1.72K subscribers
15.5K photos
10 videos
16 files
8.37K links
ArXiv Papers Related to Computer Science, AI, Deep Learning, Computer Vision, NLP, etc

Admins:
@ffarzaddh
Download Telegram
All papers published in past two days:
Category: Cryptography and Security
#CryptographyandSecurity


πŸ—’ Anonymous Information Delivery
πŸ‘₯ Hua Sun
πŸ“— PDF


πŸ—’ A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
πŸ‘₯ Mutaz Y. Melhem, Laszlo B. Kish
πŸ“— PDF


πŸ—’ Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
πŸ‘₯ Somdip Dey
πŸ“— PDF


πŸ—’ An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
πŸ‘₯ Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
πŸ“— PDF


πŸ—’ How to design browser security and privacy alerts
πŸ‘₯ Lynsay A. Shepherd, Karen Renaud
πŸ“— PDF


πŸ—’ Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
πŸ‘₯ Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
πŸ“— PDF



AI Python & arXiv Channel
Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity


πŸ—’ Anonymous Information Delivery
πŸ‘₯ Hua Sun
πŸ“— PDF


πŸ—’ A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
πŸ‘₯ Mutaz Y. Melhem, Laszlo B. Kish
πŸ“— PDF


πŸ—’ Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
πŸ‘₯ Somdip Dey
πŸ“— PDF


πŸ—’ An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
πŸ‘₯ Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
πŸ“— PDF


πŸ—’ How to design browser security and privacy alerts
πŸ‘₯ Lynsay A. Shepherd, Karen Renaud
πŸ“— PDF


πŸ—’ Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
πŸ‘₯ Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
πŸ“— PDF


πŸ—’ Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices
πŸ‘₯ Fatemeh Tehranipoor
πŸ“— PDF


πŸ—’ o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN
πŸ‘₯ Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto
πŸ“— PDF


πŸ—’ Creating and understanding email communication networks to aid digital forensic investigations
πŸ‘₯ Michael McCarrin, Janina Green, Ralucca Gera
πŸ“— PDF


πŸ—’ SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
πŸ‘₯ Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh
πŸ“— PDF


πŸ—’ How Usable are Rust Cryptography APIs?
πŸ‘₯ Kai Mindermann, Philipp Keck, Stefan Wagner
πŸ“— PDF


πŸ—’ SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
πŸ‘₯ Binghui Wang, Le Zhang, Neil Zhenqiang Gong
πŸ“— PDF


πŸ—’ Android Malware Detection using Large-scale Network Representation Learning
πŸ‘₯ Rui Zhu, Chenglin Li, Di Niu, Hongwen Zhang, Husam Kinawi
πŸ“— PDF


πŸ—’ Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
πŸ‘₯ William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas
πŸ“— PDF


πŸ—’ A Blockchain-based Flight Data Recorder for Cloud Accountability
πŸ‘₯ Gabriele D'Angelo, Stefano Ferretti, Moreno Marzolla
πŸ“— PDF


#CryptographyandSecurity
AI Python & arXiv Channel
Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity


πŸ—’ Towards a Reconceptualisation of Cyber Risk: An Empirical and Ontological Study
πŸ‘₯ Alessandro Oltramari, Alexander Kott
πŸ“— PDF


πŸ—’ COZMO-A New Lightweight Stream Cipher
πŸ‘₯ Krishnendu Rarhi, Rhea Bonnerji, Simanta Sarkar, Abhishek Bhattacharya
πŸ“— PDF


πŸ—’ Anomaly detection; Industrial control systems; convolutional neural networks
πŸ‘₯ Moshe Kravchik, Asaf Shabtai
πŸ“— PDF


πŸ—’ Combinatorial Testing for Deep Learning Systems
πŸ‘₯ Lei Ma, Fuyuan Zhang, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Yadong Wang
πŸ“— PDF


πŸ—’ User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy
πŸ‘₯ Erfan Aghasian, Saurabh Garg, James Montgomery
πŸ“— PDF


πŸ—’ UniqueID: Decentralized Proof-of-Unique-Human
πŸ‘₯ MohammadJavad Hajialikhani, MohammadMahdi Jahanara
πŸ“— PDF


πŸ—’ Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
πŸ‘₯ Yazhou Tu, Zhiqiang Lin, Insup Lee, Xiali Hei
πŸ“— PDF


πŸ—’ Crowdsensing and privacy in smart city applications
πŸ‘₯ Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal
πŸ“— PDF


πŸ—’ Internet of Things (IoT) and Cloud Computing Enabled Disaster Management
πŸ‘₯ Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal
πŸ“— PDF


πŸ—’ A Survey on the Security of Pervasive Online Social Networks (POSNs)
πŸ‘₯ Takshi Gupta, Gaurav Choudhary, Vishal Sharma
πŸ“— PDF


πŸ—’ LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
πŸ‘₯ Julian Stecklina, Thomas Prescher
πŸ“— PDF


πŸ—’ Authentication as a service: Shamir Secret Sharing with byzantine components
πŸ‘₯ Andrea Bissoli, Fabrizio d'Amore
πŸ“— PDF


πŸ—’ Self-adaptive Privacy Concern Detection for User-generated Content
πŸ‘₯ Xuan-Son Vu, Lili Jiang
πŸ“— PDF


πŸ—’ Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA
πŸ‘₯ Antonio GonzΓ‘lez-BurgueΓ±o, DamiΓ‘n Aparicio, Santiago Escobar, Catherine Meadows, JosΓ© Meseguer
πŸ“— PDF


πŸ—’ Computer-aided proofs for multiparty computation with active security
πŸ‘₯ Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
πŸ“— PDF


#CryptographyandSecurity
AI Python & arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity


πŸ—’ Self-Reproducing Coins as Universal Turing Machine
πŸ‘₯ Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
πŸ“— PDF


πŸ—’ Twisted Gabidulin Codes in the GPT Cryptosystem
πŸ‘₯ Sven Puchinger, Julian Renner, Antonia Wachter-Zeh
πŸ“— PDF


πŸ—’ Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+
πŸ‘₯ Antonios Gouglidis, Christos Grompanopoulos, Anastasia Mavridou
πŸ“— PDF


πŸ—’ Requirements for Ethereum Private Sidechains
πŸ‘₯ Peter Robinson
πŸ“— PDF


πŸ—’ Social Media and User Privacy
πŸ‘₯ Ghazaleh Beigi
πŸ“— PDF


#CryptographyandSecurity
AI Python & arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity


πŸ—’ Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences
πŸ‘₯ Borja Balle, Gilles Barthe, Marco Gaboardi
πŸ“— PDF


πŸ—’ On the Incomparability of Cache Algorithms in Terms of Timing Leakage
πŸ‘₯ Pablo CaΓ±ones, Boris KΓΆpf, Jan Reineke
πŸ“— PDF


πŸ—’ Design of a New Stream Cipher: PARS
πŸ‘₯ Mohammadreza Ashouri
πŸ“— PDF


πŸ—’ Usability and Security Effects of Code Examples on Crypto APIs - CryptoExamples: A platform for free, minimal, complete and secure crypto examples
πŸ‘₯ Kai Mindermann, Stefan Wagner
πŸ“— PDF


πŸ—’ RUMA: On the Analysis of Defenses based on Misaligned Accesses
πŸ‘₯ Daehee Jang, Jongwhan Kim, Minjoon Park, Yunjong Jung, Minsu Kim, Hojoon Lee, Brent Byunghoon Kang
πŸ“— PDF


#CryptographyandSecurity
AI Python & arXiv Channel
To access articles related to a category, touch the HashTag:

πŸ“— Artificial Intelligence
πŸ‘‰ #ArtificialIntelligence πŸ‘ˆ

πŸ“— Hardware Architecture
πŸ‘‰ #HardwareArchitecture πŸ‘ˆ

πŸ“— Computational Complexity
πŸ‘‰ #ComputationalComplexity πŸ‘ˆ

πŸ“— Computational Engineering, Finance, and Science
πŸ‘‰ #ComputationalEngineeringFinanceandScience πŸ‘ˆ

πŸ“— Computational Geometry
πŸ‘‰ #ComputationalGeometry πŸ‘ˆ

πŸ“— Computation and Language
πŸ‘‰ #ComputationandLanguage πŸ‘ˆ

πŸ“— Cryptography and Security
πŸ‘‰ #CryptographyandSecurity πŸ‘ˆ

πŸ“— Computer Vision and Pattern Recognition
πŸ‘‰ #ComputerVisionandPatternRecognition πŸ‘ˆ

πŸ“— Computers and Society
πŸ‘‰ #ComputersandSociety πŸ‘ˆ

πŸ“— Databases
πŸ‘‰ #Databases πŸ‘ˆ

πŸ“— Distributed, Parallel, and Cluster Computing
πŸ‘‰ #DistributedParallelandClusterComputing πŸ‘ˆ

πŸ“— Digital Libraries
πŸ‘‰ #DigitalLibraries πŸ‘ˆ

πŸ“— Discrete Mathematics
πŸ‘‰ #DiscreteMathematics πŸ‘ˆ

πŸ“— Data Structures and Algorithms
πŸ‘‰ #DataStructuresandAlgorithms πŸ‘ˆ

πŸ“— Emerging Technologies
πŸ‘‰ #EmergingTechnologies πŸ‘ˆ

πŸ“— Formal Languages and Automata Theory
πŸ‘‰ #FormalLanguagesandAutomataTheory πŸ‘ˆ

πŸ“— General Literature
πŸ‘‰ #GeneralLiterature πŸ‘ˆ

πŸ“— Graphics
πŸ‘‰ #Graphics πŸ‘ˆ

πŸ“— Computer Science and Game Theory
πŸ‘‰ #ComputerScienceandGameTheory πŸ‘ˆ

πŸ“— Human-Computer Interaction
πŸ‘‰ #Human-ComputerInteraction πŸ‘ˆ

πŸ“— Information Retrieval
πŸ‘‰ #InformationRetrieval πŸ‘ˆ

πŸ“— Information Theory
πŸ‘‰ #InformationTheory πŸ‘ˆ

πŸ“— Learning
πŸ‘‰ #Learning πŸ‘ˆ

πŸ“— Logic in Computer Science
πŸ‘‰ #LogicinComputerScience πŸ‘ˆ

πŸ“— Multiagent Systems
πŸ‘‰ #MultiagentSystems πŸ‘ˆ

πŸ“— Multimedia
πŸ‘‰ #Multimedia πŸ‘ˆ

πŸ“— Mathematical Software
πŸ‘‰ #MathematicalSoftware πŸ‘ˆ

πŸ“— Numerical Analysis
πŸ‘‰ #NumericalAnalysis πŸ‘ˆ

πŸ“— Neural and Evolutionary Computing
πŸ‘‰ #NeuralandEvolutionaryComputing πŸ‘ˆ

πŸ“— Networking and Internet Architecture
πŸ‘‰ #NetworkingandInternetArchitecture πŸ‘ˆ

πŸ“— Other Computer Science
πŸ‘‰ #OtherComputerScience πŸ‘ˆ

πŸ“— Operating Systems
πŸ‘‰ #OperatingSystems πŸ‘ˆ

πŸ“— Performance
πŸ‘‰ #Performance πŸ‘ˆ

πŸ“— Programming Languages
πŸ‘‰ #ProgrammingLanguages πŸ‘ˆ

πŸ“— Robotics
πŸ‘‰ #Robotics πŸ‘ˆ

πŸ“— Symbolic Computation
πŸ‘‰ #SymbolicComputation πŸ‘ˆ

πŸ“— Sound
πŸ‘‰ #Sound πŸ‘ˆ

πŸ“— Software Engineering
πŸ‘‰ #SoftwareEngineering πŸ‘ˆ

πŸ“— Social and Information Networks
πŸ‘‰ #SocialandInformationNetworks πŸ‘ˆ

πŸ“— Systems and Control
πŸ‘‰ #SystemsandControl πŸ‘ˆ

♨️ arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity


πŸ—’ Speculative Buffer Overflows: Attacks and Defenses
πŸ‘₯ Vladimir Kiriansky, Carl Waldspurger
πŸ“— PDF


πŸ—’ Asynchronous Verifiable Secret-Sharing Protocols on a Good Day
πŸ‘₯ Soumya Basu, Alin Tomescu, Mike Reiter, Dahlia Malkhi
πŸ“— PDF


πŸ—’ TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies
πŸ‘₯ Hao Dai, H Patrick Young, Thomas JS Durant, Guannan Gong, Mingming Kang, Harlan M Krumholz, Wade L Schulz, Lixin Jiang
πŸ“— PDF


πŸ—’ CANAL: A Cache Timing Analysis Framework via LLVM Transformation
πŸ‘₯ Chungha Sung, Brandon Paulsen, Chao Wang
πŸ“— PDF


πŸ—’ Adaptive Adversarial Attack on Scene Text Recognition
πŸ‘₯ Xiaoyong Yuan, Pan He, Xiaolin Andy Li
πŸ“— PDF


#CryptographyandSecurity
AI Python & arXiv Channel
Forwarded from arXiv
To access articles related to a category, touch the HashTag:

πŸ“— Artificial Intelligence
πŸ‘‰ #ArtificialIntelligence πŸ‘ˆ

πŸ“— Hardware Architecture
πŸ‘‰ #HardwareArchitecture πŸ‘ˆ

πŸ“— Computational Complexity
πŸ‘‰ #ComputationalComplexity πŸ‘ˆ

πŸ“— Computational Engineering, Finance, and Science
πŸ‘‰ #ComputationalEngineeringFinanceandScience πŸ‘ˆ

πŸ“— Computational Geometry
πŸ‘‰ #ComputationalGeometry πŸ‘ˆ

πŸ“— Computation and Language
πŸ‘‰ #ComputationandLanguage πŸ‘ˆ

πŸ“— Cryptography and Security
πŸ‘‰ #CryptographyandSecurity πŸ‘ˆ

πŸ“— Computer Vision and Pattern Recognition
πŸ‘‰ #ComputerVisionandPatternRecognition πŸ‘ˆ

πŸ“— Computers and Society
πŸ‘‰ #ComputersandSociety πŸ‘ˆ

πŸ“— Databases
πŸ‘‰ #Databases πŸ‘ˆ

πŸ“— Distributed, Parallel, and Cluster Computing
πŸ‘‰ #DistributedParallelandClusterComputing πŸ‘ˆ

πŸ“— Digital Libraries
πŸ‘‰ #DigitalLibraries πŸ‘ˆ

πŸ“— Discrete Mathematics
πŸ‘‰ #DiscreteMathematics πŸ‘ˆ

πŸ“— Data Structures and Algorithms
πŸ‘‰ #DataStructuresandAlgorithms πŸ‘ˆ

πŸ“— Emerging Technologies
πŸ‘‰ #EmergingTechnologies πŸ‘ˆ

πŸ“— Formal Languages and Automata Theory
πŸ‘‰ #FormalLanguagesandAutomataTheory πŸ‘ˆ

πŸ“— General Literature
πŸ‘‰ #GeneralLiterature πŸ‘ˆ

πŸ“— Graphics
πŸ‘‰ #Graphics πŸ‘ˆ

πŸ“— Computer Science and Game Theory
πŸ‘‰ #ComputerScienceandGameTheory πŸ‘ˆ

πŸ“— Human-Computer Interaction
πŸ‘‰ #Human-ComputerInteraction πŸ‘ˆ

πŸ“— Information Retrieval
πŸ‘‰ #InformationRetrieval πŸ‘ˆ

πŸ“— Information Theory
πŸ‘‰ #InformationTheory πŸ‘ˆ

πŸ“— Learning
πŸ‘‰ #Learning πŸ‘ˆ

πŸ“— Logic in Computer Science
πŸ‘‰ #LogicinComputerScience πŸ‘ˆ

πŸ“— Multiagent Systems
πŸ‘‰ #MultiagentSystems πŸ‘ˆ

πŸ“— Multimedia
πŸ‘‰ #Multimedia πŸ‘ˆ

πŸ“— Mathematical Software
πŸ‘‰ #MathematicalSoftware πŸ‘ˆ

πŸ“— Numerical Analysis
πŸ‘‰ #NumericalAnalysis πŸ‘ˆ

πŸ“— Neural and Evolutionary Computing
πŸ‘‰ #NeuralandEvolutionaryComputing πŸ‘ˆ

πŸ“— Networking and Internet Architecture
πŸ‘‰ #NetworkingandInternetArchitecture πŸ‘ˆ

πŸ“— Other Computer Science
πŸ‘‰ #OtherComputerScience πŸ‘ˆ

πŸ“— Operating Systems
πŸ‘‰ #OperatingSystems πŸ‘ˆ

πŸ“— Performance
πŸ‘‰ #Performance πŸ‘ˆ

πŸ“— Programming Languages
πŸ‘‰ #ProgrammingLanguages πŸ‘ˆ

πŸ“— Robotics
πŸ‘‰ #Robotics πŸ‘ˆ

πŸ“— Symbolic Computation
πŸ‘‰ #SymbolicComputation πŸ‘ˆ

πŸ“— Sound
πŸ‘‰ #Sound πŸ‘ˆ

πŸ“— Software Engineering
πŸ‘‰ #SoftwareEngineering πŸ‘ˆ

πŸ“— Social and Information Networks
πŸ‘‰ #SocialandInformationNetworks πŸ‘ˆ

πŸ“— Systems and Control
πŸ‘‰ #SystemsandControl πŸ‘ˆ

♨️ arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity


πŸ—’ Measuring the Impact of Spectre and Meltdown
πŸ‘₯ Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Michael Houle, Matthew Hubbell, Michael Jones, Anna Klein, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddharth Samsi, Charles Yee, Albert Reuther, Jeremy Kepner
πŸ“— PDF


πŸ—’ 2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem
πŸ‘₯ Qiang Zhu, Xixiang Lv
πŸ“— PDF


πŸ—’ On the Anonymization of Differentially Private Location Obfuscation
πŸ‘₯ Yusuke Kawamoto, Takao Murakami
πŸ“— PDF


πŸ—’ Taint Tracking for WebAssembly
πŸ‘₯ Aron Szanto, Timothy Tamm, Artidoro Pagnoni
πŸ“— PDF


πŸ—’ Deep learning at the shallow end: Malware classification for non-domain experts
πŸ‘₯ Quan Le, OisΓ­n Boydell, Brian Mac Namee, Mark Scanlon
πŸ“— PDF


#CryptographyandSecurity
AI Python & arXiv Channel
Forwarded from arXiv
To access articles related to a category, touch the HashTag:

πŸ“— Artificial Intelligence
πŸ‘‰ #ArtificialIntelligence πŸ‘ˆ

πŸ“— Hardware Architecture
πŸ‘‰ #HardwareArchitecture πŸ‘ˆ

πŸ“— Computational Complexity
πŸ‘‰ #ComputationalComplexity πŸ‘ˆ

πŸ“— Computational Engineering, Finance, and Science
πŸ‘‰ #ComputationalEngineeringFinanceandScience πŸ‘ˆ

πŸ“— Computational Geometry
πŸ‘‰ #ComputationalGeometry πŸ‘ˆ

πŸ“— Computation and Language
πŸ‘‰ #ComputationandLanguage πŸ‘ˆ

πŸ“— Cryptography and Security
πŸ‘‰ #CryptographyandSecurity πŸ‘ˆ

πŸ“— Computer Vision and Pattern Recognition
πŸ‘‰ #ComputerVisionandPatternRecognition πŸ‘ˆ

πŸ“— Computers and Society
πŸ‘‰ #ComputersandSociety πŸ‘ˆ

πŸ“— Databases
πŸ‘‰ #Databases πŸ‘ˆ

πŸ“— Distributed, Parallel, and Cluster Computing
πŸ‘‰ #DistributedParallelandClusterComputing πŸ‘ˆ

πŸ“— Digital Libraries
πŸ‘‰ #DigitalLibraries πŸ‘ˆ

πŸ“— Discrete Mathematics
πŸ‘‰ #DiscreteMathematics πŸ‘ˆ

πŸ“— Data Structures and Algorithms
πŸ‘‰ #DataStructuresandAlgorithms πŸ‘ˆ

πŸ“— Emerging Technologies
πŸ‘‰ #EmergingTechnologies πŸ‘ˆ

πŸ“— Formal Languages and Automata Theory
πŸ‘‰ #FormalLanguagesandAutomataTheory πŸ‘ˆ

πŸ“— General Literature
πŸ‘‰ #GeneralLiterature πŸ‘ˆ

πŸ“— Graphics
πŸ‘‰ #Graphics πŸ‘ˆ

πŸ“— Computer Science and Game Theory
πŸ‘‰ #ComputerScienceandGameTheory πŸ‘ˆ

πŸ“— Human-Computer Interaction
πŸ‘‰ #Human-ComputerInteraction πŸ‘ˆ

πŸ“— Information Retrieval
πŸ‘‰ #InformationRetrieval πŸ‘ˆ

πŸ“— Information Theory
πŸ‘‰ #InformationTheory πŸ‘ˆ

πŸ“— Learning
πŸ‘‰ #Learning πŸ‘ˆ

πŸ“— Logic in Computer Science
πŸ‘‰ #LogicinComputerScience πŸ‘ˆ

πŸ“— Multiagent Systems
πŸ‘‰ #MultiagentSystems πŸ‘ˆ

πŸ“— Multimedia
πŸ‘‰ #Multimedia πŸ‘ˆ

πŸ“— Mathematical Software
πŸ‘‰ #MathematicalSoftware πŸ‘ˆ

πŸ“— Numerical Analysis
πŸ‘‰ #NumericalAnalysis πŸ‘ˆ

πŸ“— Neural and Evolutionary Computing
πŸ‘‰ #NeuralandEvolutionaryComputing πŸ‘ˆ

πŸ“— Networking and Internet Architecture
πŸ‘‰ #NetworkingandInternetArchitecture πŸ‘ˆ

πŸ“— Other Computer Science
πŸ‘‰ #OtherComputerScience πŸ‘ˆ

πŸ“— Operating Systems
πŸ‘‰ #OperatingSystems πŸ‘ˆ

πŸ“— Performance
πŸ‘‰ #Performance πŸ‘ˆ

πŸ“— Programming Languages
πŸ‘‰ #ProgrammingLanguages πŸ‘ˆ

πŸ“— Robotics
πŸ‘‰ #Robotics πŸ‘ˆ

πŸ“— Symbolic Computation
πŸ‘‰ #SymbolicComputation πŸ‘ˆ

πŸ“— Sound
πŸ‘‰ #Sound πŸ‘ˆ

πŸ“— Software Engineering
πŸ‘‰ #SoftwareEngineering πŸ‘ˆ

πŸ“— Social and Information Networks
πŸ‘‰ #SocialandInformationNetworks πŸ‘ˆ

πŸ“— Systems and Control
πŸ‘‰ #SystemsandControl πŸ‘ˆ

♨️ arXiv Channel
5 of Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity


πŸ—’ The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model
πŸ‘₯ Congzheng Song, Vitaly Shmatikov
πŸ“— PDF


πŸ—’ Semi-Finite Length Analysis for Information Theoretic Tasks
πŸ‘₯ Masahito Hayashi
πŸ“— PDF


πŸ—’ Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images
πŸ‘₯ Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya
πŸ“— PDF


πŸ—’ Formally Verified Hardware/Software Co-Design for Remote Attestation
πŸ‘₯ Karim Eldefrawy, Ivan O. Nunes, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik
πŸ“— PDF


πŸ—’ Improving ICS Cyber Resilience through Optimal Diversification of Network Resources
πŸ‘₯ Tingting Li, Cheng Feng, Chris Hankin
πŸ“— PDF


#CryptographyandSecurity
AI Python & arXiv Channel
Forwarded from arXiv
To access articles related to a category, touch the HashTag:

πŸ“— Artificial Intelligence
πŸ‘‰ #ArtificialIntelligence πŸ‘ˆ

πŸ“— Hardware Architecture
πŸ‘‰ #HardwareArchitecture πŸ‘ˆ

πŸ“— Computational Complexity
πŸ‘‰ #ComputationalComplexity πŸ‘ˆ

πŸ“— Computational Engineering, Finance, and Science
πŸ‘‰ #ComputationalEngineeringFinanceandScience πŸ‘ˆ

πŸ“— Computational Geometry
πŸ‘‰ #ComputationalGeometry πŸ‘ˆ

πŸ“— Computation and Language
πŸ‘‰ #ComputationandLanguage πŸ‘ˆ

πŸ“— Cryptography and Security
πŸ‘‰ #CryptographyandSecurity πŸ‘ˆ

πŸ“— Computer Vision and Pattern Recognition
πŸ‘‰ #ComputerVisionandPatternRecognition πŸ‘ˆ

πŸ“— Computers and Society
πŸ‘‰ #ComputersandSociety πŸ‘ˆ

πŸ“— Databases
πŸ‘‰ #Databases πŸ‘ˆ

πŸ“— Distributed, Parallel, and Cluster Computing
πŸ‘‰ #DistributedParallelandClusterComputing πŸ‘ˆ

πŸ“— Digital Libraries
πŸ‘‰ #DigitalLibraries πŸ‘ˆ

πŸ“— Discrete Mathematics
πŸ‘‰ #DiscreteMathematics πŸ‘ˆ

πŸ“— Data Structures and Algorithms
πŸ‘‰ #DataStructuresandAlgorithms πŸ‘ˆ

πŸ“— Emerging Technologies
πŸ‘‰ #EmergingTechnologies πŸ‘ˆ

πŸ“— Formal Languages and Automata Theory
πŸ‘‰ #FormalLanguagesandAutomataTheory πŸ‘ˆ

πŸ“— General Literature
πŸ‘‰ #GeneralLiterature πŸ‘ˆ

πŸ“— Graphics
πŸ‘‰ #Graphics πŸ‘ˆ

πŸ“— Computer Science and Game Theory
πŸ‘‰ #ComputerScienceandGameTheory πŸ‘ˆ

πŸ“— Human-Computer Interaction
πŸ‘‰ #Human-ComputerInteraction πŸ‘ˆ

πŸ“— Information Retrieval
πŸ‘‰ #InformationRetrieval πŸ‘ˆ

πŸ“— Information Theory
πŸ‘‰ #InformationTheory πŸ‘ˆ

πŸ“— Learning
πŸ‘‰ #Learning πŸ‘ˆ

πŸ“— Logic in Computer Science
πŸ‘‰ #LogicinComputerScience πŸ‘ˆ

πŸ“— Multiagent Systems
πŸ‘‰ #MultiagentSystems πŸ‘ˆ

πŸ“— Multimedia
πŸ‘‰ #Multimedia πŸ‘ˆ

πŸ“— Mathematical Software
πŸ‘‰ #MathematicalSoftware πŸ‘ˆ

πŸ“— Numerical Analysis
πŸ‘‰ #NumericalAnalysis πŸ‘ˆ

πŸ“— Neural and Evolutionary Computing
πŸ‘‰ #NeuralandEvolutionaryComputing πŸ‘ˆ

πŸ“— Networking and Internet Architecture
πŸ‘‰ #NetworkingandInternetArchitecture πŸ‘ˆ

πŸ“— Other Computer Science
πŸ‘‰ #OtherComputerScience πŸ‘ˆ

πŸ“— Operating Systems
πŸ‘‰ #OperatingSystems πŸ‘ˆ

πŸ“— Performance
πŸ‘‰ #Performance πŸ‘ˆ

πŸ“— Programming Languages
πŸ‘‰ #ProgrammingLanguages πŸ‘ˆ

πŸ“— Robotics
πŸ‘‰ #Robotics πŸ‘ˆ

πŸ“— Symbolic Computation
πŸ‘‰ #SymbolicComputation πŸ‘ˆ

πŸ“— Sound
πŸ‘‰ #Sound πŸ‘ˆ

πŸ“— Software Engineering
πŸ‘‰ #SoftwareEngineering πŸ‘ˆ

πŸ“— Social and Information Networks
πŸ‘‰ #SocialandInformationNetworks πŸ‘ˆ

πŸ“— Systems and Control
πŸ‘‰ #SystemsandControl πŸ‘ˆ

♨️ arXiv Channel