We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for cs.CR in Jun 2023

[ total of 525 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 501-525 ]
[ showing 25 entries per page: fewer | more | all ]
[1]  arXiv:2306.00095 [pdf, ps, other]
Title: Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System
Comments: 6 pages, 12 figures. Published in IEEE Global Communications Conference (GLOBECOM), 2022
Journal-ref: 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 6091-6096
Subjects: Cryptography and Security (cs.CR)
[2]  arXiv:2306.00133 [pdf, ps, other]
Title: A Note On Interpreting Canary Exposure
Comments: short note, edited to add a sentence on independence of canary losses, including adding Pillutla et al
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[3]  arXiv:2306.00136 [pdf, ps, other]
Title: A Holistic Framework for Safeguarding of SMEs-A Case Study
Comments: A modified version of this work has been submitted to the Workshop IOSEC 2023 in the context of the 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN) and published in IEEE Xplore
Journal-ref: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 2023, pp. 1-5,
Subjects: Cryptography and Security (cs.CR)
[4]  arXiv:2306.00234 [pdf, other]
Title: Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed
Comments: 7 pages, 10 figures, Conference paper, Accepted in publication for 2023 IEEE World AI IoT Congress (AIIoT)
Journal-ref: 2023 IEEE World AI IoT Congress (AIIoT) Conference
Subjects: Cryptography and Security (cs.CR)
[5]  arXiv:2306.00284 [pdf, ps, other]
Title: Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Quantum Physics (quant-ph)
[6]  arXiv:2306.00314 [pdf, ps, other]
Title: Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach
Comments: 17 pages, 3 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[7]  arXiv:2306.00377 [pdf, ps, other]
Title: Developing and Building Ontologies in Cyber Security
Comments: 8 pages, 2 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[8]  arXiv:2306.00419 [pdf, other]
Title: Challenges and Remedies to Privacy and Security in AIGC: Exploring the Potential of Privacy Computing, Blockchain, and Beyond
Comments: 43 pages, 10 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[9]  arXiv:2306.00462 [pdf, ps, other]
Title: Harnessing the Potential of Blockchain in DevOps: A Framework for Distributed Integration and Development
Comments: pages 10, figures 6
Subjects: Cryptography and Security (cs.CR)
[10]  arXiv:2306.00553 [pdf, other]
Title: EduChain: A Blockchain-based Education Data Management System
Journal-ref: CBCC 2020. Communications in Computer and Information Science, vol 1305. Springer, Singapore
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[11]  arXiv:2306.00589 [pdf, other]
Title: ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships
Comments: 16 pages, 3 figures, IEEE Transactions on Technology and Society
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[12]  arXiv:2306.00610 [pdf, other]
Title: Spying on the Spy: Security Analysis of Hidden Cameras
Comments: 19 pages. Conference: NSS 2023: 17th International Conference on Network and System Security
Subjects: Cryptography and Security (cs.CR)
[13]  arXiv:2306.00623 [pdf, other]
Title: Physical Attacks on the Railway System
Subjects: Cryptography and Security (cs.CR)
[14]  arXiv:2306.00674 [pdf, ps, other]
Title: CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
[15]  arXiv:2306.00766 [pdf, other]
Title: Impact of using a privacy model on smart buildings data for CO2 prediction
Subjects: Cryptography and Security (cs.CR)
[16]  arXiv:2306.00934 [pdf, other]
Title: Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[17]  arXiv:2306.01241 [pdf, ps, other]
Title: Committee Moderation on Encrypted Messaging Platforms
Comments: Presented at the 44th IEEE Symposium on Security and Privacy
Subjects: Cryptography and Security (cs.CR)
[18]  arXiv:2306.01299 [pdf, other]
Title: Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart Contracts
Subjects: Cryptography and Security (cs.CR)
[19]  arXiv:2306.01317 [pdf, other]
Title: Compatibility and Timing Attacks for JPEG Steganalysis
Authors: Etienne Levecque (CRIStAL), Patrick Bas (CRIStAL), Jan Butora (CRIStAL)
Comments: Workshop on Information Hiding and Multimedia Security, ACM, Jun 2023, Chicago, United States
Subjects: Cryptography and Security (cs.CR)
[20]  arXiv:2306.01356 [pdf, other]
Title: FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking
Subjects: Cryptography and Security (cs.CR)
[21]  arXiv:2306.01364 [pdf, other]
Title: Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation
Comments: Accepted to IJCAI 2023
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[22]  arXiv:2306.01401 [pdf, ps, other]
Title: Network Agnostic MPC with Statistical Security
Subjects: Cryptography and Security (cs.CR)
[23]  arXiv:2306.01616 [pdf, other]
Title: Blockchain Model for Environment/Infrastructure Monitoring in Cloud-Enabled High-Altitude Platform Systems
Comments: 53 pages, 17 figures, 3 tables, accepted by Elsevier Vehicular Communications on May 26, 2023
Subjects: Cryptography and Security (cs.CR)
[24]  arXiv:2306.01655 [pdf, other]
Title: Poisoning Network Flow Classifiers
Comments: 14 pages, 8 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[25]  arXiv:2306.01751 [pdf, ps, other]
Title: Differential Privacy with Random Projections and Sign Random Projections
Authors: Ping Li, Xiaoyun Li
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[ total of 525 entries: 1-25 | 26-50 | 51-75 | 76-100 | ... | 501-525 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)