default search action
5th CSCML 2021: Beer-Sheva, Israel
- Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander A. Schwarzmann:
Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings. Lecture Notes in Computer Science 12716, Springer 2021, ISBN 978-3-030-78085-2 - Ilaria Chillotti, Marc Joye, Pascal Paillier:
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. 1-19 - Hariom, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla:
Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features. 20-37 - Thijs Veugen, Bart Kamphorst, Natasja van de L'Isle, Marie Beth van Egmond:
Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent. 38-51 - Samanvaya Panda:
Principal Component Analysis Using CKKS Homomorphic Scheme. 52-70 - Michael Berlin, Oded Margalit, Gera Weiss:
DepthStAr: Deep Strange Arguments Detection. 71-85 - Aneet Kumar Dutta, Rohit Negi, Sandeep Kumar Shukla:
Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems. 86-93 - Nitesh Emmadi, Imtiyazuddin Shaik, Harshal Tupsamudre, Harika Narumanchi, Rajan Mindigal Alasingara Bhattachar, Sachin Premsukh Lodha:
Privacy-Preserving Password Strength Meters with FHE. 94-103 - Mor Soffer, Ofer Hadar, Naftali Lazarovitch:
Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning. 104-113 - Iddo Bentov, Pavel Hubácek, Tal Moran, Asaf Nadler:
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies. 114-127 - Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. 128-144 - Eyal Nussbaum, Michael Segal:
Privacy Vulnerability of NeNDS Collaborative Filtering. 145-152 - Assaf Wagner, Rami Puzis:
Lawful Interception in WebRTC Peer-To-Peer Communication. 153-170 - Lukasz Krzywiecki, Miroslaw Kutylowski, Rafal Rothenberger, Bartosz Drzazga:
Hierarchical Ring Signatures Immune to Randomness Injection Attacks. 171-186 - Sergey Frenkel:
Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied Tasks. 187-195 - Dor Bitan, Shlomi Dolev:
Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement - (Extended Abstract). 196-204 - Igor Vinokur, David Tolpin:
Warped Input Gaussian Processes for Time Series Forecasting. 205-220 - Shlomi Dolev, Matan Liber:
History Binding Signature - (Extended Abstract). 221-229 - Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis. 230-243 - Rami Ailabouni, Orr Dunkelman, Sara Bitan:
DNS-Morph: UDP-Based Bootstrapping Protocol for Tor. 244-265 - Yefim Dinitz, Shlomi Dolev, Manish Kumar:
Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths - (Extended Abstract). 266-274 - Nir Drucker, Shay Gueron, Dusan Kostic:
Binding BIKE Errors to a Key Pair. 275-281 - Jakub Klemsa:
Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier Transform. 282-300 - Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede:
Efficient Secure Ridge Regression from Randomized Gaussian Elimination. 301-316 - Philip Derbeko, Shlomi Dolev:
PolyDNN Polynomial Representation of NN for Communication-Less SMPC Inference. 317-324 - Yakov Vainshtein, Ehud Gudes:
Use of Blockchain for Ensuring Data Integrity in Cloud Databases. 325-335 - Bruce Schneier:
Invited Talk: The Coming AI Hackers. 336-360 - Leonid Reyzin, Adam D. Smith, Sophia Yakoubov:
Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC. 361-378 - Akif Patel, Moti Yung:
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance. 379-396 - Dorel Yaffe, Danny Hendler:
Early Detection of In-Memory Malicious Activity Based on Run-Time Environmental Features. 397-404 - Donald Beaver:
Software Integrity and Validation Using Cryptographic Composability and Computer Vision. 405-413 - David Heath, Vladimir Kolesnikov, Jiahui Lu:
Efficient Generic Arithmetic for KKW - Practical Linear MPC-in-the-Head NIZK on Commodity Hardware Without Trusted Setup. 414-431 - Kyle Haefner, Indrakshi Ray:
Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method. 432-450 - Byunggu Yu, Junwhan Kim:
Using a Neural Network to Detect Anomalies Given an N-gram Profile. 451-466 - Foto N. Afrati, Shlomi Dolev, Shantanu Sharma, Jeffrey D. Ullman:
Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations. 467-486 - Shlomi Dolev, Stav Doolman:
Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM (Extended Abstract). 487-496 - Nadav Voloch, Ehud Gudes, Nurit Gal-Oz:
Implementing GDPR in Social Networks Using Trust and Context. 497-503
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.