cs.CR
@cryptsecurity
Followers
163
Following
6
Media
0
Statuses
12K
arXiv - Computer Science - Cryptography and Security
Joined July 2020
HiNoVa: A Novel Open-Set Detection Method for Automating RF Device Authentication. (arXiv:2305.09594v1 [ https://t.co/3S9gPIk5TA])
arxiv.org
New capabilities in wireless network security have been enabled by deep learning, which leverages patterns in radio frequency (RF) data to identify and authenticate devices. Open-set detection is...
0
0
0
Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection. (arXiv:2305.0959…
0
0
0
UOR: Universal Backdoor Attacks on Pre-trained Language Models. (arXiv:2305.09574v1 [ https://t.co/KNncqC0adZ])
0
0
1
Secure compilation of rich smart contracts on poor UTXO blockchains. (arXiv:2305.09545v1 [ https://t.co/3S9gPIjy42])
0
0
0
Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics. (arX…
0
0
0
ANALYSE -- Learning to Attack Cyber-Physical Energy Systems With Intelligent Agents. (arXiv:2305.09476v1 [ https://t.co/3S9gPIk5TA])
0
0
0
Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data. (…
0
0
0
Time for Change: How Clocks Break UWB Secure Ranging. (arXiv:2305.09433v1 [ https://t.co/3S9gPIk5TA])
0
0
0
Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System. (arXiv:2305.09411v1…
0
0
0
Unconditionally Secure Non-malleable Secret Sharing and Circular External Difference Families. (arXiv:2305.09405v1 …
arxiv.org
Various notions of non-malleable secret sharing schemes have been considered. In this paper, we review the existing work on non-malleable secret sharing and suggest a novel game-based definition....
0
0
0
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. (arXiv:2305.09390v1 [ https://t.co/3S9gPIk5TA])
0
0
0
Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves. (arXiv:2305.09351v1 [ https://t.co/3S9gPIk5TA])
arxiv.org
We propose a protocol that explores a synergy between two TEE implementations: it brings SGX-like remote attestation to SEV VMs. We use the notion of a \emph{trusted guest owner}, implemented as...
0
0
0
Challenges with the Application of Cyber Security for Airworthiness (CSA) in Real-World Contexts. (arXiv:2305.09261…
0
0
0
Trust-Worthy Semantic Communications for the Metaverse Relying on Federated Learning. (arXiv:2305.09255v1 [ https://t.co/3S9gPIjy42])
0
0
0
A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack. (arXiv:2305.09251v1 [ https://t.co/3S9gPIk5TA])
arxiv.org
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret...
0
0
1
Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples. (…
0
0
1
Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence. (arXiv:2305.…
0
0
0
A Multi-Client Searchable Encryption Scheme for IoT Environment. (arXiv:2305.09221v1 [ https://t.co/3S9gPIk5TA])
0
0
0
Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain. (arX…
0
1
1