🏛️ The Cryptography & Security Crypt
cs.CR: Where Cryptography & Security papers rest without their code.
22949
Total Papers
20484
No Code
114
Twilight
2351
Has Code
10.2%
Survival Rate
R.I.P.
👻
Ghosted
R.I.P.
👻
Ghosted
PRADA: Protecting against DNN Model Stealing Attacks
R.I.P.
👻
Ghosted
Towards the Science of Security and Privacy in Machine Learning
R.I.P.
👻
Ghosted
Differential Privacy Techniques for Cyber Physical Systems: A Survey
R.I.P.
👻
Ghosted
Local, Private, Efficient Protocols for Succinct Histograms
R.I.P.
👻
Ghosted
Stealing Hyperparameters in Machine Learning
R.I.P.
👻
Ghosted
Privacy and Robustness in Federated Learning: Attacks and Defenses
R.I.P.
👻
Ghosted
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
R.I.P.
👻
Ghosted
Consensus in the Age of Blockchains
R.I.P.
👻
Ghosted
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic
R.I.P.
👻
Ghosted
Crafting Adversarial Input Sequences for Recurrent Neural Networks
R.I.P.
👻
Ghosted
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
R.I.P.
👻
Ghosted
Enigma: Decentralized Computation Platform with Guaranteed Privacy
R.I.P.
👻
Ghosted
A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions
R.I.P.
👻
Ghosted
Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs
R.I.P.
👻
Ghosted
ZombieLoad: Cross-Privilege-Boundary Data Sampling
R.I.P.
👻
Ghosted
Deep Reinforcement Learning for Cyber Security
🌅
🌅
Old Age
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
R.I.P.
👻
Ghosted
ARMageddon: Cache Attacks on Mobile Devices
R.I.P.
👻
Ghosted
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
R.I.P.
👻
Ghosted
Deep Text Classification Can be Fooled
R.I.P.
👻
Ghosted
Adversarial Perturbations Against Deep Neural Networks for Malware Classification
R.I.P.
👻
Ghosted
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
R.I.P.
👻
Ghosted