default search action
6th CSCML 2022: Be'er Sheva, Israel
- Shlomi Dolev, Jonathan Katz, Amnon Meisels:
Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13301, Springer 2022, ISBN 978-3-031-07688-6 - Marc Joye, Pascal Paillier:
Blind Rotation in Fully Homomorphic Encryption with Extended Keys. 1-18 - Oshri Barazani, David Tolpin:
Monitoring Time Series with Missing Values: A Deep Probabilistic Approach. 19-28 - Hen Hayoon, Yossi Oren:
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling. 29-46 - Sneha Chauhan, Sugata Gangopadhyay:
Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio. 47-65 - Dina Barak-Pelleg, Daniel Berend:
Simulating a Coupon Collector. 66-77 - Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Undecidability of the Panopticon Detection Problem. 78-87 - Thijs Veugen, Bart Kamphorst, Michiel Marcus:
Privacy-Preserving Contrastive Explanations with Local Foil Trees. 88-98 - Nir Drucker, Tomer Pelleg:
Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies. 99-117 - Sergey Frenkel:
Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples. 118-134 - Asa Bornstein, Amir Rubin, Danny Hendler:
Machine-Learning Based Objective Function Selection for Community Detection. 135-152 - Daniel Berend, Shlomi Dolev, Manish Kumar:
Randomness for Randomness Testing. 153-161 - Dimiter Avresky, Dobrin Dobrev:
Botnet Attack Identification Based on SDN. 162-169 - Yoram Segal, Ofer Hadar:
Setting Up an Anonymous Gesture Database as Well as Enhancing It with a Verbal Script Simulator for Rehabilitation Applications. 170-179 - Nadav Voloch, Ehud Gudes, Nurit Gal-Oz, Rotem Mitrany, Ofri Shani, Maayan Shoel:
Fake News Detection in Social Networks Using Machine Learning and Trust. 180-188 - Nimrod Gradus, Asaf Cohen, Erez Biton, Omer Gurwitz:
Reinforcement Based User Scheduling for Cellular Communications. 189-207 - Sreejit Chaudhury, Ajeet Kumar, Subhamoy Maitra, Somjit Roy, Sourav Sen Gupta:
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases. 208-223 - Shay Gueron:
Counter Mode for Long Messages and a Long Nonce. 224-231 - Yarden Rotem, Nathaniel Shimoni, Lior Rokach, Bracha Shapira:
Transfer Learning for Time Series Classification Using Synthetic Data Generation. 232-246 - Shlomi Dolev, Ehud Gudes, Hannah Yair:
Non-stopping Junctions via Traffic Scheduling. 247-258 - Benjamin Azaria, Lee-Ad Gottlieb:
Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural Networks. 259-269 - Isfaque Al Kaderi Tuhin, Peter Loh, Zhengkui Wang:
Smart Cybercrime Classification for Digital Forensics with Small Datasets. 270-280 - Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas D. Pattengale:
Auditable, Available and Resilient Private Computation on the Blockchain via MPC. 281-299 - Novak Boskov, Naor Radami, Trishita Tiwari, Ari Trachtenberg:
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting. 300-317 - Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico:
Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust. 318-336 - Panos Kampanakis, Michael G. Kallitsis:
Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates. 337-355 - Rajnish Kumar, Shlomi Arnon:
Enhancing Cybersecurity of Satellites at Sub-THz Bands. 356-365 - Samanvaya Panda:
Polynomial Approximation of Inverse sqrt Function for FHE. 366-376 - Aviad Elyashar, Jorge Bendahan, Rami Puzis:
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It. 377-387 - John Andrews, Michele Ciampi, Vassilis Zikas:
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum. 388-407 - Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky:
A Linear-Time 2-Party Secure Merge Protocol. 408-427 - Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas:
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker. 428-446 - Karim Eldefrawy, Tancrède Lepoint, Laura Tam:
In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms. 447-467 - Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng:
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds. 468-486 - Pablo Kogan, Tamir Tassa, Tal Grinshpoun:
Privacy Preserving DCOP Solving by Mediation. 487-498 - Shlomi Dolev, Ehud Gudes, Erez Segev, Jeffrey D. Ullman, Grisha Weintraub:
BFLUT Bloom Filter for Private Look Up Tables. 499-505
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.