We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 75 entries: 1-25 | 26-50 | 51-75 ]
[ showing 25 entries per page: fewer | more | all ]

Tue, 17 May 2022

[1]  arXiv:2205.07759 [pdf, ps, other]
Title: Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2205.07590 [pdf, other]
Title: Metaverse: Security and Privacy Issues
Comments: The 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS'21)
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[3]  arXiv:2205.07478 [pdf, other]
Title: Estimating Patch Propagation Times across (Blockchain) Forks
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2205.07411 [pdf, other]
Title: Phishing Detection Leveraging Machine Learning and Deep Learning: A Review
Comments: Paper accepted for publication at IEEE Security & Privacy
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2205.07323 [pdf, ps, other]
Title: Attack vs Benign Network Intrusion Traffic Classification
Authors: M. Andrecut
Comments: 8 pages
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:2205.07112 [pdf, ps, other]
Title: FROG: Forward-Secure Post-Quantum Signature
Subjects: Cryptography and Security (cs.CR)
[7]  arXiv:2205.07054 [pdf, ps, other]
Title: CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types
Comments: 11 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
[8]  arXiv:2205.06992 [pdf, other]
Title: Verifying Neural Networks Against Backdoor Attacks
Authors: Long H. Pham, Jun Sun
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[9]  arXiv:2205.06986 [pdf, other]
Title: Evaluating Membership Inference Through Adversarial Robustness
Comments: Accepted by The Computer Journal. Pre-print version
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[10]  arXiv:2205.06918 [pdf, other]
Title: Representation learning with function call graph transformations for malware open set recognition
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[11]  arXiv:2205.06837 [pdf, other]
Title: Strategic Latency Reduction in Blockchain Peer-to-Peer Networks
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Networking and Internet Architecture (cs.NI)
[12]  arXiv:2205.07828 (cross-list from cs.IT) [pdf, ps, other]
Title: Digital Blind Box: Random Symmetric Private Information Retrieval
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Databases (cs.DB); Signal Processing (eess.SP)
[13]  arXiv:2205.07711 (cross-list from cs.SD) [pdf, other]
Title: Transferability of Adversarial Attacks on Synthetic Speech Detection
Comments: 5 pages, submit to Interspeech2022
Subjects: Sound (cs.SD); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[14]  arXiv:2205.07626 (cross-list from cs.LG) [pdf, other]
Title: Attacking and Defending Deep Reinforcement Learning Policies
Authors: Chao Wang
Comments: nine pages
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[15]  arXiv:2205.07502 (cross-list from cs.AI) [pdf, other]
Title: KGRGRL: A User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning
Comments: 8 pages, 2 figures
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[16]  arXiv:2205.07460 (cross-list from cs.LG) [pdf, other]
Title: Diffusion Models for Adversarial Purification
Comments: ICML 2022
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[17]  arXiv:2205.07228 (cross-list from cs.SE) [pdf, other]
Title: Automation Slicing and Testing for in-App Deep Learning Models
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[18]  arXiv:2205.07123 (cross-list from cs.CL) [pdf, other]
Title: The VoicePrivacy 2020 Challenge Evaluation Plan
Comments: arXiv admin note: text overlap with arXiv:2203.12468
Subjects: Computation and Language (cs.CL); Cryptography and Security (cs.CR); Audio and Speech Processing (eess.AS)
[19]  arXiv:2205.07109 (cross-list from cs.LG) [pdf, other]
Title: Unsupervised Abnormal Traffic Detection through Topological Flow Analysis
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[20]  arXiv:2205.07073 (cross-list from cs.CV) [pdf, other]
Title: An Architecture for the detection of GAN-generated Flood Images with Localization Capabilities
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR)
[21]  arXiv:2205.07060 (cross-list from cs.AI) [pdf, other]
Title: GAN-Aimbots: Using Machine Learning for Cheating in First Person Shooters
Comments: Accepted to IEEE Transactions on Games. Source code available at this https URL
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[22]  arXiv:2205.06937 (cross-list from cs.HC) [pdf]
Title: Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption
Comments: 41 pages, including the stage algorithm programmed on Mturk, the survey flow and specific items used, and a link to download the five informational handouts used for the control condition and the 2FA intervention conditions
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR)
[23]  arXiv:2205.06900 (cross-list from cs.LG) [pdf, other]
Title: Universal Post-Training Backdoor Detection
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)

Mon, 16 May 2022 (showing first 2 of 15 entries)

[24]  arXiv:2205.06720 [pdf, other]
Title: On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2205.06719 [pdf, ps, other]
Title: dewolf: Improving Decompilation by leveraging User Surveys
Subjects: Cryptography and Security (cs.CR)
[ total of 75 entries: 1-25 | 26-50 | 51-75 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2205, contact, help  (Access key information)