Search

Showing total 639 results

Search Constraints

Start Over You searched for: Topic cryptography and security (cs.cr) Remove constraint Topic: cryptography and security (cs.cr) Publisher ieee Remove constraint Publisher: ieee
639 results

Search Results

1. (Short Paper) Towards More Reliable Bitcoin Timestamps

2. Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks

3. Resynthesis-based Attacks Against Logic Locking

4. Digital Twins for Dynamic Management of Blockchain Systems

5. Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

6. MalGrid: Visualization of Binary Features in Large Malware Corpora

7. Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains

8. Cryptocurrency Giveaway Scam with YouTube Live Stream

9. Logic and Reduction Operation based Hardware Trojans in Digital Design

10. What are the Practices for Secret Management in Software Artifacts?

11. Unauthorized Drone Detection: Experiments and Prototypes

12. Calibration with Privacy in Peer Review

13. A Novel Attack to the Permuted Kernel Problem

14. Factors Impacting Resilience of Internet of Things Systems in Critical Infrastructure

15. Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification

16. Use of a non-peer reviewed sources in cyber-security scientific research

17. Generative Adversarial Network-Driven Detection of Adversarial Tasks in Mobile Crowdsensing

18. FedRecAttack: Model Poisoning Attack to Federated Recommendation

19. Utility Analysis and Enhancement of LDP Mechanisms in High-Dimensional Space

20. Locally Differentially Private Sparse Vector Aggregation

21. Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems

22. From FPGAs to Obfuscated eASICs: Design and Security Trade-offs

23. Design of multiplicative watermarking against covert attacks

24. A Wearables-Driven Attack on Examination Proctoring

25. OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

26. NFTCert: NFT-Based Certificates With Online Payment Gateway

27. Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications

28. The Evolving Path of 'the Right to Be Left Alone' - When Privacy Meets Technology

29. Metaverse: Security and Privacy Issues

30. Learning to Detect: A Data-driven Approach for Network Intrusion Detection

31. Performance Analysis of Zero-Trust multi-cloud

32. A Tree-based Construction for Verifiable Diplomas with Issuer Transparency

33. TransMIA: Membership Inference Attacks Using Transfer Shadow Training

34. Open-Pub: A Transparent yet Privacy-Preserving Academic Publication System based on Blockchain

35. Toward Explainable Users: Using NLP to Enable AI to Understand Users’ Perceptions of Cyber Attacks

36. Automated Malware Design for Cyber Physical Systems

37. Efficient Algorithms for Quantitative Attack Tree Analysis

38. Relational Analysis of Sensor Attacks on Cyber-Physical Systems

39. An Axiomatic Approach to Detect Information Leaks in Concurrent Programs

40. Tracing Vulnerable Code Lineage

41. Measuring Decentralization in Bitcoin and Ethereum using Multiple Metrics and Granularities

42. Super-convergence and Differential Privacy: Training faster with better privacy guarantees

43. Damaged Fingerprint Recognition by Convolutional Long Short-Term Memory Networks for Forensic Purposes

44. SpaML: a Bimodal Ensemble Learning Spam Detector based on NLP Techniques

45. Reinforcing Cybersecurity Hands-on Training With Adaptive Learning

46. Safety-Critical Online Control with Adversarial Disturbances

47. Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU

48. A survey on blockchain & cloud integration

49. Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

50. Warwick Image Forensics Dataset for Device Fingerprinting in Multimedia Forensics