Dates are inconsistent

Dates are inconsistent

2 results sorted by ID

Possible spell-corrected query: hashing Detection
2021/1448 (PDF) Last updated: 2021-10-27
Secure Featurization and Applications to Secure Phishing Detection
Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu
Cryptographic protocols

Secure inference allows a server holding a machine learning (ML) inference algorithm with private weights, and a client with a private input, to obtain the output of the inference algorithm, without revealing their respective private inputs to one another. While this problem has received plenty of attention, existing systems are not applicable to a large class of ML algorithms (such as in the domain of Natural Language Processing) that perform featurization as their first step. In this...

2015/709 (PDF) Last updated: 2017-01-09
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa, Kari Kostiainen, Srdjan Capkun

Mobile application spoofing is an attack where a malicious mobile application mimics the visual appearance of another one. If such an attack is successful, the integrity of what the user sees as well as the confidentiality of what she inputs into the system can be violated by the adversary. A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a malicious application that resembles the legitimate one. In this...

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.