cs.CR (@cryptsecurity) 's Twitter Profile
cs.CR

@cryptsecurity

arXiv - Computer Science - Cryptography and Security

ID: 1279095399823728640

linkhttps://arxiv.org/list/cs.CR/recent calendar_today03-07-2020 16:52:54

11,11K Tweet

165 Followers

10 Following

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Trustworthy Privacy-preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 with Blockchain. (arX… arxiv.org/abs/2305.09209

cs.CR (@cryptsecurity) 's Twitter Profile Photo

A Multi-Client Searchable Encryption Scheme for IoT Environment. (arXiv:2305.09221v1 [cs.CR]) arxiv.org/abs/2305.09221

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence. (arXiv:2305.… arxiv.org/abs/2305.09224

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples. (… arxiv.org/abs/2305.09241

cs.CR (@cryptsecurity) 's Twitter Profile Photo

A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack. (arXiv:2305.09251v1 [cs.CR]) arxiv.org/abs/2305.09251

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Trust-Worthy Semantic Communications for the Metaverse Relying on Federated Learning. (arXiv:2305.09255v1 [cs.CR]) arxiv.org/abs/2305.09255

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Challenges with the Application of Cyber Security for Airworthiness (CSA) in Real-World Contexts. (arXiv:2305.09261… arxiv.org/abs/2305.09261

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves. (arXiv:2305.09351v1 [cs.CR]) arxiv.org/abs/2305.09351

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. (arXiv:2305.09390v1 [cs.CR]) arxiv.org/abs/2305.09390

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Unconditionally Secure Non-malleable Secret Sharing and Circular External Difference Families. (arXiv:2305.09405v1 … arxiv.org/abs/2305.09405

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System. (arXiv:2305.09411v1… arxiv.org/abs/2305.09411

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data. (… arxiv.org/abs/2305.09475

cs.CR (@cryptsecurity) 's Twitter Profile Photo

ANALYSE -- Learning to Attack Cyber-Physical Energy Systems With Intelligent Agents. (arXiv:2305.09476v1 [cs.CR]) arxiv.org/abs/2305.09476

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics. (arX… arxiv.org/abs/2305.09482

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Secure compilation of rich smart contracts on poor UTXO blockchains. (arXiv:2305.09545v1 [cs.CR]) arxiv.org/abs/2305.09545

cs.CR (@cryptsecurity) 's Twitter Profile Photo

Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection. (arXiv:2305.0959… arxiv.org/abs/2305.09592

cs.CR (@cryptsecurity) 's Twitter Profile Photo

HiNoVa: A Novel Open-Set Detection Method for Automating RF Device Authentication. (arXiv:2305.09594v1 [cs.CR]) arxiv.org/abs/2305.09594