Cyber Security, Cryptology, and Machine Learning
portes grátis
Cyber Security, Cryptology, and Machine Learning
6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings
Dolev, Shlomi; Meisels, Amnon; Katz, Jonathan
Springer International Publishing AG
05/2022
508
Mole
Inglês
9783031076886
15 a 20 dias
795
Descrição não disponível.
Blind Rotation in Fully Homomorphic Encryption with Extended Keys.- Monitoring Time Series With Missing Values: a Deep Probabilistic Approach.- Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling.- Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio.- Simulating a Coupon Collector.- On the undecidability of the Panopticon detection problem.- Privacy-Preserving Contrastive Explanations with Local Foil Trees.- Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies.- Predicting the direction of changes in the values of time series for relatively small training samples.- Machine-Learning Based Objective Function Selection for Community Detection.- Randomness for Randomness Testing.- Botnet attack identification based on SDN.- Setting up an anonymous gesture database as well as enhancing it with a verbal script simulator for rehabilitation applications.- Fake News Detection in Social Networks using Machine Learning and Trust.- Reinforcement Based User Scheduling for Cellular Communications.- A Heuristic Framework to search for Approximate Mutually Unbiased Bases.- Counter Mode for Long Messages and a Long Nonce.- Transfer learning for time series classification using synthetic data generation.- Non-Stopping Junctions via Traffic Scheduling.- Predicting subscriber usage: Analyzing multidimensional time-series using Convolutional Neural Networks.- Smart Cybercrime Classification for Digital Forensics with Small Datasets.- Auditable, Available and Resilient Private Computation on the Blockchain via MPC.- Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting.- Mutual Accountability Layer: Accountable Anonymity within Accountable Trust.- Faster Post-Quantum TLS handshakes Without Intermediate CA Certificates.- Enhancing Cybersecurity of Satellites at sub-THz Bands.- Polynomial Approximation of Inverse sqrt Function for FHE.- Detecting Clickbait in Online Social Media: You Won't Believe How We Did It.- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum.- A Linear-Time 2-Party Secure Merge Protocol.- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms.- Differentially-Private ``Draw and Discard'' Machine Learning: Training Distributed Models from Enormous Crowds.- Privacy Preserving Solution of DCOPs by Mediation.- BFLUT Bloom Filter for Private Look Up Tables.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;communication systems;computer crime;computer networks;computer security;computer systems;cryptography;data communication systems;data security;education;machine learning;network protocols;network security;signal processing;telecommunication networks;telecommunication systems
Blind Rotation in Fully Homomorphic Encryption with Extended Keys.- Monitoring Time Series With Missing Values: a Deep Probabilistic Approach.- Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling.- Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio.- Simulating a Coupon Collector.- On the undecidability of the Panopticon detection problem.- Privacy-Preserving Contrastive Explanations with Local Foil Trees.- Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies.- Predicting the direction of changes in the values of time series for relatively small training samples.- Machine-Learning Based Objective Function Selection for Community Detection.- Randomness for Randomness Testing.- Botnet attack identification based on SDN.- Setting up an anonymous gesture database as well as enhancing it with a verbal script simulator for rehabilitation applications.- Fake News Detection in Social Networks using Machine Learning and Trust.- Reinforcement Based User Scheduling for Cellular Communications.- A Heuristic Framework to search for Approximate Mutually Unbiased Bases.- Counter Mode for Long Messages and a Long Nonce.- Transfer learning for time series classification using synthetic data generation.- Non-Stopping Junctions via Traffic Scheduling.- Predicting subscriber usage: Analyzing multidimensional time-series using Convolutional Neural Networks.- Smart Cybercrime Classification for Digital Forensics with Small Datasets.- Auditable, Available and Resilient Private Computation on the Blockchain via MPC.- Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting.- Mutual Accountability Layer: Accountable Anonymity within Accountable Trust.- Faster Post-Quantum TLS handshakes Without Intermediate CA Certificates.- Enhancing Cybersecurity of Satellites at sub-THz Bands.- Polynomial Approximation of Inverse sqrt Function for FHE.- Detecting Clickbait in Online Social Media: You Won't Believe How We Did It.- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum.- A Linear-Time 2-Party Secure Merge Protocol.- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms.- Differentially-Private ``Draw and Discard'' Machine Learning: Training Distributed Models from Enormous Crowds.- Privacy Preserving Solution of DCOPs by Mediation.- BFLUT Bloom Filter for Private Look Up Tables.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;communication systems;computer crime;computer networks;computer security;computer systems;cryptography;data communication systems;data security;education;machine learning;network protocols;network security;signal processing;telecommunication networks;telecommunication systems