Top 10 Arxiv Papers Today in Cryptography And Security


2.124 Mikeys
#1. Adversarial Vulnerability Bounds for Gaussian Process Classification
Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez
Machine learning (ML) classification is increasingly used in safety-critical systems. Protecting ML classifiers from adversarial examples is crucial. We propose that the main threat is that of an attacker perturbing a confidently classified input to produce a confident misclassification. To protect against this we devise an adversarial bound (AB) for a Gaussian process classifier, that holds for the entire input domain, bounding the potential for any future adversarial method to cause such misclassification. This is a formal guarantee of robustness, not just an empirically derived result. We investigate how to configure the classifier to maximise the bound, including the use of a sparse approximation, leading to the method producing a practical, useful and provably robust classifier, which we test using a variety of datasets.
more | pdf | html
Figures
None.
Tweets
BrundageBot: Adversarial Vulnerability Bounds for Gaussian Process Classification. Michael Thomas Smith, Kathrin Grosse, Michael Backes, and Mauricio A Alvarez https://t.co/V7MN8YpqCK
StatsPapers: Adversarial Vulnerability Bounds for Gaussian Process Classification. https://t.co/Cx1Wk2klE0
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 0
Unqiue Words: 0

2.048 Mikeys
#2. VideoDP: A Universal Platform for Video Analytics with Differential Privacy
Han Wang, Shangyu Xie, Yuan Hong
Massive amounts of video data are ubiquitously generated in personal devices and dedicated video recording facilities. Analyzing such data would be extremely beneficial in real world (e.g., urban traffic analysis, pedestrian behavior analysis, video surveillance). However, videos contain considerable sensitive information, such as human faces, identities and activities. Most of the existing video sanitization techniques simply obfuscate the video by detecting and blurring the region of interests (e.g., faces, vehicle plates, locations and timestamps) \emph{without quantifying} and \emph{bounding the privacy leakage} in the sanitization. In this paper, to the best of our knowledge, we propose the first differentially private video analytics platform (\emph{VideoDP}) which flexibly supports different video analyses with rigorous privacy guarantee. Different from traditional noise-injection based differentially private mechanisms, given the input video, \emph{VideoDP} randomly generates a utility-driven private video in which adding...
more | pdf | html
Figures
None.
Tweets
BrundageBot: VideoDP: A Universal Platform for Video Analytics with Differential Privacy. Han Wang, Shangyu Xie, and Yuan Hong https://t.co/RVLu9DD5C9
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

2.022 Mikeys
#3. KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability
Clinton Ehrlich, Anna Guzova
This paper applies biomimetic engineering to the problem of permissionless Byzantine consensus and achieves results that surpass the prior state of the art by four orders of magnitude. It introduces a biologically inspired asymmetric Sybil-resistance mechanism, Proof-of-Balance, which can replace symmetric Proof-of-Work and Proof-of-Stake weighting schemes. The biomimetic mechanism is incorporated into a permissionless blockchain protocol, Key Retroactivity Network Consensus ("KRNC"), which delivers ~40,000-times the security and speed of today's decentralized ledgers. KRNC allows the fiat money that the public already owns to be upgraded with cryptographic inflation protection, eliminating the problems inherent in bootstrapping new currencies like Bitcoin and Ethereum. The paper includes two independently significant contributions to the literature. First, it replaces the non-structural axioms invoked in prior work with a new formal method for reasoning about trust, liveness, and safety from first principles. Second, it...
more | pdf | html
Figures
Tweets
Melt_Dem: tired of white papers filled with cargo cult math? Anna Guzova and @ClintEhrlich have published excellent new research, sections 2 - 7 are especially interesting in outlining many of the theoretical issues around Proof-of-Stake get thee to Arvix -> https://t.co/fFy5UOu1bz
stevengharris: Reactions should be interesting - “KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability” https://t.co/3rIh1VRBtP
ClintEhrlich: By popular demand, the #KRNC technical paper is now available on @arxiv. https://t.co/XkO8jpa4Dc
ClintEhrlich: @ercwl Uhhh... Bitcoin is an altcoin. https://t.co/XkO8jpa4Dc
ClintEhrlich: @AriDavidPaul The biggest scalability flaw in Bitcoin is game-theoretic. PoW incentive-compatibility is not scale invariant, and it would require the world to make irrational trust assumptions if it became a global monetary standard. Details: https://t.co/XkO8joSteC
ClintEhrlich: @BiomimicryInst @bsi_bcn Sure. It's available on ArXiv: https://t.co/XkO8joSteC
ClintEhrlich: @TuurDemeester @pwuille @Ethan_Heilman @Dimitris https://t.co/XkO8joSteC (I'm the lead author)
ClintEhrlich: @lawrencehwhite1 This has important security implications. It's a nice example of the overlap between computer science and monetary theory. Details: https://t.co/XkO8joSteC
angsuman: New Foundations for Byzantine Consensus and Global Monetary Stability https://t.co/1e8yoKBkBO
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 42507
Unqiue Words: 6278

2.021 Mikeys
#4. Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication
Linda Senigagliesi, Marco Baldi, Ennio Gambi
In this paper we assess the security performance of key-less physical layer authentication schemes in the case of time-varying fading channels, considering both partial and no channel state information (CSI) on the receiver's side. We first present a generalization of a well-known protocol previously proposed for flat fading channels and we study different statistical decision methods and the corresponding optimal attack strategies in order to improve the authentication performance in the considered scenario. We then consider the application of machine learning techniques in the same setting, exploiting different one-class nearest neighbor (OCNN) classification algorithms. We observe that, under the same probability of false alarm, one-class classification (OCC) algorithms achieve the lowest probability of missed detection when a low spatial correlation exists between the main channel and the adversary one, while statistical methods are advantageous when the spatial correlation between the two channels is higher.
more | pdf | html
Figures
Tweets
arxivml: "Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication", Linda Senigagliesi,… https://t.co/6Cp8lXMYvO
arxiv_cs_LG: Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication. Linda Senigagliesi, Marco Baldi, and Ennio Gambi https://t.co/Fr1YiLaVOV
Memoirs: Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication. https://t.co/keqU5lwwru
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 5570
Unqiue Words: 1745

2.018 Mikeys
#5. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges
Jinyuan Jia, Neil Zhenqiang Gong
As machine learning (ML) becomes more and more powerful and easily accessible, attackers increasingly leverage ML to perform automated large-scale inference attacks in various domains. In such an ML-equipped inference attack, an attacker has access to some data (called public data) of an individual, a software, or a system; and the attacker uses an ML classifier to automatically infer their private data. Inference attacks pose severe privacy and security threats to individuals and systems. Inference attacks are successful because private data are statistically correlated with public data, and ML classifiers can capture such statistical correlations. In this chapter, we discuss the opportunities and challenges of defending against ML-equipped inference attacks via adversarial examples. Our key observation is that attackers rely on ML classifiers in inference attacks. The adversarial machine learning community has demonstrated that ML classifiers have various vulnerabilities. Therefore, we can turn the vulnerabilities of ML into...
more | pdf | html
Figures
None.
Tweets
arxiv_cs_LG: Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges. Jinyuan Jia and Neil Zhenqiang Gong https://t.co/tPg8CK3mQV
StatsPapers: Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges. https://t.co/xSYH2ybkLv
arxivml: "Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges"… https://t.co/SsE6ZDbZP9
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 0
Unqiue Words: 0

2.013 Mikeys
#6. CrypTFlow: Secure TensorFlow Inference
Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
We present CrypTFlow, a first of its kind system that converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols at the push of a button. To do this, we build three components. Our first component, Athos, is an end-to-end compiler from TensorFlow to a variety of semi-honest MPC protocols. The second component, Porthos, is an improved semi-honest 3-party protocol that provides significant speedups for Tensorflow like applications. Finally, to provide malicious secure MPC protocols, our third component, Aramis, is a novel technique that uses hardware with integrity guarantees to convert any semi-honest MPC protocol into an MPC protocol that provides malicious security. The security of the protocols output by Aramis relies on hardware for integrity and MPC for confidentiality. Moreover, our system, through the use of a new float-to-fixed compiler, matches the inference accuracy over the plaintext floating-point counterparts of these networks. We experimentally demonstrate the power of our system by...
more | pdf | html
Figures
None.
Tweets
arxiv_cs_LG: CrypTFlow: Secure TensorFlow Inference. Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma https://t.co/rfHzLUccgg
Github

Tensorflow-DenseNet with ImageNet Pretrained Models

Repository: tensorflow-densenet
User: pudae
Language: Python
Stargazers: 133
Subscribers: 6
Forks: 48
Open Issues: 9
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 6
Total Words: 15580
Unqiue Words: 3898

2.009 Mikeys
#7. Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks
Lixin Fan, Kam Woh Ng, Chee Seng Chan
With the rapid development of deep neural networks (DNN), there emerges an urgent need to protect the trained DNN models from being illegally copied, redistributed, or abused without respecting the intellectual properties of legitimate owners. Following recent progresses along this line, we investigate a number of watermark-based DNN ownership verification methods in the face of ambiguity attacks, which aim to cast doubts on ownership verification by forging counterfeit watermarks. It is shown that ambiguity attacks pose serious challenges to existing DNN watermarking methods. As remedies to the above-mentioned loophole, this paper proposes novel passport-based DNN ownership verification schemes which are both robust to network modifications and resilient to ambiguity attacks. The gist of embedding digital passports is to design and train DNN models in a way such that, the DNN model performance of an original task will be significantly deteriorated due to forged passports. In other words genuine passports are not only verified by...
more | pdf | html
Figures
None.
Tweets
arxiv_in_review: #NeurIPS2019 Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. (arXiv:1909.07830v1 [cs\.CR]) https://t.co/IxizrgAOKI
arxiv_cs_LG: Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. Lixin Fan, Kam Woh Ng, and Chee Seng Chan https://t.co/IdTouqNirn
arxiv_cscv: Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks https://t.co/NKYw1hespv
arxiv_cscv: Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks https://t.co/NKYw1hespv
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

2.005 Mikeys
#8. Network entity characterization and attack prediction
Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis
The devastating effects of cyber-attacks, highlight the need for novel attack detection and prevention techniques. Over the last years, considerable work has been done in the areas of attack detection as well as in collaborative defense. However, an analysis of the state of the art suggests that many challenges exist in prioritizing alert data and in studying the relation between a recently discovered attack and the probability of it occurring again. In this article, we propose a system that is intended for characterizing network entities and the likelihood that they will behave maliciously in the future. Our system, namely Network Entity Reputation Database System (NERDS), takes into account all the available information regarding a network entity (e. g. IP address) to calculate the probability that it will act maliciously. The latter part is achieved via the utilization of machine learning. Our experimental results show that it is indeed possible to precisely estimate the probability of future attacks from each entity using...
more | pdf | html
Figures
None.
Tweets
ninoseki: Network entity characterization and attack prediction (PDF) https://t.co/nDLbFL20nc https://t.co/vCOMSoyMPY
arxiv_cs_LG: Network entity characterization and attack prediction. Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, and Emmanouil Vasilomanolakis https://t.co/FcVDA3gBlu
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 12315
Unqiue Words: 2938

2.005 Mikeys
#9. Towards Efficient and Secure Delivery of Data for Deep Learning with Privacy-Preserving
Juncheng Shen, Juzheng Liu, Yiran Chen, Hai Li
Privacy recently emerges as a severe concern in deep learning, that is, sensitive data must be prohibited from being shared with the third party during deep neural network development. In this paper, we propose Morphed Learning (MoLe), an efficient and secure scheme to deliver deep learning data. MoLe has two main components: data morphing and Augmented Convolutional (Aug-Conv) layer. Data morphing allows data providers to send morphed data without privacy information, while Aug-Conv layer helps deep learning developers to apply their networks on the morphed data without performance penalty. MoLe provides stronger security while introducing lower overhead compared to GAZELLE (USENIX Security 2018), which is another method with no performance penalty on the neural network. When using MoLe for VGG-16 network on CIFAR dataset, the computational overhead is only 9% and the data transmission overhead is 5.12%. As a comparison, GAZELLE has computational overhead of 10,000 times and data transmission overhead of 421,000 times. In this...
more | pdf | html
Figures
None.
Tweets
BrundageBot: Towards Efficient and Secure Delivery of Data for Deep Learning with Privacy-Preserving. Juncheng Shen, Juzheng Liu, Yiran Chen, and Hai Li https://t.co/J80OdNkC1k
arxiv_in_review: #NeurIPS2019 Towards Efficient and Secure Delivery of Data for Deep Learning with Privacy-Preserving. (arXiv:1909.07632v1 [cs\.CR]) https://t.co/Xs60hN4N59
arxiv_cs_LG: Towards Efficient and Secure Delivery of Data for Deep Learning with Privacy-Preserving. Juncheng Shen, Juzheng Liu, Yiran Chen, and Hai Li https://t.co/LxdcL0yExR
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 0
Unqiue Words: 0

2.001 Mikeys
#10. Walling up Backdoors in Intrusion Detection Systems
Maximilian Bachl, Alexander Hartl, Joachim Fabini, Tanja Zseby
Interest in poisoning attacks and backdoors recently resurfaced for Deep Learning (DL) applications. Several successful defense mechanisms have been recently proposed for Convolutional Neural Networks (CNNs), for example in the context of autonomous driving. We show that visualization approaches can aid in identifying a backdoor independent of the used classifier. Surprisingly, we find that common defense mechanisms fail utterly to remove backdoors in DL for Intrusion Detection Systems (IDSs). Finally, we devise pruning-based approaches to remove backdoors for Decision Trees (DTs) and Random Forests (RFs) and demonstrate their effectiveness for two different network security datasets.
more | pdf | html
Figures
None.
Tweets
BrundageBot: Walling up Backdoors in Intrusion Detection Systems. Maximilian Bachl, Alexander Hartl, Joachim Fabini, and Tanja Zseby https://t.co/n4VQ1Kv227
arxiv_cs_LG: Walling up Backdoors in Intrusion Detection Systems. Maximilian Bachl, Alexander Hartl, Joachim Fabini, and Tanja Zseby https://t.co/Bk1m8P4RtL
Github

CN contact: Maximilian Bachl, Alexander Hartl

Repository: ids-backdoor
User: CN-TU
Language: TeX
Stargazers: 0
Subscribers: 3
Forks: 0
Open Issues: 0
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 4538
Unqiue Words: 1585

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 192,914 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 192,914 papers.