Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
π Anonymous Information Delivery
π₯ Hua Sun
π PDF
π A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
π₯ Mutaz Y. Melhem, Laszlo B. Kish
π PDF
π Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
π₯ Somdip Dey
π PDF
π An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
π₯ Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
π PDF
π How to design browser security and privacy alerts
π₯ Lynsay A. Shepherd, Karen Renaud
π PDF
π Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
π₯ Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
π PDF
π Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices
π₯ Fatemeh Tehranipoor
π PDF
π o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN
π₯ Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto
π PDF
π Creating and understanding email communication networks to aid digital forensic investigations
π₯ Michael McCarrin, Janina Green, Ralucca Gera
π PDF
π SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
π₯ Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh
π PDF
π How Usable are Rust Cryptography APIs?
π₯ Kai Mindermann, Philipp Keck, Stefan Wagner
π PDF
π SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
π₯ Binghui Wang, Le Zhang, Neil Zhenqiang Gong
π PDF
π Android Malware Detection using Large-scale Network Representation Learning
π₯ Rui Zhu, Chenglin Li, Di Niu, Hongwen Zhang, Husam Kinawi
π PDF
π Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
π₯ William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas
π PDF
π A Blockchain-based Flight Data Recorder for Cloud Accountability
π₯ Gabriele D'Angelo, Stefano Ferretti, Moreno Marzolla
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
π Anonymous Information Delivery
π₯ Hua Sun
π PDF
π A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
π₯ Mutaz Y. Melhem, Laszlo B. Kish
π PDF
π Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
π₯ Somdip Dey
π PDF
π An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
π₯ Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
π PDF
π How to design browser security and privacy alerts
π₯ Lynsay A. Shepherd, Karen Renaud
π PDF
π Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
π₯ Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
π PDF
π Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices
π₯ Fatemeh Tehranipoor
π PDF
π o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN
π₯ Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto
π PDF
π Creating and understanding email communication networks to aid digital forensic investigations
π₯ Michael McCarrin, Janina Green, Ralucca Gera
π PDF
π SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
π₯ Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh
π PDF
π How Usable are Rust Cryptography APIs?
π₯ Kai Mindermann, Philipp Keck, Stefan Wagner
π PDF
π SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
π₯ Binghui Wang, Le Zhang, Neil Zhenqiang Gong
π PDF
π Android Malware Detection using Large-scale Network Representation Learning
π₯ Rui Zhu, Chenglin Li, Di Niu, Hongwen Zhang, Husam Kinawi
π PDF
π Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
π₯ William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas
π PDF
π A Blockchain-based Flight Data Recorder for Cloud Accountability
π₯ Gabriele D'Angelo, Stefano Ferretti, Moreno Marzolla
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
π Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study
π₯ Alessandro Oltramari, Alexander Kott
π PDF
π COZMO-A New Lightweight Stream Cipher
π₯ Krishnendu Rarhi, Rhea Bonnerji, Simanta Sarkar, Abhishek Bhattacharya
π PDF
π Anomaly detection; Industrial control systems; convolutional neural networks
π₯ Moshe Kravchik, Asaf Shabtai
π PDF
π Combinatorial Testing for Deep Learning Systems
π₯ Lei Ma, Fuyuan Zhang, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Yadong Wang
π PDF
π User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy
π₯ Erfan Aghasian, Saurabh Garg, James Montgomery
π PDF
π UniqueID: Decentralized Proof-of-Unique-Human
π₯ MohammadJavad Hajialikhani, MohammadMahdi Jahanara
π PDF
π Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
π₯ Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei
π PDF
π Crowdsensing and privacy in smart city applications
π₯ Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal
π PDF
π Internet of Things (IoT) and Cloud Computing Enabled Disaster Management
π₯ Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal
π PDF
π A Survey on the Security of Pervasive Online Social Networks (POSNs)
π₯ Takshi Gupta, Gaurav Choudhary, Vishal Sharma
π PDF
π LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
π₯ Julian Stecklina, Thomas Prescher
π PDF
π Authentication as a service: Shamir Secret Sharing with byzantine components
π₯ Andrea Bissoli, Fabrizio d'Amore
π PDF
π Self-adaptive Privacy Concern Detection for User-generated Content
π₯ Xuan-Son Vu, Lili Jiang
π PDF
π Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA
π₯ Antonio GonzΓ‘lez-BurgueΓ±o, DamiΓ‘n Aparicio, Santiago Escobar, Catherine Meadows, JosΓ© Meseguer
π PDF
π Computer-aided proofs for multiparty computation with active security
π₯ Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
π Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study
π₯ Alessandro Oltramari, Alexander Kott
π PDF
π COZMO-A New Lightweight Stream Cipher
π₯ Krishnendu Rarhi, Rhea Bonnerji, Simanta Sarkar, Abhishek Bhattacharya
π PDF
π Anomaly detection; Industrial control systems; convolutional neural networks
π₯ Moshe Kravchik, Asaf Shabtai
π PDF
π Combinatorial Testing for Deep Learning Systems
π₯ Lei Ma, Fuyuan Zhang, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Yadong Wang
π PDF
π User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy
π₯ Erfan Aghasian, Saurabh Garg, James Montgomery
π PDF
π UniqueID: Decentralized Proof-of-Unique-Human
π₯ MohammadJavad Hajialikhani, MohammadMahdi Jahanara
π PDF
π Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
π₯ Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei
π PDF
π Crowdsensing and privacy in smart city applications
π₯ Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal
π PDF
π Internet of Things (IoT) and Cloud Computing Enabled Disaster Management
π₯ Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal
π PDF
π A Survey on the Security of Pervasive Online Social Networks (POSNs)
π₯ Takshi Gupta, Gaurav Choudhary, Vishal Sharma
π PDF
π LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
π₯ Julian Stecklina, Thomas Prescher
π PDF
π Authentication as a service: Shamir Secret Sharing with byzantine components
π₯ Andrea Bissoli, Fabrizio d'Amore
π PDF
π Self-adaptive Privacy Concern Detection for User-generated Content
π₯ Xuan-Son Vu, Lili Jiang
π PDF
π Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA
π₯ Antonio GonzΓ‘lez-BurgueΓ±o, DamiΓ‘n Aparicio, Santiago Escobar, Catherine Meadows, JosΓ© Meseguer
π PDF
π Computer-aided proofs for multiparty computation with active security
π₯ Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
π Self-Reproducing Coins as Universal Turing Machine
π₯ Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
π PDF
π Twisted Gabidulin Codes in the GPT Cryptosystem
π₯ Sven Puchinger, Julian Renner, Antonia Wachter-Zeh
π PDF
π Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+
π₯ Antonios Gouglidis, Christos Grompanopoulos, Anastasia Mavridou
π PDF
π Requirements for Ethereum Private Sidechains
π₯ Peter Robinson
π PDF
π Social Media and User Privacy
π₯ Ghazaleh Beigi
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
π Self-Reproducing Coins as Universal Turing Machine
π₯ Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
π PDF
π Twisted Gabidulin Codes in the GPT Cryptosystem
π₯ Sven Puchinger, Julian Renner, Antonia Wachter-Zeh
π PDF
π Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+
π₯ Antonios Gouglidis, Christos Grompanopoulos, Anastasia Mavridou
π PDF
π Requirements for Ethereum Private Sidechains
π₯ Peter Robinson
π PDF
π Social Media and User Privacy
π₯ Ghazaleh Beigi
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
π Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences
π₯ Borja Balle, Gilles Barthe, Marco Gaboardi
π PDF
π On the Incomparability of Cache Algorithms in Terms of Timing Leakage
π₯ Pablo CaΓ±ones, Boris KΓΆpf, Jan Reineke
π PDF
π Design of a New Stream Cipher: PARS
π₯ Mohammadreza Ashouri
π PDF
π Usability and Security Effects of Code Examples on Crypto APIs - CryptoExamples: A platform for free, minimal, complete and secure crypto examples
π₯ Kai Mindermann, Stefan Wagner
π PDF
π RUMA: On the Analysis of Defenses based on Misaligned Accesses
π₯ Daehee Jang, Jongwhan Kim, Minjoon Park, Yunjong Jung, Minsu Kim, Hojoon Lee, Brent Byunghoon Kang
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
π Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences
π₯ Borja Balle, Gilles Barthe, Marco Gaboardi
π PDF
π On the Incomparability of Cache Algorithms in Terms of Timing Leakage
π₯ Pablo CaΓ±ones, Boris KΓΆpf, Jan Reineke
π PDF
π Design of a New Stream Cipher: PARS
π₯ Mohammadreza Ashouri
π PDF
π Usability and Security Effects of Code Examples on Crypto APIs - CryptoExamples: A platform for free, minimal, complete and secure crypto examples
π₯ Kai Mindermann, Stefan Wagner
π PDF
π RUMA: On the Analysis of Defenses based on Misaligned Accesses
π₯ Daehee Jang, Jongwhan Kim, Minjoon Park, Yunjong Jung, Minsu Kim, Hojoon Lee, Brent Byunghoon Kang
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
To access articles related to a category, touch the HashTag:
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
π Speculative Buffer Overflows: Attacks and Defenses
π₯ Vladimir Kiriansky, Carl Waldspurger
π PDF
π Asynchronous Verifiable Secret-Sharing Protocols on a Good Day
π₯ Soumya Basu, Alin Tomescu, Mike Reiter, Dahlia Malkhi
π PDF
π TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies
π₯ Hao Dai, H Patrick Young, Thomas JS Durant, Guannan Gong, Mingming Kang, Harlan M Krumholz, Wade L Schulz, Lixin Jiang
π PDF
π CANAL: A Cache Timing Analysis Framework via LLVM Transformation
π₯ Chungha Sung, Brandon Paulsen, Chao Wang
π PDF
π Adaptive Adversarial Attack on Scene Text Recognition
π₯ Xiaoyong Yuan, Pan He, Xiaolin Andy Li
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
π Speculative Buffer Overflows: Attacks and Defenses
π₯ Vladimir Kiriansky, Carl Waldspurger
π PDF
π Asynchronous Verifiable Secret-Sharing Protocols on a Good Day
π₯ Soumya Basu, Alin Tomescu, Mike Reiter, Dahlia Malkhi
π PDF
π TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies
π₯ Hao Dai, H Patrick Young, Thomas JS Durant, Guannan Gong, Mingming Kang, Harlan M Krumholz, Wade L Schulz, Lixin Jiang
π PDF
π CANAL: A Cache Timing Analysis Framework via LLVM Transformation
π₯ Chungha Sung, Brandon Paulsen, Chao Wang
π PDF
π Adaptive Adversarial Attack on Scene Text Recognition
π₯ Xiaoyong Yuan, Pan He, Xiaolin Andy Li
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Forwarded from arXiv
To access articles related to a category, touch the HashTag:
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
π Measuring the Impact of Spectre and Meltdown
π₯ Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Michael Houle, Matthew Hubbell, Michael Jones, Anna Klein, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddharth Samsi, Charles Yee, Albert Reuther, Jeremy Kepner
π PDF
π 2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem
π₯ Qiang Zhu, Xixiang Lv
π PDF
π On the Anonymization of Differentially Private Location Obfuscation
π₯ Yusuke Kawamoto, Takao Murakami
π PDF
π Taint Tracking for WebAssembly
π₯ Aron Szanto, Timothy Tamm, Artidoro Pagnoni
π PDF
π Deep learning at the shallow end: Malware classification for non-domain experts
π₯ Quan Le, OisΓn Boydell, Brian Mac Namee, Mark Scanlon
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
π Measuring the Impact of Spectre and Meltdown
π₯ Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Michael Houle, Matthew Hubbell, Michael Jones, Anna Klein, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddharth Samsi, Charles Yee, Albert Reuther, Jeremy Kepner
π PDF
π 2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem
π₯ Qiang Zhu, Xixiang Lv
π PDF
π On the Anonymization of Differentially Private Location Obfuscation
π₯ Yusuke Kawamoto, Takao Murakami
π PDF
π Taint Tracking for WebAssembly
π₯ Aron Szanto, Timothy Tamm, Artidoro Pagnoni
π PDF
π Deep learning at the shallow end: Malware classification for non-domain experts
π₯ Quan Le, OisΓn Boydell, Brian Mac Namee, Mark Scanlon
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Forwarded from arXiv
To access articles related to a category, touch the HashTag:
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
π The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model
π₯ Congzheng Song, Vitaly Shmatikov
π PDF
π Semi-Finite Length Analysis for Information Theoretic Tasks
π₯ Masahito Hayashi
π PDF
π Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images
π₯ Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya
π PDF
π Formally Verified Hardware/Software Co-Design for Remote Attestation
π₯ Karim Eldefrawy, Ivan O. Nunes, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik
π PDF
π Improving ICS Cyber Resilience through Optimal Diversification of Network Resources
π₯ Tingting Li, Cheng Feng, Chris Hankin
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
π The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model
π₯ Congzheng Song, Vitaly Shmatikov
π PDF
π Semi-Finite Length Analysis for Information Theoretic Tasks
π₯ Masahito Hayashi
π PDF
π Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images
π₯ Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya
π PDF
π Formally Verified Hardware/Software Co-Design for Remote Attestation
π₯ Karim Eldefrawy, Ivan O. Nunes, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik
π PDF
π Improving ICS Cyber Resilience through Optimal Diversification of Network Resources
π₯ Tingting Li, Cheng Feng, Chris Hankin
π PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Forwarded from arXiv
To access articles related to a category, touch the HashTag:
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel
π Artificial Intelligence
π #ArtificialIntelligence π
π Hardware Architecture
π #HardwareArchitecture π
π Computational Complexity
π #ComputationalComplexity π
π Computational Engineering, Finance, and Science
π #ComputationalEngineeringFinanceandScience π
π Computational Geometry
π #ComputationalGeometry π
π Computation and Language
π #ComputationandLanguage π
π Cryptography and Security
π #CryptographyandSecurity π
π Computer Vision and Pattern Recognition
π #ComputerVisionandPatternRecognition π
π Computers and Society
π #ComputersandSociety π
π Databases
π #Databases π
π Distributed, Parallel, and Cluster Computing
π #DistributedParallelandClusterComputing π
π Digital Libraries
π #DigitalLibraries π
π Discrete Mathematics
π #DiscreteMathematics π
π Data Structures and Algorithms
π #DataStructuresandAlgorithms π
π Emerging Technologies
π #EmergingTechnologies π
π Formal Languages and Automata Theory
π #FormalLanguagesandAutomataTheory π
π General Literature
π #GeneralLiterature π
π Graphics
π #Graphics π
π Computer Science and Game Theory
π #ComputerScienceandGameTheory π
π Human-Computer Interaction
π #Human-ComputerInteraction π
π Information Retrieval
π #InformationRetrieval π
π Information Theory
π #InformationTheory π
π Learning
π #Learning π
π Logic in Computer Science
π #LogicinComputerScience π
π Multiagent Systems
π #MultiagentSystems π
π Multimedia
π #Multimedia π
π Mathematical Software
π #MathematicalSoftware π
π Numerical Analysis
π #NumericalAnalysis π
π Neural and Evolutionary Computing
π #NeuralandEvolutionaryComputing π
π Networking and Internet Architecture
π #NetworkingandInternetArchitecture π
π Other Computer Science
π #OtherComputerScience π
π Operating Systems
π #OperatingSystems π
π Performance
π #Performance π
π Programming Languages
π #ProgrammingLanguages π
π Robotics
π #Robotics π
π Symbolic Computation
π #SymbolicComputation π
π Sound
π #Sound π
π Software Engineering
π #SoftwareEngineering π
π Social and Information Networks
π #SocialandInformationNetworks π
π Systems and Control
π #SystemsandControl π
β¨οΈ arXiv Channel