MAVERICK: Proactively detecting network control plane bugs using structural outlierness. (arXiv:2101.09365v1 [cs.CR])
Proactive detection of network configuration bugs is important to ensure its proper functioning and reduce cost of network administrator. In…
Ants-Review: a Protocol for Incentivized Open Peer-Reviews on Ethereum. (arXiv:2101.09378v1 [cs.DL])
Peer-review is a necessary and essential quality control step for scientific publications but lacks proper incentives. Indeed, the process, which…
An Enhanced Passkey Entry Protocol for Secure Simple Pairing in Bluetooth. (arXiv:2101.09381v1 [cs.CR])
In this paper, we propose a simple enhancement for the passkey entry protocol in the authentication stage 1 of Secure…
Online Adversarial Purification based on Self-Supervision. (arXiv:2101.09387v1 [cs.LG])
Deep neural networks are known to be vulnerable to adversarial examples, where a perturbation in the input space leads to…
Privacy Assured Recovery of Compressively Sensed ECG signals. (arXiv:2101.09416v1 [cs.CR])
Cloud computing for storing data and running complex algorithms have been steadily increasing. As connected IoT devices such as wearable…
Error Diffusion Halftoning Against Adversarial Examples. (arXiv:2101.09451v1 [cs.CV])
Adversarial examples contain carefully crafted perturbations that can fool deep neural networks (DNNs) into making wrong predictions. Enhancing the adversarial…
Trusted Data Notifications from Private Blockchains. (arXiv:2101.09477v1 [cs.CR])
Private blockchain networks are used by enterprises to manage decentralized processes without trusted mediators and without exposing their assets publicly…
A DSA-like digital signature protocol. (arXiv:2101.09494v1 [cs.CR])
In this paper we propose a new digital signature protocol inspired by the DSA algorithm. The security and the complexity…
BU-Trace: A Permissionless Mobile System for Privacy-Preserving Intelligent Contact Tracing. (arXiv:2101.09653v1 [cs.SI])
The coronavirus disease 2019 (COVID-19) pandemic has caused an unprecedented health crisis for the global. Digital contact tracing, as a…
Quantum Learning Based Nonrandom Superimposed Coding for Secure Wireless Access in 5G URLLC. (arXiv:2101.09712v1 [eess.SP])
Secure wireless access in ultra-reliable low-latency communications (URLLC), which is a critical aspect of 5G security, has become increasingly important…