We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions

[ total of 82 entries: 1-25 | 26-50 | 51-75 | 76-82 ]
[ showing 25 entries per page: fewer | more | all ]

Thu, 2 Dec 2021

[1]  arXiv:2112.00668 [pdf, other]
Title: A Few-Shot Meta-Learning based Siamese Neural Network using Entropy Features for Ransomware Classification
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2112.00443 [pdf, other]
Title: TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Social and Information Networks (cs.SI)
[3]  arXiv:2112.00429 [pdf, ps, other]
Title: Security issues of CFS-like digital signature algorithms
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM)
[4]  arXiv:2112.00399 [pdf]
Title: Quantum-Resistant Cryptography
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2112.00346 [pdf, other]
Title: Trusted And Confidential Program Analysis
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[6]  arXiv:2112.00304 [pdf, other]
Title: Software Variants for Hardware Trojan Detection and Resilience in COTS Processors
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[7]  arXiv:2112.00262 [pdf, other]
Title: A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[8]  arXiv:2112.00247 [pdf, other]
Title: Adversarial Attacks Against Deep Generative Models on Data: A Survey
Comments: To be published in IEEE Transactions on Knowledge and Data Engineering
Subjects: Cryptography and Security (cs.CR)
[9]  arXiv:2112.00059 [pdf, other]
Title: Evaluating Gradient Inversion Attacks and Defenses in Federated Learning
Journal-ref: NeurIPS 2021
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[10]  arXiv:2112.00659 (cross-list from cs.LG) [pdf, other]
Title: Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Comments: 21 pages, 15 figures, and 9 tables
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[11]  arXiv:2112.00394 (cross-list from cs.IT) [pdf, ps, other]
Title: Wiretap Secret Key Agreement Via Secure Omniscience
Comments: 23 pages, 7 figures. arXiv admin note: text overlap with arXiv:2102.01771
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)
[12]  arXiv:2112.00193 (cross-list from cs.LG) [pdf, other]
Title: Public Data-Assisted Mirror Descent for Private Model Training
Comments: 20 pages, 9 figures, 3 tables
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[13]  arXiv:2112.00107 (cross-list from cs.HC) [pdf]
Title: LGBTQ Privacy Concerns on Social Media
Comments: Workshop at 2018 CHI conference on human factors in computing systems: Exploring Individual Differences in Privacy
Subjects: Human-Computer Interaction (cs.HC); Cryptography and Security (cs.CR); Computers and Society (cs.CY)

Wed, 1 Dec 2021 (showing first 12 of 15 entries)

[14]  arXiv:2111.15468 [pdf, other]
Title: VoIP Can Still Be Exploited -- Badly
Subjects: Cryptography and Security (cs.CR)
[15]  arXiv:2111.15467 [pdf, ps, other]
Title: Car drivers' privacy concerns and trust perceptions
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2111.15446 [pdf, other]
Title: TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[17]  arXiv:2111.15425 [pdf, other]
Title: Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2111.15259 [pdf, other]
Title: Privacy-Preserving Decentralized Exchange Marketplaces
Comments: 17 pages, 6 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[19]  arXiv:2111.15205 [pdf, other]
Title: New Datasets for Dynamic Malware Classification
Comments: 5 pages, 2 figures, 6 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[20]  arXiv:2111.15160 [pdf, other]
Title: Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[21]  arXiv:2111.15039 [pdf, other]
Title: Living-Off-The-Land Command Detection Using Active Learning
Comments: 14 pages, published in RAID 2021
Subjects: Cryptography and Security (cs.CR)
[22]  arXiv:2111.14994 [pdf, other]
Title: A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks
Comments: Submitted to IEEE IoT Journal, 18 pages, 16 figures
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[23]  arXiv:2111.14956 [pdf, other]
Title: Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[24]  arXiv:2111.15521 (cross-list from cs.LG) [pdf, other]
Title: Node-Level Differentially Private Graph Neural Networks
Comments: 23 pages, 3 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[25]  arXiv:2111.15031 (cross-list from cs.LG) [pdf, other]
Title: MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[ total of 82 entries: 1-25 | 26-50 | 51-75 | 76-82 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2111, contact, help  (Access key information)