusit Niyato, Xiuzhen Cheng
Comments: 40 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[134] arXiv:2304.08411 [pdf, other]
Title: Evil from Within: Machine Learning Backdoors through Hardware Trojans
Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar
Comments: Annual Computer Security Applications Conference 2024
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[135] arXiv:2304.08429 [pdf, other]
Title: Security and Privacy Issues for Urban Smart Traffic Infrastructure
Anubhab Baksi, Ahmed Ibrahim Samir Khalil, Anupam Chattopadhyay
Comments: The study is partly outdated
Subjects: Cryptography and Security (cs.CR)
[136] arXiv:2304.08557 [pdf, other]
Title: A Decentralized Authorization and Security Framework for Distributed Research Workflows
Richard Cardone, Smruti Padhy, Steven Black, Sean Cleveland, Joe Stubbs
Comments: 10 pages. Short version of this paper to be published on COMPSAC 2023 proceedings
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[137] arXiv:2304.08595 [pdf, other]
Title: Prophet: Conflict-Free Sharding Blockchain via Byzantine-Tolerant Deterministic Ordering
Zicong Hong, Song Guo, Enyuan Zhou, Jianting Zhang, Wuhui Chen, Jinwen Liang, Jie Zhang, Albert Zomaya
Subjects: Cryptography and Security (cs.CR)
[138] arXiv:2304.08655 [pdf, other]
Title: An Ethereum-compatible blockchain that explicates and ensures design-level safety properties for smart contracts
Nikolaj Bjørner, Shuo Chen, Yang Chen, Zhongxin Guo, Peng Liu, Nanqing Luo
Subjects: Cryptography and Security (cs.CR); Programming Languages (cs.PL)
[139] arXiv:2304.08713 [pdf, other]
Title: FlexiChain 2.0: NodeChain Assisting Integrated Decentralized Vault for Effective Data Authentication and Device Integrity in Complex Cyber-Physical Systems
Ahmad J. Alkhodair, Saraju P. Mohanty, Elias Kougianos
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[140] arXiv:2304.08717 [pdf, other]
Title: InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion
Zhuojia Shen, John Criswell
Comments: 18 pages, 9 figures, 4 tables
Subjects: Cryptography and Security (cs.CR); Operating Systems (cs.OS)
[141] arXiv:2304.08718 [pdf, html, other]
Title: Generalized Implicit Factorization Problem
Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
Subjects: Cryptography and Security (cs.CR)
[142] arXiv:2304.08767 [pdf, other]
Title: Masked Language Model Based Textual Adversarial Example Detection
Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang
Comments: 13 pages,3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143] arXiv:2304.08811 [pdf, other]
Title: Towards the Transferable Audio Adversarial Attack via Ensemble Methods
Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju
Comments: Submitted to Cybersecurity journal 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[144] arXiv:2304.08979 [pdf, other]
Title: In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT
Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145] arXiv:2304.09259 [pdf, other]
Title: An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems
Jonathan M Spring
Subjects: Cryptography and Security (cs.CR)
[146] arXiv:2304.09456 [pdf, other]
Title: A Protocol for Cast-as-Intended Verifiability with a Second Device
Johannes Müller, Tomasz Truderung
Subjects: Cryptography and Security (cs.CR)
[147] arXiv:2304.09468 [pdf, other]
Title: Secure Mobile Payment Architecture Enabling Multi-factor Authentication
Hosam Alamleh, Ali Abdullah S. AlQahtani, Baker Al Smadi
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[148] arXiv:2304.09486 [pdf, other]
Title: Security and Privacy Problems in Voice Assistant Applications: A Survey
Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang
Comments: 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Sound (cs.SD); Audio and Speech Processing (eess.AS)
[149] arXiv:2304.09490 [pdf, other]
Title: Neural Network Quantisation for Faster Homomorphic Encryption
Wouter Legiest, Jan-Pieter D'Anvers, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede
Comments: 5 pages, 2 figures, 3 tables
Subjects: Cryptography and Security (cs.CR)
[150] arXiv:2304.09510 [pdf, other]
Title: Maybenot: A Framework for Traffic Analysis Defenses
Tobias Pulls, Ethan Witwer
Comments: Version 2 of the Maybenot framework
Subjects: Cryptography and Security (cs.CR)
[151] arXiv:2304.09591 [pdf, other]
Title: 5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy Sources
Ferhat Ozgur Catak, Evren Catak, Ogerta Elezaj
Comments: 6 Pages
Subjects: Cryptography and Security (cs.CR)
[152] arXiv:2304.09603 [pdf, html, other]
Title: Visualising Personal Data Flows: Insights from a Case Study of Booking.com
Haiyue Yuan, Matthew Boakes, Xiao Ma, Dongmei Cao, Shujun Li
Comments: This is the full edition of a paper published in Intelligent Information Systems: CAiSE Forum 2023, Zaragoza, Spain, June 12-16, 2023, Proceedings, Lecture Notes in Business Information Processing (LNBIP), Volume 477, pp. 52-60, 2023, Springer Nature, this https URL
Journal-ref: Lecture Notes in Business Information Processing (LNBIP), 2023
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[153] arXiv:2304.09655 [pdf, other]
Title: How Secure is Code Generated by ChatGPT?
Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara
Subjects: Cryptography and Security (cs.CR)
[154] arXiv:2304.09965 [pdf, other]
Title: Vulnerability of Finitely-long Blockchains in Securing Data
Yiming Jiang, Jiangfan Zhang
Comments: 13 pages. 8 figures. This work has been submitted to the IEEE
Subjects: Cryptography and Security (cs.CR)
[155] arXiv:2304.10029 [pdf, other]
Title: Jedi: Entropy-based Localization and Removal of Adversarial Patches
Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael Abu-Ghazaleh, Ihsen Alouani
Comments: 9 pages, 11 figures. To appear in CVPR 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[156] arXiv:2304.10147 [pdf, other]
Title: Securing Semantic Communications with Physical-layer Semantic Encryption and Obfuscation
Qi Qin, Yankai Rong, Guoshun Nan, Shaokang Wu, Xuefei Zhang, Qimei Cui, Xiaofeng Tao
Subjects: Cryptography and Security (cs.CR)
[157] arXiv:2304.10180 [pdf, other]
Title: Cyber Security in Smart Manufacturing (Threats, Landscapes Challenges)
Rahat Masum
Comments: smart system, security, distributed manufacturing data analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[158] arXiv:2304.10268 [pdf, html, other]
Title: BackCache: Mitigating Contention-Based Cache Timing Attacks by Hiding Cache Line Evictions
Quancheng Wang, Xige Zhang, Han Wang, Yuzhe Gu, Ming Tang
Comments: 14 pages, 13 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[159] arXiv:2304.10312 [pdf, other]
Title: Secret-Key-Agreement Advantage Distillation With Quantization Correction
Francesco Ardizzon, Francesco Giurisato, Stefano Tomasin
Comments: Letter submitted to IEEE Communication Letters
Subjects: Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[160] arXiv:2304.10313 [pdf, other]
Title: ORIGAMI: A flexible state channels design for public blockchain systems
Lydia Negka, Angeliki Katsika, Georgios Spathoulas, Vassilis Plagianakos
Comments: 33 pages, 12 figures
Subjects: Cryptography and Security (cs.CR)
[161] arXiv:2304.10477 [pdf, other]
Title: Location Privacy Protection Game against Adversary through Multi-user Cooperative Obfuscation
Shu Hong, Lingjie Duan
Comments: Online technical report for a forthcoming paper in IEEE Transactions on Mobile Computing (TMC)
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[162] arXiv:2304.10511 [pdf, other]
Title: OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets
Hadi Eskandari, Michael Bewong, Sabih ur Rehman
Comments: 11 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[163] arXiv:2304.10550 [pdf, html, other]
Title: Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
Journal-ref: Journal of Network and Computer Applications, Elsevier, 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI); Systems and Control (eess.SY)
[164] arXiv:2304.10593 [pdf, html, other]
Title: DeepReShape: Redesigning Neural Networks for Efficient Private Inference
Nandan Kumar Jha, Brandon Reagen
Comments: Accepted to Transactions on Machine Learning Research (TMLR), 2024
Subjects: Cryptography and Security (cs.CR)
[165] arXiv:2304.10600 [pdf, other]
Title: A Survey of Prevent and Detect Access Control Vulnerabilities
Li Zhong
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[166] arXiv:2304.10726 [pdf, other]
Title: Smart Learning to Find Dumb Contracts (Extended Version)
Tamer Abdelaziz, Aquinas Hobor
Journal-ref: 32nd USENIX Security Symposium 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[167] arXiv:2304.10728 [pdf, other]
Title: PiXi: Password Inspiration by Exploring Information
Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe
Comments: 16 pages
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[168] arXiv:2304.10737 [pdf, other]
Title: Schooling to Exploit Foolish Contracts
Tamer Abdelaziz, Aquinas Hobor
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Software Engineering (cs.SE)
[169] arXiv:2304.10833 [pdf, other]
Title: Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection
D. Selvaraj, S. M. Udhaya Sankar, D. Dhinakaran, T. P. Anish
Subjects: Cryptography and Security (cs.CR)
[170] arXiv:2304.10836 [pdf, other]
Title: Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing
Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B
Subjects: Cryptography and Security (cs.CR)
[171] arXiv:2304.10877 [pdf, other]
Title: Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs
Yu Jin, Pengfei Qiu, Chunlu Wang, Yihao Yang, Dongsheng Wang, Gang Qu
Subjects: Cryptography and Security (cs.CR)
[172] arXiv:2304.10985 [pdf, html, other]
Title: INK: Inheritable Natural Backdoor Attack Against Model Distillation
Xiaolei Liu, Ming Yi, Kangyi Ding, Bangzhou Xin, Yixiao Xu, Li Yan, Chao Shen
Comments: 11 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[173] arXiv:2304.11033 [pdf, other]
Title: Decentralized Inverse Transparency With Blockchain
Valentin Zieglmeier, Gabriel Loyola Daiqui, Alexander Pretschner
Comments: Peer-reviewed version accepted for publication in ACM Distributed Ledger Technologies: Research and Practice (DLT). arXiv admin note: substantial text overlap with arXiv:2104.09971
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[174] arXiv:2304.11048 [pdf, other]
Title: Measuring Stakeholder Agreement and Stability in a Decentralised Organisation
Sarad Venugopalan, Heiko Aydt
Subjects: Cryptography and Security (cs.CR)
[175] arXiv:2304.11052 [pdf, other]
Title: A Multiagent CyberBattleSim for RL Cyber Operation Agents
Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li
Comments: To appear in Proceedings of the 2022 International Conference on Computational Science and Computational Intelligence
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[176] arXiv:2304.11056 [pdf, other]
Title: PowerGAN: A Machine Learning Approach for Power Side-Channel Attack on Compute-in-Memory Accelerators
Ziyu Wang, Yuting Wu, Yongmo Park, Sangmin Yoo, Xinxin Wang, Jason K. Eshraghian, Wei D. Lu
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[177] arXiv:2304.11072 [pdf, other]
Title: An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph
Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[178] arXiv:2304.11081 [pdf, other]
Title: Cryptanalysis of quantum permutation pad
Avval Amil, Shashank Gupta
Comments: 7 pages, 1 figures, comments are welcome
Subjects: Cryptography and Security (cs.CR); Combinatorics (math.CO)
[179] arXiv:2304.11084 [pdf, other]
Title: Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations
Jakob Nyberg, Pontus Johnson
Comments: Presented at the Workshop on SOC Operations and Construction (WOSOC) 2023, colocated with NDSS 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[180] arXiv:2304.11086 [pdf, other]
Title: Development of Authenticated Clients and Applications for ICICLE CI Services -- Final Report for the REHS Program, June-August, 2022
Sahil Samar, Mia Chen, Jack Karpinski, Michael Ray, Archita Sarin, Christian Garcia, Matthew Lange, Joe Stubbs, Mary Thomas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[181] arXiv:2304.11087 [pdf, other]
Title: AI Product Security: A Primer for Developers
Ebenezer R. H. P. Isaac, Jim Reno
Comments: 10 pages, 1 figure
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[182] arXiv:2304.11125 [pdf, html, other]
Title: Implementing and Evaluating Security in O-RAN: Interfaces, Intelligence, and Platforms
Joshua Groen, Salvatore DOro, Utku Demir, Leonardo Bonati, Michele Polese, Tommaso Melodia, Kaushik Chowdhury
Comments: 8 pages, 5 figures, 1 table, submitted to IEEE Network Magazine
Journal-ref: IEEE Network Magazine 2024
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP); Systems and Control (eess.SY)
[183] arXiv:2304.11130 [pdf, other]
Title: Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses
Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare
Comments: cybersecurity, MITRE, CVE, CWE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
[184] arXiv:2304.11278 [pdf, other]
Title: Power to the Data Defenders: Human-Centered Disclosure Risk Calibration of Open Data
Kaustav Bhattacharjee, Aritra Dasgupta
Comments: In Proceedings of the Symposium on Usable Security and Privacy (USEC) 2023
Journal-ref: Proceedings of Symposium on Usable Security and Privacy (USEC) 2023
Subjects: Cryptography and Security (cs.CR)
[185] arXiv:2304.11300 [pdf, html, other]
Title: MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion
Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu
Comments: Accepted at the 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
[186] arXiv:2304.11436 [pdf, other]
Title: Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack
Hideaki Takahashi, Jingjing Liu, Yang Liu
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[187] arXiv:2304.11489 [pdf, other]
Title: FVCARE:Formal Verification of Security Primitives in Resilient Embedded SoCs
Avani Dave, Nilanjan Banerjee, Chintan Patel
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[188] arXiv:2304.11643 [pdf, html, other]
Title: Privacy Computing Meets Metaverse: Necessity, Taxonomy and Challenges
Chuan Chen, Yuecheng Li, Zhenpeng Wu, Chengyuan Mai, Youming Liu, Yanming Hu, Zibin Zheng, Jiawen Kang
Comments: In Ad Hoc Networks (2024)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[189] arXiv:2304.11681 [pdf, other]
Title: Money Over Morals: A Business Analysis of Conti Ransomware
Ian W. Gray, Jack Cable, Benjamin Brown, Vlad Cuiujuclu, Damon McCoy
Comments: To be published in 2022 APWG Symposium on Electronic Crime Research (eCrime)
Subjects: Cryptography and Security (cs.CR)
[190] arXiv:2304.11738 [pdf, other]
Title: A Review On Game Theory With Smart Grid Security
Rahat Masum
Comments: survey paper, security, distributed system
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[191] arXiv:2304.11827 [pdf, other]
Title: Safe and Secure Smart Home using Cisco Packet Tracer
Shivansh Walia, Tejas Iyer, Shubham Tripathi, Akshith Vanaparthy
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[192] arXiv:2304.11848 [pdf, other]
Title: A Secure Third-Party Auditing Scheme Based on Blockchain Technology in Cloud Storage
S. M. Udhaya Sankar, D. Selvaraj, G.K. Monica, Jeevaa Katiravan
Subjects: Cryptography and Security (cs.CR)
[193] arXiv:2304.11876 [pdf, other]
Title: Changes in Conducting Data Protection Risk Assessment and After GDPR implementation
Fatemeh Zarrabi, Isabel Wagner, Eerke Boiten
Comments: 17 pages
Subjects: Cryptography and Security (cs.CR)
[194] arXiv:2304.11960 [pdf, html, other]
Title: ThreatCrawl: A BERT-based Focused Crawler for the Cybersecurity Domain
Philipp Kuehn, Mike Schmidt, Markus Bayer, Christian Reuter
Comments: 11 pages, 9 figures, 5 tables
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[195] arXiv:2304.12041 [pdf, other]
Title: iTieProbe: Is Your IoT Setup Secure against (Modern) Evil Twin?
Anand Agrawal, Rajib Ranjan Maiti
Comments: To do the responsible vulnerability disclosure of our findings
Subjects: Cryptography and Security (cs.CR)
[196] arXiv:2304.12072 [pdf, other]
Title: Exploration and Exploitation of Hidden PMU Events
Yihao Yang, Pengfei Qiu, Chunlu Wang, Yu Jin, Dongsheng Wang, Gang Qu
Subjects: Cryptography and Security (cs.CR)
[197] arXiv:2304.12115 [pdf, other]
Title: SQLi Detection with ML: A data-source perspective
Balazs Pejo, Nikolett Kapui
Comments: Extended version of an accepted paper at SECRYPT 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[198] arXiv:2304.12298 [pdf, other]
Title: BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT
Jiawen Shi, Yixin Liu, Pan Zhou, Lichao Sun
Comments: This paper is accepted as a poster in NDSS2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[199] arXiv:2304.12388 [pdf, html, other]
Title: Verifying the First Nonzero Term: Physical ZKPs for ABC End View, Goishi Hiroi, and Toichika
Suthee Ruangwises
Comments: A preliminary version of this paper has appeared at FAW 2023
Journal-ref: Journal of Combinatorial Optimization, 47(4): 69 (2024)
Subjects: Cryptography and Security (cs.CR)
[200] arXiv:2304.12408 [pdf, other]
Title: Autonomous Intelligent Cyber-defense Agent: Introduction and Overview
Alexander Kott
Subjects: Cryptography and Security (cs.CR)
[201] arXiv:2304.12503 [pdf, other]
Title: CNN-Assisted Steganography -- Integrating Machine Learning with Established Steganographic Techniques
Andrew Havard, Theodore Manikas, Eric C. Larson, Mitchell A. Thornton
Comments: 6 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[202] arXiv:2304.12528 [pdf, other]
Title: Model Conversion via Differentially Private Data-Free Distillation
Bochao Liu, Pengju Wang, Shikun Li, Dan Zeng, Shiming Ge
Comments: Published at IJCAI 2023
Subjects: Cryptography and Security (cs.CR)
[203] arXiv:2304.12681 [pdf, other]
Title: Differential Privacy via Distributionally Robust Optimization
Aras Selvi, Huikang Liu, Wolfram Wiesemann
Comments: 64 pages (28 main + 4 references + 32 appendices). Further proofs and details in the GitHub supplements. 5 color figures + 2 grey figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Optimization and Control (math.OC)
[204] arXiv:2304.12682 [pdf, other]
Title: Docmarking: Real-Time Screen-Cam Robust Document Image Watermarking
Aleksey Yakushev, Yury Markin, Dmitry Obydenkov, Alexander Frolov, Stas Fomin, Manuk Akopyan, Alexander Kozachok, Arthur Gaynov
Comments: 9 pages, 8 figures
Journal-ref: 2022 Ivannikov Ispras Open Conference (ISPRAS), IEEE, 2022, pp. 142-150
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[205] arXiv:2304.12749 [pdf, other]
Title: Blockchain Large Language Models
Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[206] arXiv:2304.12876 [pdf, other]
Title: Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection
Mathieu Dumont, Kevin Hector, Pierre-Alain Moellic, Jean-Max Dutertre, Simon Pontié
Comments: Accepted at 42nd International Conference on Computer Safety, Reliability and Security, SafeComp 2023
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[207] arXiv:2304.12889 [pdf, other]
Title: Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
Journal-ref: IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1703-1714, Feb. 2023
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[208] arXiv:2304.12900 [pdf, other]
Title: SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures
Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti
Subjects: Cryptography and Security (cs.CR)
[209] arXiv:2304.13103 [pdf, other]
Title: HyMo: Vulnerability Detection in Smart Contracts using a Novel Multi-Modal Hybrid Model
Mohammad Khodadadi, Jafar Tahmoresnezhad (1) ((1) Department of IT & Computer Engineering, Urmia University of Technology, Orūmīyeh, Iran)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[210] arXiv:2304.13249 [pdf, other]
Title: A Security Verification Framework of Cryptographic Protocols Using Machine Learning
Kentaro Ohno, Misato Nakabayashi
Comments: 14 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[211] arXiv:2304.13253 [pdf, other]
Title: Analyzing In-browser Cryptojacking
Muhammad Saad, David Mohaisen
Comments: 14 pages, 11 tables, 8 figures, and 69 references. arXiv admin note: substantial text overlap with arXiv:1809.02152
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Software Engineering (cs.SE)
[212] arXiv:2304.13255 [pdf, other]
Title: SHIELD: Thwarting Code Authorship Attribution
Mohammed Abuhamad, Changhun Jung, David Mohaisen, DaeHun Nyang
Comments: 12 pages, 13 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG); Software Engineering (cs.SE)
[213] arXiv:2304.13266 [pdf, other]
Title: C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference
Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel
Subjects: Cryptography and Security (cs.CR)
[214] arXiv:2304.13278 [pdf, other]
Title: Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study
Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen
Comments: 10 pages, 5 tables, 10 figures
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Performance (cs.PF)
[215] arXiv:2304.13352 [pdf, other]
Title: SMPC-based Federated Learning for 6G enabled Internet of Medical Things
Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
Journal-ref: IEEE Network, vol. 36, no. 4, pp. 182-189, July/August 2022
Subjects: Cryptography and Security (cs.CR)
[216] arXiv:2304.13360 [pdf, other]
Title: Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi
Subjects: Cryptography and Security (cs.CR)
[217] arXiv:2304.13379 [pdf, other]
Title: Blockchain-based Access Control for Secure Smart Industry Management Systems
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras
Journal-ref: Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December, 2022
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[218] arXiv:2304.13413 [pdf, other]
Title: Secure Communication Model For Quantum Federated Learning: A Post Quantum Cryptography (PQC) Framework
Dev Gurung, Shiva Raj Pokhrel, Gang Li
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[219] arXiv:2304.13458 [pdf, other]
Title: Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems
Rodothea Myrsini Tsoupidi, Elena Troubitsyna, Panagiotis Papadimitratos
Subjects: Cryptography and Security (cs.CR); Performance (cs.PF)
[220] arXiv:2304.13511 [pdf, other]
Title: A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption
Md. Ahsan Habib, Kazi Md. Rokibul Alam, Yasuhiko Morimoto
Comments: 6 pages, 3 tables, 8 figures, ICCIT 2022
Subjects: Cryptography and Security (cs.CR)
[221] arXiv:2304.13512 [pdf, other]
Title: A Secure Land Record Management System using Blockchain Technology
Md. Samir Shahariar, Pranta Banik, Md. Ahsan Habib
Comments: 6 pages, 5 tables, 10 figures, ICCIT 2022
Subjects: Cryptography and Security (cs.CR)
[222] arXiv:2304.13514 [pdf, other]
Title: Oracle R12 EBusiness Suite Role Based Access Control and Roles Lifecycle Management
Sajid Rahim
Comments: 8 pages, 14 figures
Subjects: Cryptography and Security (cs.CR)
[223] arXiv:2304.13519 [pdf, other]
Title: Konzeption und Umsetzung einer mobilen Applikation zur Validierung von fälschungssicheren Produktlabeln
Oliver Linne
Comments: Thesis for: Informatik Bachelor; Advisor: Dr. Markus Friedrich, Dr. Sebastian Feld, Prof. Dr. Dr. Ulrich Rührmair; in German
Subjects: Cryptography and Security (cs.CR)
[224] arXiv:2304.13789 [pdf, html, other]
Title: Composable Security of Distributed Symmetric Key Establishment Protocol
Jie Lin, Manfred von Willich, Hoi-Kwong Lo
Comments: v2: Our protocol has been renamed to Distributed Symmetric Key Establishment. 15+6 pages, 5 figures
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
[225] arXiv:2304.13894 [pdf, other]
Title: CNN based IoT Device Identification
Kahraman Kostas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[226] arXiv:2304.13905 [pdf, other]
Title: LSTM based IoT Device Identification
Kahraman Kostas
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[227] arXiv:2304.13935 [pdf, other]
Title: Bitcoin Double-Spending Attack Detection using Graph Neural Network
Changhoon Kang, Jongsoo Woo, James Won-Ki Hong
Comments: 3 pages, 1 table, Accepted as poster at IEEE ICBC 2023
Subjects: Cryptography and Security (cs.CR)
[228] arXiv:2304.13941 [pdf, other]
Title: Detecting inner-LAN anomalies using hierarchical forecasting
Sevvandi Kandanaarachchi, Mahdi Abolghasemi, Hideya Ochiai, Asha Rao
Subjects: Cryptography and Security (cs.CR)
[229] arXiv:2304.13956 [pdf, other]
Title: You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems
Monowar Hasan, Sibin Mohan
Comments: Extended version of SCATE published in ISORC'23
Subjects: Cryptography and Security (cs.CR)
[230] arXiv:2304.14031 [pdf, other]
Title: Boosting Big Brother: Attacking Search Engines with Encodings
Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti
Comments: To appear in the 26th Symposium on Research in Attacks, Intrusions and Defenses (RAID). Revisions: Adds table summarizing attacks
Subjects: Cryptography and Security (cs.CR); Information Retrieval (cs.IR)
[231] arXiv:2304.14175 [pdf, other]
Title: Holo-Block Chain: A Hybrid Approach for Secured IoT Healthcare Ecosystem
Asad Aftab, Chrysostomos Chrysostomou, Hassaan Khaliq Qureshi, Semeen Rehman
Comments: 8 pages, 8 figures, IEEE 18th International Conference on Wireless and Mobile Computing, Networking and Communications
Subjects: Cryptography and Security (cs.CR)
[232] arXiv:2304.14451 [pdf, other]
Title: Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks
Mahnoor Shahid
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[233] arXiv:2304.14475 [pdf, other]
Title: ChatGPT as an Attack Tool: Stealthy Textual Backdoor Attack via Blackbox Generative Model Trigger
Jiazhao Li, Yijin Yang, Zhuofeng Wu, V.G. Vinod Vydiswaran, Chaowei Xiao
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[234] arXiv:2304.14540 [pdf, html, other]
Title: Efficient IAM Greybox Penetration Testing
Yang Hu, Wenxi Wang, Sarfraz Khurshid, Mohit Tiwari
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[235] arXiv:2304.14559 [pdf, other]
Title: LNMesh: Who Said You need Internet to send Bitcoin? Offline Lightning Network Payments using Community Wireless Mesh Networks
Ahmet Kurt, Abdulhadi Sahin, Ricardo Harrilal-Parchment, Kemal Akkaya
Comments: Accepted to IEEE WoWMoM 2023
Subjects: Cryptography and Security (cs.CR)
[236] arXiv:2304.14576 [pdf, other]
Title: Can deepfakes be created by novice users?
Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC)
[237] arXiv:2304.14605 [pdf, other]
Title: Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm
D. Dhinakaran, P. M. Joe Prathap
Subjects: Cryptography and Security (cs.CR)
[238] arXiv:2304.14607 [pdf, other]
Title: A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining
Dhinakaran D, Joe Prathap P.M
Subjects: Cryptography and Security (cs.CR)
[239] arXiv:2304.14626 [pdf, other]
Title: Secure and Private Vickrey Auction Protocols: A Secure Multiparty Computation Approach
Lucy Klinger, Mengfan Lyu, Lei Zhang
Subjects: Cryptography and Security (cs.CR)
[240] arXiv:2304.14652 [pdf, other]
Title: Hybrid Key Authentication Scheme for Privacy over Adhoc Communication
B. Murugeshwari, R. Amirthavalli, C. Bharathi Sri, S. Neelavathy Pari
Subjects: Cryptography and Security (cs.CR)
[241] arXiv:2304.14653 [pdf, other]
Title: Trust Aware Privacy Preserving Routing Protocol for Wireless Adhoc Network
B. Murugeshwari, D. Saral Jeeva Jothi, B. Hemalatha, S. Neelavathy Pari
Subjects: Cryptography and Security (cs.CR)
[242] arXiv:2304.14654 [pdf, other]
Title: Effective Data Aggregation in WSN for Enhanced Security and Data Privacy
B. Murugeshwari, S. Aminta Sabatini, Lovelit Jose, S. Padmapriya
Subjects: Cryptography and Security (cs.CR)
[243] arXiv:2304.14717 [pdf, other]
Title: faulTPM: Exposing AMD fTPMs' Deepest Secrets
Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert
Comments: The first two authors contributed equally. We publish all code necessary to mount the attack under this https URL. The repository further includes several intermediate results, e.g., flash memory dumps, to retrace the attack process without possessing the target boards and required hardware tools
Subjects: Cryptography and Security (cs.CR)
[244] arXiv:2304.14730 [pdf, other]
Title: Zero Trust Chain A Design Pattern for Improved Interoperability and Security in Polkadot
Santiago Márquez Solís
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[245] arXiv:2304.14746 [pdf, other]
Title: FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems
Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Marius Portmann
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Neural and Evolutionary Computing (cs.NE); Networking and Internet Architecture (cs.NI)
[246] arXiv:2304.14939 [pdf, other]
Title: Account Verification on Social Media: User Perceptions and Paid Enrollment
Madelyne Xiao, Mona Wang, Anunay Kulshrestha, Jonathan Mayer
Comments: To appear at the 32nd USENIX Security Symposium (2023)
Subjects: Cryptography and Security (cs.CR)
[247] arXiv:2304.14952 [pdf, other]
Title: QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing
Mahdieh Safarzadehvahed, Farzaneh Abazari, Afsaneh Madani, Fatemeh Shabani
Comments: 20 pages, 11 figures
Subjects: Cryptography and Security (cs.CR)
[248] arXiv:2304.14955 [pdf, other]
Title: A Systematization of Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector
Maria Patrizia Carello, Alberto Marchetti Spaccamela, Leonardo Querzoni, Marco Angelini
Comments: 14 pages
Journal-ref: Proceedings of IEEE ISI 2023 - 20th Annual IEEE International Conference on Intelligence and Security Informatics (ISI)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[249] arXiv:2304.00010 (cross-list from cs.LG) [pdf, other]
Title: Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias
Zihan Liu, Yun Luo, Lirong Wu, Zicheng Liu, Stan Z. Li
Journal-ref: 36th Conference on Neural Information Processing Systems (NeurIPS 2022)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[250] arXiv:2304.00047 (cross-list from cs.LG) [pdf, other]
Title: PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels
Homa Esfahanizadeh, Adam Yala, Rafael G. L. D'Oliveira, Andrea J. D. Jaba, Victor Quach, Ken R. Duffy, Tommi S. Jaakkola, Vinod Vaikuntanathan, Manya Ghobadi, Regina Barzilay, Muriel Médard
Comments: Submitted to IEEE Transactions on Information Forensics and Security
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[251] arXiv:2304.00252 (cross-list from cs.LG) [pdf, other]
Title: Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning
Hao Chen, Chen Gong, Yizhe Wang, Xinwen Hou
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[252] arXiv:2304.00648 (cross-list from eess.SP) [pdf, other]
Title: Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning
Mohamed k. Fadul, Donald R. Reising, Lakmali P. Weerasena, T. Daniel Loveless, Mina Sartipi
Comments: 16 pages, 14 figures. Submitted to IEEE Transactions on Information Forensics & Security
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[253] arXiv:2304.00664 (cross-list from cs.HC) [pdf, other]
Title: What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility
Sijie Zhuo, Robert Biddle, Lucas Betts, Nalin Asanka Gamagedara Arachchilage, Yun Sing Koh, Danielle Lottridge, Giovanni Russello
Comments: 12 pages, 3 figures
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[254] arXiv:2304.00677 (cross-list from cs.NI) [pdf, other]
Title: DNN-based Denial of Quality of Service Attack on Software-defined Hybrid Edge-Cloud Systems
Minh Nguyen, Jacob Gately, Swati Kar, Soumyabrata Dey, Saptarshi Debroy
Comments: WAMICON 2022
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[255] arXiv:2304.00795 (cross-list from cs.RO) [pdf, other]
Title: Is Alice Really in Wonderland? UWB-Based Proof of Location for UAVs with Hyperledger Fabric Blockchain
Lei Fu, Paola Torrico Morón, Jorge Peña Queralta, David Hästbacka, Harry Edelman, Tomi Westerlund
Subjects: Robotics (cs.RO); Cryptography and Security (cs.CR)
[256] arXiv:2304.01108 (cross-list from cs.CV) [pdf, other]
Title: Coincidental Generation
Jordan W. Suchow, Necdet Gürkan
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[257] arXiv:2304.01161 (cross-list from cs.LG) [pdf, other]
Title: Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study
Yunian Pan, Tao Li, Quanyan Zhu
Comments: Preprint under review
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[258] arXiv:2304.01205 (cross-list from cs.NE) [pdf, other]
Title: When Evolutionary Computation Meets Privacy
Bowen Zhao, Wei-Neng Chen, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Jun Zhang
Subjects: Neural and Evolutionary Computing (cs.NE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[259] arXiv:2304.01244 (cross-list from cs.LG) [pdf, other]
Title: Unified Emulation-Simulation Training Environment for Autonomous Cyber Agents
Li Li, Jean-Pierre S. El Rami, Adrian Taylor, James Hailing Rao, Thomas Kunz
Comments: To be published in the Proceedings of the 5th International Conference on Machine Learning for Networking (MLN'2022)
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[260] arXiv:2304.01300 (cross-list from cs.LG) [pdf, other]
Title: On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach
Mohit Kumar, Bernhard A. Moser, Lukas Fischer
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[261] arXiv:2304.01441 (cross-list from eess.IV) [pdf, other]
Title: NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression
Jung-Woo Chang, Nojan Sheybani, Shehzeen Samarah Hussain, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar
Comments: 8 pages; Accepted to ICLR 2023 ML4IoT workshop
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[262] arXiv:2304.01510 (cross-list from cs.MA) [pdf, other]
Title: A Communication-efficient Local Differentially Private Algorithm in Federated Optimization
Syed Eqbal Alam, Dhirendra Shukla, Shrisha Rao
Journal-ref: IEEE Access, vol. 11, pp. 58254-58268, 2023
Subjects: Multiagent Systems (cs.MA); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Systems and Control (eess.SY)
[263] arXiv:2304.01541 (cross-list from stat.ML) [pdf, other]
Title: Privacy Amplification via Compression: Achieving the Optimal Privacy-Accuracy-Communication Trade-off in Distributed Mean Estimation
Wei-Ning Chen, Dan Song, Ayfer Ozgur, Peter Kairouz
Subjects: Machine Learning (stat.ML); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[264] arXiv:2304.01617 (cross-list from cs.CY) [pdf, other]
Title: Investigating Concerns of Security and Privacy Among Rohingya Refugees in Malaysia
Theodoros Georgiou, Lynne Baillie, Ryan Shah
Comments: 5 pages, 3 figures, CHI'23 Workshop on Migration, Security and Privacy (see this https URL)
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[265] arXiv:2304.01669 (cross-list from cs.LG) [pdf, other]
Title: Re-thinking Model Inversion Attacks Against Deep Neural Networks
Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung
Comments: Accepted to CVPR 2023. The first two authors contributed equally
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[266] arXiv:2304.01800 (cross-list from quant-ph) [pdf, html, other]
Title: Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions
Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
Comments: 47pages
Journal-ref: Crypto 2024
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[267] arXiv:2304.01881 (cross-list from quant-ph) [pdf, other]
Title: Establishing shared secret keys on quantum line networks: protocol and security
Mina Doosti, Lucas Hanouz, Anne Marin, Elham Kashefi, Marc Kaplan
Comments: 23 pages, 4 figures, comments are welcome
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[268] arXiv:2304.01908 (cross-list from cs.LG) [pdf, other]
Title: Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Aniruddha Tiwari, Rushit Dave, Mounika Vanamala
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[269] arXiv:2304.02234 (cross-list from cs.LG) [pdf, other]
Title: JPEG Compressed Images Can Bypass Protections Against AI Editing
Pedro Sandoval-Segura, Jonas Geiping, Tom Goldstein
Comments: 8 pages, 8 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[270] arXiv:2304.02277 (cross-list from cs.LG) [pdf, other]
Title: Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Jing Xu, Gorka Abad, Stjepan Picek
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[271] arXiv:2304.02395 (cross-list from eess.SY) [pdf, other]
Title: Impact Sensitivity Analysis of Cooperative Adaptive Cruise Control Against Resource-Limited Adversaries
Mischa Huisman, Carlos Murguia, Erjen Lefeber, Nathan van de Wouw
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[272] arXiv:2304.02693 (cross-list from cs.CV) [pdf, other]
Title: A Certified Radius-Guided Attack Framework to Image Segmentation Models
Wenjie Qu, Youqi Li, Binghui Wang
Comments: Accepted by EuroSP 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[273] arXiv:2304.02720 (cross-list from eess.IV) [pdf, other]
Title: Domain Generalization with Adversarial Intensity Attack for Medical Image Segmentation
Zheyuan Zhang, Bin Wang, Lanhong Yao, Ugur Demir, Debesh Jha, Ismail Baris Turkbey, Boqing Gong, Ulas Bagci
Comments: Code is available upon publication
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[274] arXiv:2304.02786 (cross-list from cs.LG) [pdf, other]
Title: UNICORN: A Unified Backdoor Trigger Inversion Framework
Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[275] arXiv:2304.02845 (cross-list from cs.LG) [pdf, other]
Title: Robust Neural Architecture Search
Xunyu Zhu, Jian Li, Yong Liu, Weiping Wang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[276] arXiv:2304.02982 (cross-list from cs.CV) [pdf, other]
Title: Spritz-PS: Validation of Synthetic Face Images Using a Large Dataset of Printed Documents
Ehsan Nowroozi, Yoosef Habibi, Mauro Conti
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Machine Learning (cs.LG)
[277] arXiv:2304.02999 (cross-list from quant-ph) [pdf, html, other]
Title: Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution
Giulio Malavolta, Michael Walter
Comments: 23 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[278] arXiv:2304.03006 (cross-list from cs.LG) [pdf, other]
Title: IoT Federated Blockchain Learning at the Edge
James Calo, Benny Lo
Comments: Submitted to IEEE EMBC 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[279] arXiv:2304.03093 (cross-list from cs.LG) [pdf, other]
Title: Inductive Graph Unlearning
Cheng-Long Wang, Mengdi Huai, Di Wang
Comments: To appear in the 32nd USENIX Security Symposium, August 2023, Anaheim, CA, USA
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[280] arXiv:2304.03108 (cross-list from cs.NI) [pdf, other]
Title: FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks
Cyrill Krähenbühl (ETH Zürich), Marc Wyss (ETH Zürich), David Basin (ETH Zürich), Vincent Lenders (armasuisse), Adrian Perrig (ETH Zürich), Martin Strohmeier (armasuisse)
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[281] arXiv:2304.03201 (cross-list from quant-ph) [pdf, other]
Title: Device-Independent Quantum Secure Direct Communication with User Authentication
Nayana Das, Goutam Paul
Comments: There is a security loophole in this article, so we are withdrawing this
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[282] arXiv:2304.03215 (cross-list from cs.LG) [pdf, other]
Title: Hierarchical Graph Neural Network with Cross-Attention for Cross-Device User Matching
Ali Taghibakhshi, Mingyuan Ma, Ashwath Aithal, Onur Yilmaz, Haggai Maron, Matthew West
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[283] arXiv:2304.03228 (cross-list from cs.CL) [pdf, other]
Title: FedBot: Enhancing Privacy in Chatbots with Federated Learning
Addi Ait-Mlouk, Sadi Alawadi, Salman Toor, Andreas Hellander
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[284] arXiv:2304.03370 (cross-list from cs.LG) [pdf, other]
Title: Reliable learning in challenging environments
Maria-Florina Balcan, Steve Hanneke, Rattana Pukdee, Dravyansh Sharma
Journal-ref: NeurIPS 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[285] arXiv:2304.03388 (cross-list from cs.LG) [pdf, other]
Title: EZClone: Improving DNN Model Extraction Attack via Shape Distillation from GPU Execution Profiles
Jonah O'Brien Weiss, Tiago Alves, Sandip Kundu
Comments: 11 pages, 6 tables, 4 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[286] arXiv:2304.03448 (cross-list from quant-ph) [pdf, other]
Title: Quantum delegation with an off-the-shelf device
Anne Broadbent, Arthur Mehta, Yuming Zhao
Comments: 42 pages. This version (v2) contains new results that were not presented in an earlier version (v1) of this paper. We have also rephrased the OTS model to focus on the OTS device being generic and efficient
Journal-ref: In 19th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2024). LIPIcs, Volume 310, pp. 12:1-12:23
Subjects: Quantum Physics (quant-ph); Computational Complexity (cs.CC); Cryptography and Security (cs.CR)
[287] arXiv:2304.03538 (cross-list from cs.LG) [pdf, other]
Title: Adjustable Privacy using Autoencoder-based Learning Structure
Mohammad Ali Jamshidi, Hadi Veisi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[288] arXiv:2304.03545 (cross-list from cs.LG) [pdf, other]
Title: AI Model Disgorgement: Methods and Choices
Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[289] arXiv:2304.03958 (cross-list from cs.CV) [pdf, other]
Title: KeyDetect --Detection of anomalies and user based on Keystroke Dynamics
Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[290] arXiv:2304.04033 (cross-list from cs.LG) [pdf, other]
Title: Exploring the Connection between Robust and Generative Models
Senad Beadini, Iacopo Masi
Comments: Italian Conference on AI - AI per Cybersecurity, 6 pages, 6 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[291] arXiv:2304.04164 (cross-list from cs.DC) [pdf, html, other]
Title: Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy
Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[292] arXiv:2304.04168 (cross-list from cs.LG) [pdf, other]
Title: Adversarially Robust Neural Architecture Search for Graph Neural Networks
Beini Xie, Heng Chang, Ziwei Zhang, Xin Wang, Daixin Wang, Zhiqiang Zhang, Rex Ying, Wenwu Zhu
Comments: Accepted as a conference paper at CVPR 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[293] arXiv:2304.04343 (cross-list from cs.LG) [pdf, html, other]
Title: Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence
Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong
Comments: accepted by ACM CCS 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[294] arXiv:2304.04386 (cross-list from cs.LG) [pdf, other]
Title: Generating Adversarial Attacks in the Latent Space
Nitish Shukla, Sudipta Banerjee
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[295] arXiv:2304.04569 (cross-list from quant-ph) [pdf, other]
Title: Asynchronous measurement-device-independent quantum key distribution with hybrid source
Jun-Lin Bai, Yuan-Mei Xie, Yao Fu, Hua-Lei Yin, Zeng-Bing Chen
Comments: 9 pages, 4 figures
Journal-ref: Opt. Lett. 48, 3551 (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[296] arXiv:2304.04578 (cross-list from cs.DC) [pdf, other]
Title: Bitcoin's Carbon Footprint Revisited: Proof of Work Mining for Renewable Energy Expansion
Juan Ignacio Ibañez, Alexander Freier
Comments: A previous version of this paper was titled "Can Bitcoin Stop Climate Change? Proof of Work, Energy Consumption and Carbon Footprint (SoK)"
Journal-ref: Challenges, EISSN 2078-1547, Published by MDPI
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[297] arXiv:2304.04585 (cross-list from quant-ph) [pdf, other]
Title: Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together
Aleksey K. Fedorov
Comments: 11 pages, 0 figures, 1 table; Perspective paper
Journal-ref: Front. Quantum. Sci. Technol. 2, 1164428 (2023)
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[298] arXiv:2304.04625 (cross-list from cs.LG) [pdf, other]
Title: Reinforcement Learning-Based Black-Box Model Inversion Attacks
Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim
Comments: CVPR 2023, Accepted
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[299] arXiv:2304.04819 (cross-list from cs.LG) [pdf, other]
Title: Recent Advancements in Machine Learning For Cybercrime Prediction
Lavanya Elluri, Varun Mandalapu, Piyush Vyas, Nirmalya Roy
Comments: Accepted in Journal of Computer Information Systems, 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[300] arXiv:2304.05135 (cross-list from cs.LG) [pdf, other]
Title: RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense
Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[301] arXiv:2304.05197 (cross-list from cs.CL) [pdf, other]
Title: Multi-step Jailbreaking Privacy Attacks on ChatGPT
Haoran Li, Dadi Guo, Wei Fan, Mingshi Xu, Jie Huang, Fanpu Meng, Yangqiu Song
Comments: Findings of EMNLP 2023. Updated with results on open-source LLMs
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[302] arXiv:2304.05204 (cross-list from math.PR) [pdf, other]
Title: The Time for Reconstructing the Attack Graph in DDoS Attacks
Dina Barak-Pelleg, Daniel Berend
Comments: 31 pages, 5 figures, 1 table
Subjects: Probability (math.PR); Cryptography and Security (cs.CR)
[303] arXiv:2304.05371 (cross-list from cs.CL) [pdf, other]
Title: Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories
Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar
Comments: To be published in 21st International Conference on Applied Cryptography and Network Security, ACNS 2023
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[304] arXiv:2304.05402 (cross-list from cs.CV) [pdf, other]
Title: Boosting Cross-task Transferability of Adversarial Patches with Visual Relations
Tony Ma, Songze Li, Yisong Xiao, Shunchang Liu
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Multimedia (cs.MM)
[305] arXiv:2304.05561 (cross-list from cs.CV) [pdf, other]
Title: On the Adversarial Inversion of Deep Biometric Representations
Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[306] arXiv:2304.05686 (cross-list from cs.ET) [pdf, other]
Title: Gate Camouflaging Using Reconfigurable ISFET-Based Threshold Voltage Defined Logic
Elmira Moussavi, Animesh Singh, Dominik Sisejkovic, Aravind Padma Kumar, Daniyar Kizatov, Sven Ingebrandt, Rainer Leupers, Vivek Pachauri, Farhad Merchant
Subjects: Emerging Technologies (cs.ET); Cryptography and Security (cs.CR)
[307] arXiv:2304.05836 (cross-list from cs.LG) [pdf, html, other]
Title: A Game-theoretic Framework for Privacy-preserving Federated Learning
Xiaojin Zhang, Lixin Fan, Siwei Wang, Wenjie Li, Kai Chen, Qiang Yang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[308] arXiv:2304.05890 (cross-list from cs.DS) [pdf, other]
Title: Node-Differentially Private Estimation of the Number of Connected Components
Iden Kalemaj, Sofya Raskhodnikova, Adam Smith, Charalampos E. Tsourakakis
Journal-ref: In Proceedings of the ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS) 2023
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR)
[309] arXiv:2304.06325 (cross-list from quant-ph) [pdf, html, other]
Title: How to Sign Quantum Messages
Mohammed Barhoush, Louis Salvail
Comments: 50 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[310] arXiv:2304.06402 (cross-list from cs.IT) [pdf, other]
Title: Non-Orthogonal Multiplexing in the FBL Regime Enhances Physical Layer Security with Deception
Bin Han, Yao Zhu, Anke Schmeink, Hans D. Schotten
Comments: Accepted for presentation at SPAWC 2023. Appendices are omitted in the submitted version due to length limit. Minor corrections made in the latest arXiv version
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[311] arXiv:2304.06469 (cross-list from cs.LG) [pdf, other]
Title: Analysing Fairness of Privacy-Utility Mobility Models
Yuting Zhan, Hamed Haddadi, Afra Mashhadi
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[312] arXiv:2304.06787 (cross-list from cs.DS) [pdf, html, other]
Title: A Polynomial Time, Pure Differentially Private Estimator for Binary Product Distributions
Vikrant Singhal
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[313] arXiv:2304.06908 (cross-list from cs.LG) [pdf, other]
Title: Generating Adversarial Examples with Better Transferability via Masking Unimportant Parameters of Surrogate Model
Dingcheng Yang, Wenjian Yu, Zihao Xiao, Jiaqi Luo
Comments: Accepted at 2023 International Joint Conference on Neural Networks (IJCNN)
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[314] arXiv:2304.06919 (cross-list from cs.LG) [pdf, other]
Title: Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Jingyuan Wang, Yufan Wu, Mingxuan Li, Xin Lin, Junjie Wu, Chao Li
Comments: 10 pages, accepted to KDD'20
Journal-ref: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining(KDD '20), August 23--27, 2020, Virtual Event, CA, USA. Pages 15-24
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[315] arXiv:2304.07081 (cross-list from cs.DC) [pdf, other]
Title: Chop Chop: Byzantine Atomic Broadcast to the Network Limit
Martina Camaioni, Rachid Guerraoui, Matteo Monti, Pierre-Louis Roman, Manuel Vidigueira, Gauthier Voron
Comments: Extended version of the paper appearing at OSDI 2024 with formal definitions, pseudocode, and proofs added in appendix
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Cryptography and Security (cs.CR)
[316] arXiv:2304.07204 (cross-list from cs.SE) [pdf, other]
Title: Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo
Comments: !!!NOTE HERE!!! In arxiv v2 version, I have replaced the original repo link to a new one, because the original one is hijacked to a extremely frightening and jump-scare webpage. PLEASE REFER TO this https URL NOT THE ORIGINAL shorturl ONE!
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[317] arXiv:2304.07309 (cross-list from cs.DB) [pdf, other]
Title: Incentivising Building Data Availability and Accessibility Using Tokenized Data Assets
Sarad Venugopalan, Heiko Aydt
Comments: arXiv admin note: substantial text overlap with arXiv:2301.05945
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[318] arXiv:2304.07361 (cross-list from cs.LG) [pdf, other]
Title: PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
Nils Lukas, Florian Kerschbaum
Comments: USENIX Security 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[319] arXiv:2304.07460 (cross-list from cs.LG) [pdf, other]
Title: Communication and Energy Efficient Wireless Federated Learning with Intrinsic Privacy
Zhenxiao Zhang, Yuanxiong Guo, Yuguang Fang, Yanmin Gong
Comments: 19 pages, Accepted for publication in IEEE Transactions on Dependable and Secure Computing
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[320] arXiv:2304.07513 (cross-list from eess.SY) [pdf, other]
Title: Experimental Impact Analysis of Cyberattacks in Power Systems using Digital Real-Time Testbeds
Kalinath Katuri, Ioannis Zografopoulos, Ha Thi Nguyen, Charalambos Konstantinou
Comments: 2023 IEEE Belgrade PowerTech
Subjects: Systems and Control (eess.SY); Cryptography and Security (cs.CR)
[321] arXiv:2304.07722 (cross-list from cs.IT) [pdf, other]
Title: Pointwise Maximal Leakage on General Alphabets
Sara Saeidian (1), Giulia Cervia (2), Tobias J. Oechtering (1), Mikael Skoglund (1) ((1) KTH Royal Institute of Technology, (2) IMT Nord Europe)
Comments: Accepted for presentation at ISIT2023
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[322] arXiv:2304.07820 (cross-list from cs.SC) [pdf, html, other]
Title: A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium
Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti
Comments: 29 pages. To appear in Finite Fields and Their Applications
Subjects: Symbolic Computation (cs.SC); Cryptography and Security (cs.CR); Commutative Algebra (math.AC)
[323] arXiv:2304.07980 (cross-list from cs.LG) [pdf, other]
Title: RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks
Yunruo Zhang, Tianyu Du, Shouling Ji, Peng Tang, Shanqing Guo
Comments: 13 pages, 7 figures, 6 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[324] arXiv:2304.08566 (cross-list from cs.LG) [pdf, other]
Title: GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Asim Waheed, Vasisht Duddu, N. Asokan
Comments: To appear in the IEEE Symposium on Security and Privacy, 2024. 12 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[325] arXiv:2304.08602 (cross-list from cs.LG) [pdf, other]
Title: Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives
Hafsa Bousbiat, Roumaysa Bousselidj, Yassine Himeur, Abbes Amira, Faycal Bensaali, Fodil Fadli, Wathiq Mansoor, Wilfried Elmenreich
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[326] arXiv:2304.08847 (cross-list from cs.LG) [pdf, other]
Title: BadVFL: Backdoor Attacks in Vertical Federated Learning
Mohammad Naseri, Yufei Han, Emiliano De Cristofaro
Comments: Accepted for publication at the 45th IEEE Symposium on Security & Privacy (S&P 2024). Please cite accordingly
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[327] arXiv:2304.08848 (cross-list from cs.PL) [pdf, other]
Title: Proof-Producing Symbolic Execution for Binary Code Verification
Andreas Lindner, Roberto Guanciale, Mads Dam
Subjects: Programming Languages (cs.PL); Cryptography and Security (cs.CR); Logic in Computer Science (cs.LO)
[328] arXiv:2304.08928 (cross-list from cs.LG) [pdf, other]
Title: ProGAP: Progressive Graph Neural Networks with Differential Privacy Guarantees
Sina Sajadmanesh, Daniel Gatica-Perez
Comments: Accepted at WSDM 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[329] arXiv:2304.08968 (cross-list from cs.CL) [pdf, other]
Title: Stochastic Parrots Looking for Stochastic Parrots: LLMs are Easy to Fine-Tune and Hard to Detect with other LLMs
Da Silva Gameiro Henrique, Andrei Kucharavy, Rachid Guerraoui
Comments: 15 pages, 6 figures; 10 pages, 7 figures Supplementary Materials; under review at ECML 2023
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[330] arXiv:2304.09096 (cross-list from cs.IR) [pdf, other]
Title: Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism
Sohan Salahuddin Mugdho, Hafiz Imtiaz
Comments: 30 pages
Subjects: Information Retrieval (cs.IR); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[331] arXiv:2304.09515 (cross-list from cs.LG) [pdf, other]
Title: Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks
Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong
Comments: 23 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[332] arXiv:2304.09546 (cross-list from cs.DB) [pdf, other]
Title: Sensitivity estimation for differentially private query processing
Meifan Zhang, Xin Liu, Lihua Yin
Subjects: Databases (cs.DB); Cryptography and Security (cs.CR)
[333] arXiv:2304.09752 (cross-list from cs.CV) [pdf, other]
Title: Attributing Image Generative Models using Latent Fingerprints
Guangyu Nie, Changhoon Kim, Yezhou Yang, Yi Ren
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[334] arXiv:2304.09762 (cross-list from cs.LG) [pdf, other]
Title: Practical Differentially Private and Byzantine-resilient Federated Learning
Zihang Xiang, Tianhao Wang, Wanyu Lin, Di Wang
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[335] arXiv:2304.09784 (cross-list from quant-ph) [pdf, other]
Title: Zero-Knowledge MIPs using Homomorphic Commitment Schemes
Claude Crépeau, John Stuart
Comments: 27 pages, 8 figures
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[336] arXiv:2304.09846 (cross-list from quant-ph) [pdf, other]
Title: Weakening Assumptions for Publicly-Verifiable Deletion
James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter
Comments: 11 pages
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[337] arXiv:2304.10088 (cross-list from eess.AS) [pdf, other]
Title: Towards the Universal Defense for Query-Based Audio Adversarial Attacks
Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju
Comments: Submitted to Cybersecurity journal
Subjects: Audio and Speech Processing (eess.AS); Cryptography and Security (cs.CR); Sound (cs.SD)
[338] arXiv:2304.10480 (cross-list from quant-ph) [pdf, other]
Title: Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)
James Bartusek, Dakshita Khurana, Akshayaram Srinivasan
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[339] arXiv:2304.10510 (cross-list from cs.LG) [pdf, other]
Title: Censoring chemical data to mitigate dual use risk
Quintina L. Campbell, Jonathan Herington, Andrew D. White
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computers and Society (cs.CY); Chemical Physics (physics.chem-ph)
[340] arXiv:2304.10553 (cross-list from cs.LG) [pdf, other]
Title: Sparsity in neural networks can improve their privacy
Antoine Gonon (OCKHAM, ARIC), Léon Zheng (OCKHAM), Clément Lalanne (OCKHAM), Quoc-Tung Le (OCKHAM), Guillaume Lauga (OCKHAM), Can Pouliquen (OCKHAM)
Comments: arXiv admin note: duplicate of arXiv:2304.07234
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[341] arXiv:2304.10632 (cross-list from cs.MM) [pdf, other]
Title: NFT Marketplace
Piyush Batra, Gagan Raj Singh, Ritik Gandhi
Comments: Report for MULTIMEDIA COMMUNICATIONS course project
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[342] arXiv:2304.10638 (cross-list from cs.LG) [pdf, other]
Title: Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Manaar Alam, Hithem Lamri, Michail Maniatakos
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[343] arXiv:2304.10783 (cross-list from cs.LG) [pdf, html, other]
Title: Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning
Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Liew, Zhetao Li
Comments: Accepted by IJCAI 2024
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[344] arXiv:2304.10838 (cross-list from cs.NI) [pdf, other]
Title: Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET
S.M. Udhaya Sankar, D. Dhinakaran, C. Cathrin Deboral, M. Ramakrishnan
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[345] arXiv:2304.11208 (cross-list from cs.LG) [pdf, other]
Title: DP-Adam: Correcting DP Bias in Adam's Second Moment Estimation
Qiaoyue Tang, Mathias Lécuyer
Comments: Published at ICLR 2023 Workshop on Trustworthy and Reliable Large-Scale Machine Learning Models
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[346] arXiv:2304.11285 (cross-list from cs.LG) [pdf, other]
Title: Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks
Isabell Lederer, Rudolf Mayer, Andreas Rauber
Journal-ref: IEEE Transactions on Neural Networks and Learning Systems, 2023
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[347] arXiv:2304.11511 (cross-list from quant-ph) [pdf, other]
Title: QuMoS: A Framework for Preserving Security of Quantum Machine Learning Model
Zhepeng Wang, Jinyang Li, Zhirui Hu, Blake Gage, Elizabeth Iwasawa, Weiwen Jiang
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[348] arXiv:2304.11624 (cross-list from cs.SE) [pdf, other]
Title: Consolidation of Ground Truth Sets for Weakness Detection in Smart Contracts
Monika di Angelo, Gernot Salzer
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[349] arXiv:2304.11720 (cross-list from cs.MM) [pdf, other]
Title: Images Within Images? A Multi-image Paradigm with Novel Key-Value Graph Oriented Steganography
Subhrangshu Adhikary
Comments: Intelligent Computing & Optimization. ICO 2021. Lecture Notes in Networks and Systems, vol 371. Springer, Cham. this https URL
Journal-ref: Intelligent Computing & Optimization. ICO 2021. Lecture Notes in Networks and Systems, vol 371. Springer, Cham
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[350] arXiv:2304.11741 (cross-list from cs.LG) [pdf, other]
Title: Robust and differentially private stochastic linear bandits
Vasileios Charisopoulos, Hossein Esfandiari, Vahab Mirrokni
Comments: 25 pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[351] arXiv:2304.12109 (cross-list from cs.LO) [pdf, other]
Title: Pseudorandom Finite Models
Jan Dreier, Jamie Tucker-Foltz
Comments: Extended version of LICS 2023 conference paper
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)
[352] arXiv:2304.12135 (cross-list from math.NT) [pdf, other]
Title: Strongly Reduced Lattice Bases
Christian Porter
Comments: 6 pages. Preprint
Subjects: Number Theory (math.NT); Cryptography and Security (cs.CR)
[353] arXiv:2304.12151 (cross-list from cs.LG) [pdf, other]
Title: Policy Resilience to Environment Poisoning Attacks on Reinforcement Learning
Hang Xu, Xinghua Qu, Zinovi Rabinovich
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[354] arXiv:2304.12185 (cross-list from cs.CV) [pdf, other]
Title: DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase
Chih-Hsun Lin, Chia-Yi Hsu, Chia-Mu Yu, Yang Cao, Chun-Ying Huang
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[355] arXiv:2304.12200 (cross-list from eess.SP) [pdf, other]
Title: SplitAMC: Split Learning for Robust Automatic Modulation Classification
Jihoon Park, Seungeun Oh, Seong-Lyun Kim
Comments: to be presented at IEEE VTC2023-Spring
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (cs.LG); Numerical Analysis (math.NA)
[356] arXiv:2304.12300 (cross-list from cs.CV) [pdf, other]
Title: Large-capacity and Flexible Video Steganography via Invertible Neural Network
Chong Mou, Youmin Xu, Jiechong Song, Chen Zhao, Bernard Ghanem, Jian Zhang
Comments: Accepted by CVPR 2023
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[357] arXiv:2304.12429 (cross-list from cs.LG) [pdf, other]
Title: Sparse Private LASSO Logistic Regression
Amol Khanna, Fred Lu, Edward Raff, Brian Testa
Comments: 20 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[358] arXiv:2304.12451 (cross-list from math.NA) [pdf, other]
Title: The secret life of matrix factorizations: how matrix decompositions reveal and keep secrets of linear equations and what we can do about it
Michał P. Karpowicz
Subjects: Numerical Analysis (math.NA); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[359] arXiv:2304.12489 (cross-list from cs.CV) [pdf, other]
Title: Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection
Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[360] arXiv:2304.12645 (cross-list from cs.SE) [pdf, other]
Title: Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection
Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu, Yajin Zhou, Qinming He
Comments: This is the preprint of the paper that has been accepted by IEEE Transactions on Software Engineering (TSE)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[361] arXiv:2304.12707 (cross-list from cs.LG) [pdf, html, other]
Title: Lyapunov-Stable Deep Equilibrium Models
Haoyu Chu, Shikui Wei, Ting Liu, Yao Zhao, Yuto Miyatake
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[362] arXiv:2304.12829 (cross-list from cs.LG) [pdf, other]
Title: Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks
Ferheen Ayaz, Idris Zakariyya, José Cano, Sye Loong Keoh, Jeremy Singer, Danilo Pau, Mounia Kharbouche-Harrari
Comments: Accepted at IJCNN 2023. 8 pages, 5 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Performance (cs.PF)
[363] arXiv:2304.12845 (cross-list from cs.LG) [pdf, other]
Title: (Local) Differential Privacy has NO Disparate Impact on Fairness
Héber H. Arcolezi, Karima Makhlouf, Catuscia Palamidessi
Comments: Best paper award at DBSec'23. Version of record at this https URL
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[364] arXiv:2304.12853 (cross-list from cs.NI) [pdf, other]
Title: Adaptive Services Function Chain Orchestration For Digital Health Twin Use Cases: Heuristic-boosted Q-Learning Approach
Jamila Alsayed Kassem, Li Zhong, Arie Taal, Paola Grosso
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[365] arXiv:2304.12961 (cross-list from cs.LG) [pdf, other]
Title: Chameleon: Adapting to Peer Images for Planting Durable Backdoors in Federated Learning
Yanbo Dai, Songze Li
Comments: This paper was accepted to ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[366] arXiv:2304.13090 (cross-list from cs.LG) [pdf, other]
Title: Model Extraction Attacks Against Reinforcement Learning Based Controllers
Momina Sajid, Yanning Shen, Yasser Shoukry
Comments: 8 pages, 8 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[367] arXiv:2304.13104 (cross-list from cs.LG) [pdf, other]
Title: LSTM-based Load Forecasting Robustness Against Noise Injection Attack in Microgrid
Amirhossein Nazeri, Pierluigi Pisu
Comments: 6 pages, 9 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[368] arXiv:2304.13232 (cross-list from cs.AR) [pdf, other]
Title: Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach
Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy
Subjects: Hardware Architecture (cs.AR); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[369] arXiv:2304.13274 (cross-list from cs.LG) [pdf, other]
Title: Making Models Shallow Again: Jointly Learning to Reduce Non-Linearity and Depth for Latency-Efficient Private Inference
Souvik Kundu, Yuke Zhang, Dake Chen, Peter A. Beerel
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[370] arXiv:2304.13407 (cross-list from cs.LG) [pdf, other]
Title: FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated Learning for Split Models
Songze Li, Duanyi Yao, Jin Liu
Comments: Accepted to ICML 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Information Theory (cs.IT)
[371] arXiv:2304.13410 (cross-list from cs.LG) [pdf, other]
Title: Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen
Comments: Accepted by NeurIPS 2023
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[372] arXiv:2304.13545 (cross-list from cs.LG) [pdf, other]
Title: Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning
Guangfeng Yan, Tan Li, Kui Wu, Linqi Song
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[373] arXiv:2304.13828 (cross-list from quant-ph) [pdf, other]
Title: Time-Interleaved C-band Co-Propagation of Quantum and Classical Channels
Jing Wang, Brian J. Rollick, Bernardo A. Huberman
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[374] arXiv:2304.13850 (cross-list from cs.CV) [pdf, html, other]
Title: Do SSL Models Have Déjà Vu? A Case of Unintended Memorization in Self-supervised Learning
Casey Meehan, Florian Bordes, Pascal Vincent, Kamalika Chaudhuri, Chuan Guo
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[375] arXiv:2304.13886 (cross-list from cs.LG) [pdf, html, other]
Title: Improving the Utility of Differentially Private Clustering through Dynamical Processing
Junyoung Byun, Yujin Choi, Jaewook Lee
Journal-ref: Pattern Recognition, January 2025, Volume 157, 110890
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[376] arXiv:2304.13919 (cross-list from cs.CV) [pdf, other]
Title: Detection of Adversarial Physical Attacks in Time-Series Image Data
Ramneet Kaur, Yiannis Kantaros, Wenwen Si, James Weimer, Insup Lee
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[377] arXiv:2304.14024 (cross-list from cs.LG) [pdf, other]
Title: Attacks on Robust Distributed Learning Schemes via Sensitivity Curve Maximization
Christian A. Schroth, Stefan Vlaski, Abdelhak M. Zoubir
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Signal Processing (eess.SP)
[378] arXiv:2304.14150 (cross-list from math.AG) [pdf, other]
Title: On the Discrete Logarithm Problem for elliptic curves over local fields
Giuseppe Filippone
Comments: 11 pages, 1 table, 20 references
Subjects: Algebraic Geometry (math.AG); Cryptography and Security (cs.CR)
[379] arXiv:2304.14359 (cross-list from cs.CY) [pdf, other]
Title: Measuring and Modeling the Free Content Web
Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen
Comments: 30 pages, 3 tables, 9 figures. Under review by Computer Networks
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR); Performance (cs.PF)
[380] arXiv:2304.14397 (cross-list from cs.IT) [pdf, other]
Title: Private Information Retrieval and Its Applications: An Introduction, Open Problems, Future Directions
Sajani Vithana, Zhusheng Wang, Sennur Ulukus
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
[381] arXiv:2304.14613 (cross-list from cs.AI) [pdf, other]
Title: Deep Intellectual Property Protection: A Survey
Yuchen Sun, Tianpeng Liu, Panhe Hu, Qing Liao, Shaojing Fu, Nenghai Yu, Deke Guo, Yongxiang Liu, Li Liu
Comments: 37 pages, 19 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[382] arXiv:2304.14614 (cross-list from cs.CV) [pdf, html, other]
Title: Fusion is Not Enough: Single Modal Attacks on Fusion Models for 3D Object Detection
Zhiyuan Cheng, Hongjun Choi, James Liang, Shiwei Feng, Guanhong Tao, Dongfang Liu, Michael Zuzak, Xiangyu Zhang
Comments: Accepted at ICLR'2024
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[383] arXiv:2304.14757 (cross-list from cs.IT) [pdf, other]
Title: Polynomial time key-recovery attack on high rate random alternant codes
Magali Bardet, Rocco Mora, Jean-Pierre Tillich
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[384] arXiv:2304.14836 (cross-list from cs.LG) [pdf, other]
Title: Training Large Scale Polynomial CNNs for E2E Inference over Homomorphic Encryption
Moran Baruch, Nir Drucker, Gilad Ezov, Yoav Goldberg, Eyal Kushnir, Jenny Lerner, Omri Soceanu, Itamar Zimerman
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[385] arXiv:2304.14934 (cross-list from cs.IT) [pdf, other]
Title: Randomness Requirements for Three-Secret Sharing
Hari Krishnan P. Anilkumar, Aayush Rajesh, Varun Narayanan, Manoj M. Prabhakaran, Vinod M. Prabhakaran
Comments: Accepted in International Symposium on Information Theory 2023
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
Total of 385 entries
Showing up to 2000 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack