All papers published in past two days:
Category: Cryptography and Security
#CryptographyandSecurity
🗒 Anonymous Information Delivery
👥 Hua Sun
📗 PDF
🗒 A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
👥 Mutaz Y. Melhem, Laszlo B. Kish
📗 PDF
🗒 Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
👥 Somdip Dey
📗 PDF
🗒 An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
👥 Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
📗 PDF
🗒 How to design browser security and privacy alerts
👥 Lynsay A. Shepherd, Karen Renaud
📗 PDF
🗒 Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
👥 Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
📗 PDF
AI Python & arXiv Channel
Category: Cryptography and Security
#CryptographyandSecurity
🗒 Anonymous Information Delivery
👥 Hua Sun
🗒 A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
👥 Mutaz Y. Melhem, Laszlo B. Kish
🗒 Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
👥 Somdip Dey
🗒 An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
👥 Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
🗒 How to design browser security and privacy alerts
👥 Lynsay A. Shepherd, Karen Renaud
🗒 Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
👥 Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
AI Python & arXiv Channel
Latest Published Articles:
Cryptography and Security
#CryptographyandSecurity
🗒 Anonymous Information Delivery
👥 Hua Sun
📗 PDF
🗒 A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
👥 Mutaz Y. Melhem, Laszlo B. Kish
📗 PDF
🗒 Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
👥 Somdip Dey
📗 PDF
🗒 An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
👥 Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
📗 PDF
🗒 How to design browser security and privacy alerts
👥 Lynsay A. Shepherd, Karen Renaud
📗 PDF
🗒 Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
👥 Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
📗 PDF
🗒 Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices
👥 Fatemeh Tehranipoor
📗 PDF
🗒 o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN
👥 Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto
📗 PDF
🗒 Creating and understanding email communication networks to aid digital forensic investigations
👥 Michael McCarrin, Janina Green, Ralucca Gera
📗 PDF
🗒 SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
👥 Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh
📗 PDF
🗒 How Usable are Rust Cryptography APIs?
👥 Kai Mindermann, Philipp Keck, Stefan Wagner
📗 PDF
🗒 SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
👥 Binghui Wang, Le Zhang, Neil Zhenqiang Gong
📗 PDF
🗒 Android Malware Detection using Large-scale Network Representation Learning
👥 Rui Zhu, Chenglin Li, Di Niu, Hongwen Zhang, Husam Kinawi
📗 PDF
🗒 Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
👥 William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas
📗 PDF
🗒 A Blockchain-based Flight Data Recorder for Cloud Accountability
👥 Gabriele D'Angelo, Stefano Ferretti, Moreno Marzolla
📗 PDF
#CryptographyandSecurity
AI Python & arXiv Channel
Cryptography and Security
#CryptographyandSecurity
🗒 Anonymous Information Delivery
👥 Hua Sun
🗒 A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
👥 Mutaz Y. Melhem, Laszlo B. Kish
🗒 Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
👥 Somdip Dey
🗒 An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
👥 Ngoc Hong Tran, Cao-Vien Phung, Binh Quoc Nguyen, Leila Bahri
🗒 How to design browser security and privacy alerts
👥 Lynsay A. Shepherd, Karen Renaud
🗒 Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning
👥 Dong Yin, Yudong Chen, Kannan Ramchandran, Peter Bartlett
🗒 Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices
👥 Fatemeh Tehranipoor
🗒 o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN
👥 Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto
🗒 Creating and understanding email communication networks to aid digital forensic investigations
👥 Michael McCarrin, Janina Green, Ralucca Gera
🗒 SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
👥 Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh
🗒 How Usable are Rust Cryptography APIs?
👥 Kai Mindermann, Philipp Keck, Stefan Wagner
🗒 SybilBlind: Detecting Fake Users in Online Social Networks without Manual Labels
👥 Binghui Wang, Le Zhang, Neil Zhenqiang Gong
🗒 Android Malware Detection using Large-scale Network Representation Learning
👥 Rui Zhu, Chenglin Li, Di Niu, Hongwen Zhang, Husam Kinawi
🗒 Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
👥 William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas
🗒 A Blockchain-based Flight Data Recorder for Cloud Accountability
👥 Gabriele D'Angelo, Stefano Ferretti, Moreno Marzolla
#CryptographyandSecurity
AI Python & arXiv Channel