cryptsecurity's profile picture. arXiv - Computer Science -  Cryptography and Security

cs.CR

@cryptsecurity

arXiv - Computer Science - Cryptography and Security

HiNoVa: A Novel Open-Set Detection Method for Automating RF Device Authentication. (arXiv:2305.09594v1 [cs.CR]) arxiv.org/abs/2305.09594


Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection. (arXiv:2305.0959… arxiv.org/abs/2305.09592


Private Everlasting Prediction. (arXiv:2305.09579v1 [cs.LG]) arxiv.org/abs/2305.09579


UOR: Universal Backdoor Attacks on Pre-trained Language Models. (arXiv:2305.09574v1 [cs.CL]) arxiv.org/abs/2305.09574


Secure compilation of rich smart contracts on poor UTXO blockchains. (arXiv:2305.09545v1 [cs.CR]) arxiv.org/abs/2305.09545


Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics. (arX… arxiv.org/abs/2305.09482


ANALYSE -- Learning to Attack Cyber-Physical Energy Systems With Intelligent Agents. (arXiv:2305.09476v1 [cs.CR]) arxiv.org/abs/2305.09476


Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data. (… arxiv.org/abs/2305.09475


Time for Change: How Clocks Break UWB Secure Ranging. (arXiv:2305.09433v1 [cs.CR]) arxiv.org/abs/2305.09433


Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System. (arXiv:2305.09411v1… arxiv.org/abs/2305.09411


Unconditionally Secure Non-malleable Secret Sharing and Circular External Difference Families. (arXiv:2305.09405v1 … arxiv.org/abs/2305.09405


Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. (arXiv:2305.09390v1 [cs.CR]) arxiv.org/abs/2305.09390


Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves. (arXiv:2305.09351v1 [cs.CR]) arxiv.org/abs/2305.09351


Challenges with the Application of Cyber Security for Airworthiness (CSA) in Real-World Contexts. (arXiv:2305.09261… arxiv.org/abs/2305.09261


Trust-Worthy Semantic Communications for the Metaverse Relying on Federated Learning. (arXiv:2305.09255v1 [cs.CR]) arxiv.org/abs/2305.09255


A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack. (arXiv:2305.09251v1 [cs.CR]) arxiv.org/abs/2305.09251


Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples. (… arxiv.org/abs/2305.09241


Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence. (arXiv:2305.… arxiv.org/abs/2305.09224


A Multi-Client Searchable Encryption Scheme for IoT Environment. (arXiv:2305.09221v1 [cs.CR]) arxiv.org/abs/2305.09221


Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain. (arX… arxiv.org/abs/2305.09209


Loading...

Something went wrong.


Something went wrong.