Top 10 Arxiv Papers Today in Cryptography And Security


0.0 Mikeys
#1. Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks
Sanghyun Hong, Michael Davinroy, Yiǧitcan Kaya, Stuart Nevans Locke, Ian Rackow, Kevin Kulda, Dana Dachman-Soled, Tudor Dumitraş
Recent work has introduced attacks that extract the architecture information of deep neural networks (DNN), as this knowledge enhances an adversary's capability to conduct black-box attacks against the model. This paper presents the first in-depth security analysis of DNN fingerprinting attacks that exploit cache side-channels. First, we define the threat model for these attacks: our adversary does not need the ability to query the victim model; instead, she runs a co-located process on the host machine victim's deep learning (DL) system is running and passively monitors the accesses of the target functions in the shared framework. Second, we introduce DeepRecon, an attack that reconstructs the architecture of the victim network by using the internal information extracted via Flush+Reload, a cache side-channel technique. Once the attacker observes function invocations that map directly to architecture attributes of the victim network, the attacker can reconstruct the victim's entire network architecture. In our evaluation, we...
more | pdf | html
Figures
Tweets
cynicalsecurity: S. Hong et al., “Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks” https://t.co/ZSn1x5AHii
arxivml: "Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks", Sanghyun Hong,… https://t.co/maQbOfxVeG
nmfeeds: [O] https://t.co/U6XEzvtBhi Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Atta...
Memoirs: Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks. https://t.co/C4ROIw41sx
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 8
Total Words: 7679
Unqiue Words: 2352

0.0 Mikeys
#2. EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks
Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya
In Advanced Metering Infrastructure (AMI) networks, smart meters should send fine-grained power consumption readings to electric utilities to perform real-time monitoring and energy management. However, these readings can leak sensitive information about consumers' activities. Various privacy-preserving schemes for collecting fine-grained readings have been proposed for AMI networks. These schemes aggregate individual readings and send an aggregated reading to the utility, but they extensively use asymmetric-key cryptography which involves large computation/communication overhead. Furthermore, they do not address End-to-End (E2E) data integrity, authenticity, and computing electricity bills based on dynamic prices. In this paper, we propose EPIC, an efficient and privacy-preserving data collection scheme with E2E data integrity verification for AMI networks. Using efficient cryptographic operations, each meter should send a masked reading to the utility such that all the masks are canceled after aggregating all meters' masked...
more | pdf | html
Figures
Tweets
ComputerPapers: EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks. https://t.co/lRpINaZzAr
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 12237
Unqiue Words: 2708

0.0 Mikeys
#3. EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing
Jingwei Liu, Fanghui Cai, Longfei Wu, Rong Sun, Liehuang Zhu, Xiaojiang Du
As a popular application, mobile crowd sensing systems aim at providing more convenient service via the swarm intelligence. With the popularity of sensor-embedded smart phones and intelligent wearable devices, mobile crowd sensing is becoming an efficient way to obtain various types of sensing data from individuals, which will make people's life more convenient. However, mobile crowd sensing systems today are facing a critical challenge, namely the privacy leakage of the sensitive information and valuable data, which can raise grave concerns among the participants. To address this issue, we propose an enhanced secure certificateless privacy-preserving verifiable data authentication scheme for mobile crowd sensing, named EPDA. The proposed scheme provides unconditional anonymous data authentication service for mobile crowd sensing, by deploying an improved certificateless ring signature as the cryptogram essential, in which the big sensing data should be signed by one of legitimate members in a specific group and could be verified...
more | pdf | html
Figures
None.
Tweets
arxiv_org: EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing. https://t.co/JtwD0zwk6x https://t.co/iA7h7X8zku
ComputerPapers: EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing. https://t.co/lbvY7eP8re
Rosenchild: RT @arxiv_org: EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing. https://t.co/JtwD0zwk6x https://t.co/iA7h7X…
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 4834
Unqiue Words: 1723

0.0 Mikeys
#4. RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes using In-situ Machine Learning
Baibhab Chatterjee, Debayan Das, Shovan Maity, Shreyas Sen
Traditional authentication in radio-frequency (RF) systems enable secure data communication within a network through techniques such as digital signatures and hash-based message authentication codes (HMAC), which suffer from key recovery attacks. State-of-the-art IoT networks such as Nest also use Open Authentication (OAuth 2.0) protocols that are vulnerable to cross-site-recovery forgery (CSRF), which shows that these techniques may not prevent an adversary from copying or modeling the secret IDs or encryption keys using invasive, side channel, learning or software attacks. Physical unclonable functions (PUF), on the other hand, can exploit manufacturing process variations to uniquely identify silicon chips which makes a PUF-based system extremely robust and secure at low cost, as it is practically impossible to replicate the same silicon characteristics across dies. Taking inspiration from human communication, which utilizes inherent variations in the voice signatures to identify a certain speaker, we present RF- PUF: a deep...
more | pdf | html
Figures
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 9090
Unqiue Words: 2863

0.0 Mikeys
#5. Deep learning at the shallow end: Malware classification for non-domain experts
Quan Le, Oisín Boydell, Brian Mac Namee, Mark Scanlon
Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns (signatures) and behaviors from malware, which are then used for identification. Moreover, these signatures are often limited to local, contiguous sequences within the data whilst ignoring their context in relation to each other and throughout the malware file as a whole. We present a Deep Learning based malware classification approach that requires no expert domain knowledge and is based on a purely data driven approach for complex pattern and feature identification.
more | pdf | html
Figures
Tweets
filar: Deep Learning at the Shallow End: Malware Classification for Non-Domain Experts. Similar to @EdwardRaffML paper on "eating the whole EXE" but uses down sampling for feature preprocessing. Paper https://t.co/2a5msO5xWm Code: https://t.co/e4DbxnKeaQ
bbr_bbq: 複雑なパターンや特徴を捉えることが可能なマルウエア分類手法。アブストしか読んでないが、職人技に依存していたマルウエアのパターンや特徴抽出をDeep Learningで自動化したとのこと。 Deep learning at the shallow end: Malware classification for non-domain experts https://t.co/1FmCw4D6IU
nmfeeds: [AI] https://t.co/MsdRjLvYJQ Deep learning at the shallow end: Malware classification for non-domain experts. Current malw...
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 8253
Unqiue Words: 2347

0.0 Mikeys
#6. Internet of Things Security and Forensics: Challenges and Opportunities
Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for cyber attacks. Moreover, as many of IoT nodes are collecting and processing private information, they are becoming a goldmine of data for malicious actors. Therefore, security and specifically the ability to detect compromised nodes, together with collecting and preserving evidences of an attack or malicious activities emerge as a priority in successful deployment of IoT networks. In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges.
more | pdf | html
Figures
None.
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 2664
Unqiue Words: 1162

0.0 Mikeys
#7. VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Zecheng He, Tianwei Zhang, Ruby B. Lee
Deep learning has become popular, and numerous cloud-based services are provided to help customers develop and deploy deep learning applications. Meanwhile, various attack techniques have also been discovered to stealthily compromise the model's integrity. When a cloud customer deploys a deep learning model in the cloud and serves it to end-users, it is important for him to be able to verify that the deployed model has not been tampered with, and the model's integrity is protected. We propose a new low-cost and self-served methodology for customers to verify that the model deployed in the cloud is intact, while having only black-box access (e.g., via APIs) to the deployed model. Customers can detect arbitrary changes to their deep learning models. Specifically, we define \texttt{Sensitive-Sample} fingerprints, which are a small set of transformed inputs that make the model outputs sensitive to the model's parameters. Even small weight changes can be clearly reflected in the model outputs, and observed by the customer. Our...
more | pdf | html
Figures
Tweets
arxiv_org: VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprin... https://t.co/ud7vDKufGi https://t.co/hsRyV8BVpS
M157q_News_RSS: VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting. (arXiv:1808.03277v1 [ https://t.co/oajiDFAfVx
arxivml: "VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting", Zecheng He, Tianwe… https://t.co/3S9B30J5lm
nmfeeds: [O] https://t.co/aahxRgM4I8 VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting....
DeepLearningNow: 0/33 New #deeplearning paper https://t.co/tZITlmxgW3 https://t.co/nSdaZICan4
Memoirs: VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting. https://t.co/XJ0doyR3SU
taraw: RT @arxiv_org: VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprin... https://t.co/ud7vDKufGi https:/…
syoyo: RT @arxiv_org: VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprin... https://t.co/ud7vDKufGi https:/…
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 13035
Unqiue Words: 3191

0.0 Mikeys
#8. The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin
Ben Kaiser, Mireya Jurado, Alex Ledger
As Bitcoin's popularity has grown over the decade since its creation, it has become an increasingly attractive target for adversaries of all kinds. One of the most powerful potential adversaries is the country of China, which has expressed adversarial positions regarding the cryptocurrency and demonstrated powerful capabilities to influence it. In this paper, we explore how China threatens the security, stability, and viability of Bitcoin through its dominant position in the Bitcoin ecosystem, political and economic control over domestic activity, and control over its domestic Internet infrastructure. We explore the relationship between China and Bitcoin, document China's motivation to undermine Bitcoin, and present a case study to demonstrate the strong influence that China has over Bitcoin. Finally, we systematize the class of attacks that China can deploy against Bitcoin to better understand the threat China poses. We conclude that China has mature capabilities and strong motives for performing a variety of attacks against Bitcoin.
more | pdf | html
Figures
Tweets
tokenpay: Proof-of-Stake coins like $TPAY are far more decentralized than proof-of-work coins like $BTC. Anybody with a computer or even a Raspberry Pi can mine #TokenPay, while 74% of #Bitcoin mining is tightly controlled by Chinese 🇨🇳 #crypto cartel. Big threat 👉 https://t.co/RC1ZStVlco
pierre_rochard: Link: https://t.co/wBS2aloUIK
arxiv_org: The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. https://t.co/ryX6F3aEJw https://t.co/4eHYuMrPtz
cynicalsecurity: B. Kaiser et al., “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin” https://t.co/tnJxUQjxM8
Kiffmeister: “We systematize the class of attacks that China can deploy against Bitcoin to better understand the threat China poses. We conclude that China has mature capabilities and strong motives for performing a variety of attacks against Bitcoin.” https://t.co/iu31VM68NX
muellerberndt: 7/ Recently, a team of reputable developers decided to analyze Chinese influence on Bitcoin, concluding that the high level of mining centralization causes significant risks. https://t.co/PZTTgIgDr0 https://t.co/HdBpw2TSJQ
BGIradji: 74%. By someone the Chinese Gov’t is at odds with. Often. Centralized tech in one of the most centralized states in the world What could possibly go wrong? https://t.co/UmFI0B40gH
duganist: This paper's data set may end in mid '18 when miner exodus began to accelerate, but the top mining pools are still China admin'ed. We really must be doing more to promote p2p mining pools and try to ameliorate that risk. https://t.co/WuvDZKMs58
Daniel_Plante: Academic paper from Princeton and FIU: The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin Read the just abstract, then ask yourself if the US gov would coordinate with them. https://t.co/fQVHGsYIMI
parisbydavid: "Bitcoin stands in ideological opposition to China’s centralized governing philosophy, so they may be motivated to weaken or destroy it to make an ideological statement; for example, demonstrating the futility of decentralized control paradigms" 👇 https://t.co/Pg99GepFxm https://t.co/XI5QU0bkyu
parisbydavid: @XRPTrump @Kramerwhale @HammerToe @JoelKatz @crypTruth @JKendzicky @jasonstjerny @TusharJain_ @Bitso @haydentiff Doc, there is a good paper entitled "The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin" I think everyone (who's interested in BTC) should read and analyze it https://t.co/Pg99GepFxm
dav917: @MustStopMurad, what are your thoughts on the China threat described in this PDF, which could challenge Bitcoin’s core requirement: “As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network”?: https://t.co/s3JDBFxPBS https://t.co/6kLKKO3dnY
pbronner: Interesting research… 80% of the bitcoin network capacity is provided by only 6 pools, 5 of which are physically located in China and 74% of the network hashrate falls on them. @ChrisBrummerDr, @GtownLawIIEL, @GeorgetownLaw #FintechWeek2018 https://t.co/OovY30kE4f
KryptoRevivaL: @BitcoinErrorLog https://t.co/MQwM2zt5ZH
KryptoRevivaL: @magicalcrypto some food for thought: https://t.co/MQwM2zt5ZH
PASCALORDONNEAU: Bitcoin: il y a quelques temps, je lançai une alerte sur la mainmise de la Chine sur le bitcoin . Voici une étude remarquable de l'université de Pinceton: The Looming Threat (menace imminente) of China: An Analysis of Chinese Influence on Bitcoin. https://t.co/wirA4s9s1P https://t.co/093AoJbjzx
PASCALORDONNEAU: Une précision, The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin a été publié par Cornell university. Parmi les trois rédacteurs , une vient de Princeton, les deux autres de Florida international University https://t.co/wirA4s9s1P https://t.co/FzgG6ZFb8X
BYOfuture: @aantonop Hey Andreas, what is your opinion on the paper that came out recently about the "Chinese Influence on Bitcoin"? Source: https://t.co/81bTZI61YW Merry Christmas!
CIA_XRP: @CryptoStallkker @XRPTrump @hastytoro @Coil @getongab I believe 90% of Bitcoin is traded in China. According to the attached study, they own perhaps 75%. That may be a fairly strong indicator of centalization. https://t.co/Wu0pi8Y52b https://t.co/7yHgEMRA8p
CryptoBisonish: @naomibrockwell It was a big step toward freedom indeed, but only in the case that it created the possibility for other coins to be created. Bitcoin failed by design: https://t.co/VsTD6kCUfl
D5V1N2: @BitcoinORama @Bakkus9 @PeterMcCormack https://t.co/QxdOzy42Po https://t.co/4US4sDlbMz
bitficus: New research painting a grim picture of China's influence and motive to attack the #Bitcoin network. https://t.co/BW4ki8N1DL Someone more versed in Bitcoin attack vectors make read up and let me know what you think. @pierre_rochard @MartyBent @bitcoinoptech @TheBlueMatt
701ticu: @kryptojohntrade @LauraCrypto @daniel_weese @Bakkt https://t.co/BPDPqplc5z
JorgeMCAzevedo: @HODL_Report @DataRuckus @TyRONE85185823 @etherchain_org @IamNomad https://t.co/azUdEY4EKd
pablocryptobar6: The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin https://t.co/eUHjrN7zYs
ComputerPapers: The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin. https://t.co/9Yz6LTKcBP
thegrugq: RT @cynicalsecurity: B. Kaiser et al., “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin” https://t.co/tnJxUQjxM8
paddykcl: RT @cynicalsecurity: B. Kaiser et al., “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin” https://t.co/tnJxUQjxM8
GivetheW: https://t.co/4pVwRxgr7e
Leon_Vandenberg: RT @pierre_rochard: Link: https://t.co/wBS2aloUIK
y0m: RT @cynicalsecurity: B. Kaiser et al., “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin” https://t.co/tnJxUQjxM8
fatrat: RT @cynicalsecurity: B. Kaiser et al., “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin” https://t.co/tnJxUQjxM8
tqft9999: RT @cynicalsecurity: B. Kaiser et al., “The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin” https://t.co/tnJxUQjxM8
dn0ms3d: RT @x0rz: An Analysis of Chinese Influence on Bitcoin https://t.co/qo101qOdiC (PDF) #china #bitcoin #cryptocurrency https://t.co/P80kPQ3vGa
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 8946
Unqiue Words: 2901

0.0 Mikeys
#9. Deconstructing the Blockchain to Approach Physical Limits
Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these measures are limited by two underlying physical network attributes: communication capacity and speed-of-light propagation delay. Existing systems operate far away from these physical limits. In this work we introduce Prism, a new proof-of-work blockchain protocol, which can achieve 1) security against up to 50% adversarial hashing power; 2) optimal throughput up to the capacity C of the network; 3) confirmation latency for honest transactions proportional to the propagation delay D, with confirmation error probability exponentially small in CD ; 4) eventual total ordering of all transactions. Our approach to the design of this protocol is based on deconstructing the blockchain into its basic functionalities and systematically scaling up these functionalities to approach their physical limits.
more | pdf | html
Figures
Tweets
joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #blockchain #crypto
LinkBechtel: I'm not *sure* about this, but I think the basic idea is to turn blockchain from a full democracy to an electoral college, to use an analogy: https://t.co/hGtEWcb9bI Am I wrong on that?
MathPaper: Deconstructing the Blockchain to Approach Physical Limits. https://t.co/qFQSOtd49s
peyman_razaghi: @BobMcElrath Likely following this https://t.co/uMyBNL77oX
Vivek1Bagaria: Prism: Consensus protocol for blockchain achieving optimal performance. Video: https://t.co/rcq8TIAe4y Full Paper: https://t.co/DHW68BtlU5 @DTR_org
Steven_McKie: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
WPeaster: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
kelpac: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
decentrali: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
Castracani_: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
meeshbhoombah: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
t__node: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
deloreangip: RT @joeykrug: https://t.co/GqYsUdDH5Y looks like someone solved the total ordering on a DAG problem, pretty huge for layer 1 scalability #b…
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 5
Total Words: 25591
Unqiue Words: 3841

0.0 Mikeys
#10. A New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment
Thomas Attema, Emiliano Mancini, Gabriele Spini, Mark Abspoel, Jan de Gier, Serge Fehr, Thijs Veugen, Maran van Heesch, Daniël Worm, Andrea De Luca, Ronald Cramer, Peter M. A. Sloot
Background: HIV treatment prescription is a complex process; clinical decision support systems (CDSS) can assist clinicians to choose optimal treatments. These support systems are based on clinical trials and expert knowledge; however, the amount of data available to these systems is limited. For this reason, CDSSs could be significantly improved by using the knowledge obtained by treating HIV patients. This knowledge is mainly contained in patient records, whose usage is restricted due to privacy and confidentiality constraints. Methods: A treatment effectiveness measure, containing valuable information for HIV treatment prescription, was defined and a method to extract this measure from patient records was developed. This method uses an advanced cryptographic technology, known as secure Multiparty Computation (henceforth referred to as MPC), to preserve the privacy of the patient records and the confidentiality of the clinicians' decisions. Results: Our solution enables to compute the effectiveness measure of an...
more | pdf | html
Figures
Tweets
cynicalsecurity: T. Attema et al., “A New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment” https://t.co/lyGJYY3HXD
ComputerPapers: A New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment. https://t.co/MJBGLFS9N8
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 12
Total Words: 5964
Unqiue Words: 2132

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 72,893 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 72,893 papers.